After many months of work, it's finally there: tinc 1.0pre3. Here is a summary of the changes: * The protocol has been redesigned, and although some details are still under discussion, this is secure. Care has been taken to resist most, if not all, attacks. * Unfortunately this protocol is not compatible with earlier versions, nor are earlier versions compatible with this version. Because the older protocol has huge security flaws, we feel that not implementing backwards compatibility is justified. * Some data about the protocol: * It uses public/private RSA keys for authentication (this is the actual fix for the security hole). * All cryptographic functions have been taken out of tinc, instead it uses the OpenSSL library functions. * Offers support for multiple subnets per tinc daemon. * New is also the support for the universal tun/tap device. This means better portability to FreeBSD and Solaris. * tinc is tested to compile on Solaris, Linux x86, Linux alpha. * tinc now uses the OpenSSL library for cryptographic operations. More information on getting and installing OpenSSL is in the manual. This also means that the GMP library is no longer required. * Further, thanks to Enrique Zanardi, we have Spanish messages; Matias Carrasco provided us with a Spanish translation of the manual. What still needs to be done before 1.0: * Documentation. Especially since the protocol has changed, and a lot of configuration directives have been added. For those of you who upgrade from an earlier version, you have to regenerate the passphrases, and the configuration file has changed considerably. More details are in the manpages. Have fun, but take care. -- Guus Sliepen Ivo Timmermans Wessel Dankers -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 232 bytes Desc: not available Url : http://brouwer.uvt.nl/pipermail/tinc-devel/attachments/20001109/ef5bede9/attachment.pgp