similar to: Way to verify the public key?

Displaying 20 results from an estimated 40000 matches similar to: "Way to verify the public key?"

2015 Nov 16
2
Upcoming Tinc Talk at FOSSETCON 2015
Yes, slides will be available afterwards. Additionally, a very similar talk will be presented at SCALE this year as well. Do you have any more info about how tinc is used by NYC mesh? Ben On Sun, Nov 15, 2015 at 3:55 PM, Daniel J. Grinkevich < danielgrinkevich at gmail.com> wrote: > Will the slides be posted after the talk? > > We use tinc for NYC Mesh to connect nodes that do
2015 Sep 07
1
Asymmetric routing and firewalls dropping UDP packets
We are running tinc (v. 1.0.26) in switch mode with bmx6 (another mesh protocol) running on top of the tap0 interface on about 25 devices. The asymmetric routing of UDP packets is causing my firewall and I presume others to drop some of the packets, since there are no outbound SYN packets originating from the device running tinc. Is there any way to mitigate this issue besides enabling tcponly
2015 Jun 11
2
tinc as layer 2 switch doesn't automatically mesh with other nodes
We have a handful of nodes set up. Some are NAT'd but a few have direct access to the Internet. Sample confs: HostA: Name = HostA AddressFamily = any Interface = tap0 Mode = switch Connectto = HostB GraphDumpFile = /tmp/mesh HostB: Name = HostB AddressFamily = any Interface = tap0 Mode = switch Connectto = HostA GraphDumpFile = /tmp/mesh And so on. If I use HostA as the main meta sever.
2015 Nov 15
2
Upcoming Tinc Talk at FOSSETCON 2015
Hi tincfolks, I'd like to announce that we're planning a talk [1] about tinc and some of the uses that we've developed for it. It'll be given at FOSSETCON 2015 [2] in Orlando, Florida on Nov 19-21. If anybody is in the area, please consider attending. Ben [1] http://www.fossetcon.org/2015/sessions/secure-peer-networking-tinc [2] http://www.fossetcon.org/ -------------- next part
2016 Jan 29
2
respawning dead tinc process
I?ve been having the same issue with Ubuntu, thankfully we have access to Upstart: ``` start on (local-filesystems and net-device-up IFACE!=lo) stop on stopping network-services author "Mark Lopez" description "Tinc Upstart Job" version "0.1" env network=master respawn exec /usr/sbin/tincd -n "$network" -D --debug=3 --logfile ``` I removed the default
2015 Nov 15
0
Upcoming Tinc Talk at FOSSETCON 2015
Will the slides be posted after the talk? We use tinc for NYC Mesh to connect nodes that do not have line of sight. Dan On Sun, Nov 15, 2015 at 6:47 PM, Benjamin Kero <ben.kero at gmail.com> wrote: > Hi tincfolks, > > I'd like to announce that we're planning a talk [1] about tinc and some of > the uses that we've developed for it. It'll be given at FOSSETCON
2016 Jan 29
0
respawning dead tinc process
This is what we use on our routers, running once a minute via crontab. > if pgrep "tincd" >/dev/null; then > echo "tincd is running" > else > echo "tincd isn't running, restarting" > tincd -n nycmesh > fi On Fri, Jan 29, 2016 at 9:07 AM, pjv <pjv at pjv.me> wrote: > I have tinc 1.1pre11 running on various routers and linux
2016 Jan 29
2
respawning dead tinc process
I have tinc 1.1pre11 running on various routers and linux cloud servers. On one of the cloud servers, under Ubuntu 12.04, tinc is mysteriously dying once in a while, leaving a dangling PID. I have been unable to track down why it is dying, but it happens infrequently enough that I care less about why it is dying than how to robustly respawn it when it dies. Before I re-invent the wheel, has
2015 Jun 11
0
tinc as layer 2 switch doesn't automatically mesh with other nodes
tinc uses direct UDP communication for performance, not reliability. If you want to establish more metaconnections for increased reliability, you can use AutoConnect (though it probably won't work across NATs). A better solution is to use two central nodes (instead of one) for redundancy. On 11 June 2015 at 18:59, Daniel J. Grinkevich <danielgrinkevich at gmail.com> wrote: > If we
2015 Jan 14
0
Obtain public key
On Wed, Jan 14, 2015 at 12:28:00PM +0000, Martin wrote: > Is there any way to obtain the public key from the private key? > I know it's in host file however for the purpose of this message I need to > be able to generate it on the command line. > I tried > > openssl ec < ed25519_key.priv > > I get an error > > read EC key > unable to load Key >
2015 Jan 14
2
Obtain public key
Fantastic, having it in the CLI would great. It is for the reason of users losing the pub key that I ask, writing some docs for an internal network. Ah interesting, I finally found openssl does not have the 25519 curve in there(and no plans to do so looks like) but I was not aware there was non standard priv key format either. Would it make sense for the tinc -n <netname> get
2015 Jan 14
0
Obtain public key
On Wed, Jan 14, 2015 at 02:17:31PM +0000, Martin wrote: > Fantastic, having it in the CLI would great. It is for the reason of users > losing the pub key that I ask, writing some docs for an internal network. > Ah interesting, I finally found openssl does not have the 25519 curve in > there(and no plans to do so looks like) but I was not aware there was non > standard priv key
2004 Feb 13
1
public key format
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 hello! i would like to use tinc with public keys which are extracted from x509 certificates. the only public key format i was able to extract from certificates with openssl commands looked like this: - -----BEGIN PUBLIC KEY----- MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCwXDZs8EBb/JyZ9daB3Zk9WHxD
2018 Nov 22
0
Public key sharing between nodes
Hello tinc users, I have been trying to work out how key exchange/hosts file sharing in tinc 1.1 works. My topology is straightforward, a "super" always-online node A to which remote nodes B, C, ... (and so on) ConnectTo = A, to discover each other via AutoConnect (that's on by default in tinc 1.1pre17) Only super A has host files with Ed25519 keys for every node on the network.
2016 Jan 26
0
Sign/verify data with ed25519 keys of a tinc 1.1 host
On Tue, Jan 26, 2016 at 07:35:10PM +0100, Anton Voyl wrote: > Is it possible to sign/verify data with the ed25519 keys of a tinc 1.1 host? In principle yes, but tinc does not offer a way to do that. Also, reusing a key for another purpose is not recommended. What do you want to do exactly? > More specifically, is it possible to sign a file with these keys using openssl? If so, how? If
2016 Jan 26
3
Sign/verify data with ed25519 keys of a tinc 1.1 host
My intention was to sign the content of export-all with the nodes' public key, which would require the corresponding private key to verify. Does this make sense ? @ > Le 26 janv. 2016 ? 20:19, Guus Sliepen <guus at tinc-vpn.org> a ?crit : > >> On Tue, Jan 26, 2016 at 07:35:10PM +0100, Anton Voyl wrote: >> >> Is it possible to sign/verify data with the ed25519
2015 Jan 14
4
Obtain public key
Is there any way to obtain the public key from the private key? I know it's in host file however for the purpose of this message I need to be able to generate it on the command line. I tried openssl ec < ed25519_key.priv I get an error read EC key unable to load Key 140092556813984:error:0906D06C:PEM routines:PEM_read_bio:no start line:pem_lib.c:703:Expecting: ANY PRIVATE KEY
2015 Jan 17
2
Public Key format
I'm writing a storage app for storing the Ed25519 pub keys and want to do some basic verification when a user submits their public key. Is it just A-Za-z0-9 ? or can it contain special chars as well? I'm assuming it will be in the range of printable characters? Martin -------------- next part -------------- An HTML attachment was scrubbed... URL:
2016 Jan 26
1
Sign/verify data with ed25519 keys of a tinc 1.1 host
On Tue, Jan 26, 2016 at 08:52:29PM +0100, Guus Sliepen wrote: > > My intention was to sign the content of export-all with the nodes' public key, which would require the corresponding private key to verify. > > > > Does this make sense ? > > Yes, that does make a lot of sense. I'll see if I can add a safe way to > sign/verify arbitrary data with the tinc
2016 Jan 26
0
Sign/verify data with ed25519 keys of a tinc 1.1 host
On Tue, Jan 26, 2016 at 08:35:15PM +0100, Anton Voyl wrote: > My intention was to sign the content of export-all with the nodes' public key, which would require the corresponding private key to verify. > > Does this make sense ? Yes, that does make a lot of sense. I'll see if I can add a safe way to sign/verify arbitrary data with the tinc command. -- Met vriendelijke groet /