similar to: Large sites

Displaying 20 results from an estimated 10000 matches similar to: "Large sites"

2013 Jun 28
3
OHM2013
Hello, At OHM2013 (https://ohm2013.org/site/), there will be a lightning talk about tinc, and a workshop setting up tinc VPNs at the Milliways village. An exact time is not known yet but will follow later. OHM2013 will take place from July 31 to August 4 at the Geestmerambacht festival grounds, near Alkmaar, in the Netherlands. If you would like to meet at OHM2013 with other people using or
2013 Jun 28
3
OHM2013
Hello, At OHM2013 (https://ohm2013.org/site/), there will be a lightning talk about tinc, and a workshop setting up tinc VPNs at the Milliways village. An exact time is not known yet but will follow later. OHM2013 will take place from July 31 to August 4 at the Geestmerambacht festival grounds, near Alkmaar, in the Netherlands. If you would like to meet at OHM2013 with other people using or
2015 May 04
2
Isolating a subnet on demand
Hi, Thanks for the link :) I guess we'll just end up having 2 separate VPNs, eventually. Have a good evening! > There is no centralized way to remove a subnet or block a user. A user > is authorized to be on the network by other nodes that have his/her > public key. If you delete the offending host config files and let tinc > reload its configuration, you can remove a bad node
2015 May 04
2
Isolating a subnet on demand
Hi! I'm setting up a VPN with friends of mine, and we are currently considering the possibility to opening the subnet to more people. Considering that one day or another we may have to isolate a subnet (because of bad behaviour, or because it has been compromised), which solution(s) would you recommend for such a situation?
2018 Mar 20
3
Tinc deployments in the USA
Are there any Tinc deployments in the USA in Medium sized businesses and small Enterprises? Use case is to provide site-to-site VPN functionality. -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://www.tinc-vpn.org/pipermail/tinc/attachments/20180320/1e41904a/attachment.html>
2015 Dec 31
2
Is there any some cases we can see ?
Hi, We just found the tinc, looks like it is really a better VPN solution than traditional VPN, I am wondering, is there some cases we can refer, like is there some big cluster running in the production environment ? Thank you. -------------- next part -------------- An HTML attachment was scrubbed... URL:
2017 Dec 18
3
Create network of untrusted peers (like SocialVPN, ChaosVPN, etc)
For some weeks I've been trying to devise a way to connect multiple users in various parts of the city and state, and I found out that most likely Tinc is the only daemon that does the kind of meshing I want. I was successful in connecting some servers of mine around in switch mode, but now comes the hard part: How can I authenticate clients on my network? I would also need to direct static
2016 Aug 16
1
"HA" ie. two linked tincds on the same ethernet segment
Goodday, Currently using tinc 1.0.24 on Debian 8.x, OVH datacentre, two servers same VRACK (ie. internal ethernet bridge/switched together). I’m wanting to get a remote server connected to both the two OVH servers for fail-over reasons, but having access via both to the shared vRack segment as a switch mode. Thereby Essentially I’m creating a ethernet loop… ----------------------vRack |
2018 Jan 05
3
Using keyring on tinc
Hi all! Is there any way to make tinc use keys from a keyring or similar? I'm trying to find a way to manage multiple server, making it easier to register a new user to the network. Thanks! -- Martin Iñaki Malerba inakimmalerba at gmail.com inaki at satellogic.com
2015 Nov 22
5
Authenticating VPN addresses: a proposal
TL;DR: a proposal for a new tinc feature that allows nodes to filter ADD_SUBNET messages based on the metaconnection on which they are received, so that nodes can't impersonate each other's VPN Subnets. Similar to StrictSubnets in spirit, but way more flexible. BACKGROUND: THE ISSUE OF TRUST IN A TINC NETWORK In terms of metaconnections (I'm not discussing data tunnels here), one of
2007 Feb 07
3
Diagnosing poor call quality
Greetings list, We have an issue with call quality at 2 sites where the users (4 Elmeg IP290s at one site, 2 SPA942s at the other) do not have an asterisk box on-site. Each site has an 8mb down/448k up ADSL connection and the phones connect via SIP to an asterisk box in a datacentre using g729. The asterisk box in the datacentre connects to our other asterisk boxes providing pstn connectivity
2015 Jan 12
3
TINC config files layout not human or script friendly
I would say the weakest part of the TINC design is the configuration file layout. There is no way to split out the essentially static configuration for all nodes in the cluster and isolate the node specific settings to one configuration file. So that means I have to keep an inventory of configuration files per node so I can edit and deliver them and keep everything straight. The private
2008 Mar 12
2
DUNDi
Is there a way to have a dundi host advertise extensions for another server? A-----------B-----------C I'd like A to reach C through B. A and C would handle the call, B would just be the DUNDi intermediary. Assuming A has 101-199 B has 201-299 And C has 301-399 A sample dundi/extensions/iax config for B is all I need. I can get single DUNDi queries running fine(A->B, B->C,
2012 Apr 05
1
Big network, small devices
Hi everyone, I'm interested in using Tinc for building an overlay network on top of a community network. The overlay may consist of some hundreds of nodes, and devices will most probably not be very powerful (Alix or Commell-like or even less). To make the overlay network topology resemble the real one as much as possible, all nodes would ConnectTo all other nodes. Has anyone worked with a
2008 Dec 09
1
Run rsync through intermediary server with SSH
I'm using rsync, ssh, and cron glued together with Python as a push-based synchronization system. From a single location, I push content out to various offices. I log stdout/stderr on the master server to make sure everything is running smoothly. I would now like for some of our "regional hubs" to take on some of the load (bandwidth-wise), while still retaining my centralized
2015 May 11
2
Two nodes with same key?
On 11/05/15 18:59, Guus Sliepen wrote: > Tinc does break if you have two nodes that have the same Name > online at the same time, since those are used to uniquely identify > nodes in the VPN. Ah. I had assumed that some sort of internal UID was used to identify nodes. Does tinc break if the two ends of the connection disagree about the name? For example if my old hub was called
2018 Dec 11
3
subnet flooded with lots of ADD_EDGE request
Hello, We're suffering from sporadic network blockage(read: unable to ping other nodes) with 1.1-pre17. Before upgrading to the 1.1-pre release, the same network blockage also manifested itself in a pure 1.0.33 network. The log shows that there are a lot of "Got ADD_EDGE from nodeX (192.168.0.1 port 655) which does not match existing entry" and it turns out that the mismatches
2017 Aug 19
2
How to set tinc not to forward Subnet learned from other nodes?
Hi, Reason behind that is we have some use cases wouldn’t like to make some nodes to become the transit node, but there’re some other nodes in the topology act as the transit nodes. So if the tinc node forward subnet update it learning from one side to the other side, then it possible to become transit node if one side only have route to go through it. That node I would call it “spoke-only”
2010 Jun 24
7
Yet more variable scoping pain.
Some days I wonder why I even bother with puppet. --- classes: - datacentre::new_york - role::appserver - elements::tfel0 environment: production: parameters: < set key/value pairs here > class ldap { < do some stuff that behaves slightly differently between different data centers > } class role::appserver { include ldap } So, I wanted to set some variables in the
2015 May 11
2
Two nodes with same key?
I am wondering if tinc breaks if two hosts have the same key? I am guessing it probably does! I have a hub-and-spoke arrangement, with VPN clients who all know the DNS name and the public key for the hub. I need to transition the hub to another server, with another IP address. I will, after testing, transition the DNS name to point to the new server. It would be convenient if I didn't