Displaying 20 results from an estimated 200 matches similar to: "Is there any some cases we can see ?"
2013 Jun 28
3
OHM2013
Hello,
At OHM2013 (https://ohm2013.org/site/), there will be a lightning talk about
tinc, and a workshop setting up tinc VPNs at the Milliways village. An exact
time is not known yet but will follow later.
OHM2013 will take place from July 31 to August 4 at the Geestmerambacht
festival grounds, near Alkmaar, in the Netherlands. If you would like to meet
at OHM2013 with other people using or
2013 Jun 28
3
OHM2013
Hello,
At OHM2013 (https://ohm2013.org/site/), there will be a lightning talk about
tinc, and a workshop setting up tinc VPNs at the Milliways village. An exact
time is not known yet but will follow later.
OHM2013 will take place from July 31 to August 4 at the Geestmerambacht
festival grounds, near Alkmaar, in the Netherlands. If you would like to meet
at OHM2013 with other people using or
2015 Dec 31
0
Is there any some cases we can see ?
On Thu, Dec 31, 2015 at 10:02:59AM +0800, ?? wrote:
> We just found the tinc, looks like it is really a better VPN solution than
> traditional VPN, I am wondering, is there some cases we can refer, like is
> there some big cluster running in the production environment ?
I know of some large deployments of tinc, but usually people want their
Virtual Private Network kept private, so I
2012 Apr 05
1
Big network, small devices
Hi everyone,
I'm interested in using Tinc for building an overlay network on top of a
community network. The overlay may consist of some hundreds of nodes,
and devices will most probably not be very powerful (Alix or
Commell-like or even less). To make the overlay network topology
resemble the real one as much as possible, all nodes would ConnectTo all
other nodes.
Has anyone worked with a
2015 May 04
2
Isolating a subnet on demand
Hi,
Thanks for the link :)
I guess we'll just end up having 2 separate VPNs, eventually.
Have a good evening!
> There is no centralized way to remove a subnet or block a user. A user
> is authorized to be on the network by other nodes that have his/her
> public key. If you delete the offending host config files and let tinc
> reload its configuration, you can remove a bad node
2006 Oct 24
3
Wifi connections
Hello all,
I'm just querying if anyone's attempted to stream off icecast over wireless
onto devices such as photos/mp3 players, As these devices are finally coming
onto the market with wifi then I'm sure they will play an important part in
any distribution for University Radio stations such as the one I'm part of
running.
-------------- next part --------------
An HTML attachment
2015 May 04
2
Isolating a subnet on demand
Hi! I'm setting up a VPN with friends of mine, and we are currently
considering the possibility to opening the subnet to more people.
Considering that one day or another we may have to isolate a subnet
(because of bad behaviour, or because it has been compromised), which
solution(s) would you recommend for such a situation?
2017 Dec 18
3
Create network of untrusted peers (like SocialVPN, ChaosVPN, etc)
For some weeks I've been trying to devise a way to connect multiple users in various parts of the city and state, and I found out that most likely Tinc is the only daemon that does the kind of meshing I want.
I was successful in connecting some servers of mine around in switch mode, but now comes the hard part: How can I authenticate clients on my network? I would also need to direct static
2011 May 17
2
Graph dump bug
Hello,
i have observed a Bug in Graph Dump (think). tinc build fine Graph
dumps. Inside the dump is a tinc node which no longer tinc used.
Connection not inside of dump for this node. This tinc network is used
for backbone network in Chemnitz, Germany. We use tinc Versions 1.0.14
and 1.0.13 on PC (Linux) and router (OpenWrt).
In the attachment is the graph dump.
On this dump is name of node
2010 Sep 20
10
Tinc performance on a Dir-300
Hi,
we are using Tinc in our Freifunk Network in Oldenburg for internode
connections over the internet. So Tinc is running on OpenWrt 10.03 on Dlink
Dir-300 Routers.
We all have enough internet bandwith (1,6 MB/sec and more) but we only get a
maximum speed of ~350KB/sec between two tinc nodes because then tinc uses 99%
of the cpu.
Is it possible to get more Speed with tinc on this machines?
2018 Jan 05
3
Using keyring on tinc
Hi all!
Is there any way to make tinc use keys from a keyring or similar?
I'm trying to find a way to manage multiple server, making it easier to
register a new user to the network.
Thanks!
--
Martin IƱaki Malerba
inakimmalerba at gmail.com
inaki at satellogic.com
2014 Jan 30
5
videowall
So I had this crazy idea to put together a cheap video
wall<https://lh6.googleusercontent.com/-GNJ97iKoU3Y/UumgZ62KESI/AAAAAAAAa8Y/t07wL1D7Tmk/w931-h698-no/IMG_20140125_210754.jpg>
in
my local hackerspace using
a lot of screens suffering from planned obsolescence or at least a poor
choice in their used caps
and cheap - used Nvidia NVS 440 cards.
During evaluation of Win 7/8 I noticed there
2013 Feb 22
1
Large sites
Hi,
I am looking networking together about 1000-2000 sites across the
country. I've been looking through these mailing lists. Saw the thread
from the person who had 1000+ running on Amazon, and how they
essentially stripped all security out of it. Also know that the
ChaosVPN uses tinc, for at least 130+ sites although I'm a bit fuzzy
on the details for it.
Are there any other cases of
2015 Nov 22
5
Authenticating VPN addresses: a proposal
TL;DR: a proposal for a new tinc feature that allows nodes to filter
ADD_SUBNET messages based on the metaconnection on which they are
received, so that nodes can't impersonate each other's VPN Subnets.
Similar to StrictSubnets in spirit, but way more flexible.
BACKGROUND: THE ISSUE OF TRUST IN A TINC NETWORK
In terms of metaconnections (I'm not discussing data tunnels here),
one of
2019 Nov 06
1
tinc based deployments..
Do we know the size of biggest deployment(site-site and client-site) which
is tinc based VPN?
Or it is just used in toy projects at schools to learn something about VPN?
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.tinc-vpn.org/pipermail/tinc/attachments/20191105/0ce00ca7/attachment.html>
2012 Jun 25
1
[OT] Is there a preferred location to post Centos systems administration gigs?
Subject says it all.
Is there a preferred location to post Centos systems administration gigs?
-Jason
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- -
- Jason Pyeron PD Inc. http://www.pdinc.us -
- Principal Consultant 10 West 24th Street #100 -
- +1 (443) 269-1555 x333
2013 May 02
3
I Know It's A Stupid Question......
........But I'm trying to give my son a "cool-yet-kind-of-geeky" 13th
Birthday Present......he hinted he liked the CentOS logo, but where
would I find things that are branded with it?....searching the web
doesn't really help me much, only because I'm not sure what I need to be
looking for...any help would be greatly appreciated! Thanks in advance!!
EGO II
2015 Jan 12
3
TINC config files layout not human or script friendly
I would say the weakest part of the TINC design is the configuration
file layout.
There is no way to split out the essentially static configuration for
all nodes in the cluster and isolate the node specific settings to one
configuration file.
So that means I have to keep an inventory of configuration files per
node so I can edit and deliver them and keep everything straight.
The private
2019 Apr 29
0
tinc works well using Tor v3 onions, with MPTCP link aggregation
tinc hosts listen for connections to Tor v3 onion services, and they connect to peers using Tor SocksPorts. MPTCP aggregates full-mesh connections between hosts. For Internet hosts with well-peered gigabit uplinks, this permits throughput among peers at 30-50 Mbps for multiple streams, vs ~10 Mbps at most for individual connections.
https://github.com/annymous/oniontinc includes bash scripts for
2015 Jan 14
2
Obtain public key
Fantastic, having it in the CLI would great. It is for the reason of users
losing the pub key that I ask, writing some docs for an internal network.
Ah interesting, I finally found openssl does not have the 25519 curve in
there(and no plans to do so looks like) but I was not aware there was non
standard priv key format either.
Would it make sense for the
tinc -n <netname> get