Displaying 20 results from an estimated 300 matches similar to: "Using keyring on tinc"
2018 Jan 05
0
Using keyring on tinc
On Fri, Jan 05, 2018 at 02:34:00PM -0300, Inaki Malerba wrote:
> Public keys I mean.
>
> I'd like to manage an easier way to distribute public keys when a new
> user is added to the network.
>
> I'm thinking of mounting hosts/ over ssh on the servers and have it
> centralized.
> Also, distributing server config (host file, ConnectTo, etc) to the
> clients via
2018 Jan 06
0
Using keyring on tinc
On Fri, Jan 05, 2018 at 05:30:53PM -0300, Inaki Malerba wrote:
> Also, autodiscovery over lan is working? Keys shared between all hosts
> is enough?
There is the LocalDiscovery option that can be enabled. However, it does
not automatically exchanging keys with nodes on the LAN. Instead, it is
there to assist when two nodes that are on the same LAN, are part of the
same VPN, and are connect
2015 Dec 31
2
Is there any some cases we can see ?
Hi,
We just found the tinc, looks like it is really a better VPN solution than
traditional VPN, I am wondering, is there some cases we can refer, like is
there some big cluster running in the production environment ?
Thank you.
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
2015 May 04
2
Isolating a subnet on demand
Hi,
Thanks for the link :)
I guess we'll just end up having 2 separate VPNs, eventually.
Have a good evening!
> There is no centralized way to remove a subnet or block a user. A user
> is authorized to be on the network by other nodes that have his/her
> public key. If you delete the offending host config files and let tinc
> reload its configuration, you can remove a bad node
2015 May 04
2
Isolating a subnet on demand
Hi! I'm setting up a VPN with friends of mine, and we are currently
considering the possibility to opening the subnet to more people.
Considering that one day or another we may have to isolate a subnet
(because of bad behaviour, or because it has been compromised), which
solution(s) would you recommend for such a situation?
2006 Sep 18
8
acos(0.5) == pi/3 FALSE
Hello,
I don't know if the result of
acos(0.5) == pi/3
is a bug or not. It looks strange to me.
Inaki Murillo
2013 Jun 28
3
OHM2013
Hello,
At OHM2013 (https://ohm2013.org/site/), there will be a lightning talk about
tinc, and a workshop setting up tinc VPNs at the Milliways village. An exact
time is not known yet but will follow later.
OHM2013 will take place from July 31 to August 4 at the Geestmerambacht
festival grounds, near Alkmaar, in the Netherlands. If you would like to meet
at OHM2013 with other people using or
2013 Jun 28
3
OHM2013
Hello,
At OHM2013 (https://ohm2013.org/site/), there will be a lightning talk about
tinc, and a workshop setting up tinc VPNs at the Milliways village. An exact
time is not known yet but will follow later.
OHM2013 will take place from July 31 to August 4 at the Geestmerambacht
festival grounds, near Alkmaar, in the Netherlands. If you would like to meet
at OHM2013 with other people using or
2007 Aug 17
2
Date format on x-axis
Dear R users,
Plotting question from a R beginner...
When I try to plot a response through time, for example:
>Date<-c("2006-08-17", "2006-08-18", "2006-08-19", "2006-08-20")
>response<-c(4,4,8,12)
>as.Date(Date)
>plot(Date,response)
The dates on the graphic appear in spanish. This I guess is the default
way of plotting because my
2013 Feb 22
1
Large sites
Hi,
I am looking networking together about 1000-2000 sites across the
country. I've been looking through these mailing lists. Saw the thread
from the person who had 1000+ running on Amazon, and how they
essentially stripped all security out of it. Also know that the
ChaosVPN uses tinc, for at least 130+ sites although I'm a bit fuzzy
on the details for it.
Are there any other cases of
2020 Aug 10
2
R2spec woes
I tried R2spec to create the spec files necessary to have Rcpparmadillo.
I noticed that it has some issues, one example is that it placed some files
irrespectively if they were present in the tar or not.
One functionality that I think it would be nice to have would to update a
given spec file with the updated dependencies.
What do you think of this?
Regards,
--
Jos? Ab?lio
[[alternative
2017 Dec 18
3
Create network of untrusted peers (like SocialVPN, ChaosVPN, etc)
For some weeks I've been trying to devise a way to connect multiple users in various parts of the city and state, and I found out that most likely Tinc is the only daemon that does the kind of meshing I want.
I was successful in connecting some servers of mine around in switch mode, but now comes the hard part: How can I authenticate clients on my network? I would also need to direct static
2001 Mar 13
1
Display grouping parameter in coplot
I try to display the grouping variable in coplot.
It work, but it's special solution and rather ugly.
Any better idea?
# Simulate my data frame
data(state)
x77<-data.frame(state.x77)
x77$region<-state.region
coplot(Life.Exp ~ Income | region,
data=x77, show.given=F, subscripts=T,
panel = function(x, y,subscripts, ...)
{
panel.smooth(x, y, span = 1., ...)
2001 Jul 31
1
More info on cor()
I can't answer the question about knowing how many pairs there
are from "cor", but the way to assess the significance is with
cor.test(). That does tell you.
Jon
-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-
r-help mailing list -- Read http://www.ci.tuwien.ac.at/~hornik/R/R-FAQ.html
Send "info", "help", or
2023 Aug 03
2
Ubuntu packages on s390x
Hello,
Are there any plans to add R packages for Ubuntu on other architectures in addition to amd64? We are looking for s390x packages as the version from the distro's package manger is 4.2.2. I'm happy to help in any way I can.
Thank you.
Regards,
Vivian Kong
Linux on IBM Z Open Source Ecosystem
IBM Canada Toronto Lab
[[alternative HTML version deleted]]
2015 Nov 22
5
Authenticating VPN addresses: a proposal
TL;DR: a proposal for a new tinc feature that allows nodes to filter
ADD_SUBNET messages based on the metaconnection on which they are
received, so that nodes can't impersonate each other's VPN Subnets.
Similar to StrictSubnets in spirit, but way more flexible.
BACKGROUND: THE ISSUE OF TRUST IN A TINC NETWORK
In terms of metaconnections (I'm not discussing data tunnels here),
one of
2002 May 16
1
smbmount and tar
Hi all,
I've got a little problem: I have a NT share mounted on my linux box,
with smbmount (samba 2.2.3a). When I try to create a tar archive with
some files of that share, sometimes I got the following messages for
some files:
tar: <filename> file changed as we read it
tar: Error exit delayed from previous errors
Which can be the problem?
Regards,
--
Inaki Sanchez
Networks
2006 Nov 23
1
nonlinear regression-getting the explained variation
Hi,
I'm trying to teach myself R, and by the way, re-learning statistics using
Crawley's "Statistics: an introduction using R".
I've reached the regression chapter, and when it deals with non-linear
regresion using the nls library I face the following problem:
I follow the steps---
>deer<-read.table("c:\\temp\\jaws.txt",header=T)
---data available at
2019 May 19
2
[R-pkg-devel] Three-argument S3method declaration does not seem to affect dispatching from inside the package.
On Sat, 18 May 2019 at 23:34, Pavel Krivitsky <pavel at uow.edu.au> wrote:
>
> > The issue here is that you are registering a non-standard name
> > (.gen.formula) for that generic and then defining what would be the
> > standard name (gen.formula) for... what purpose? IMHO, this is a bad
> > practice and should be avoided.
>
> The situation initially arose
2015 Jan 12
3
TINC config files layout not human or script friendly
I would say the weakest part of the TINC design is the configuration
file layout.
There is no way to split out the essentially static configuration for
all nodes in the cluster and isolate the node specific settings to one
configuration file.
So that means I have to keep an inventory of configuration files per
node so I can edit and deliver them and keep everything straight.
The private