Routing and keying Questions
sich
sich at cafe-philo.net
Sun Jul 6 23:03:12 CEST 2008
Frithjof Hammer a écrit :
>> Yep, each node contact the other to distribute the network information.
>>
> Can this be switched off? What exactly does the parameter "TunnelServer =
> <yes|no> (no) [experimental]" do? The description sounds more or less like
> it.
>
Try this option.... Apparently this is for you.... This is experimental
and I never try it, but apparently tinc would not communicate with node
he doesn't know in the hosts directory.
>
>> Tinc only give you a virtual interface.... Is your job to resolve
>> routing or filtering issue.
>>
>
> What I meant was the routing done by the tinc daemon. It states on the tinc
> website:
>
> "VPN traffic is always (if possible) sent directly to the destination, without
> going through intermediate hops."
>
> In other words: If it is not possible to send traffic directly, it will be
> routed by the tincd. Correct?
>
Yep, but you always need to take care about your routing table.
> This brings me to my next question: If there is no intermediate hop and both
> nodes haven't the key from the other node, how can the traffic be encrypted?
>
If there is no intermediate the two node can't connect together... .If
node A know node B, node B know node A and C, and node C know node B.
Then A can communicate with B. But only if A and C are connected to B.
You can us the host option :
IndirectData = <yes|no> (no)
This option specifies whether other tinc daemons besides the one you
specified with ConnectTo can make a direct connection to you. This is
especially useful if you are behind a firewall and it is impossible to
make a connection from the outside to your tinc daemon. Otherwise, it is
best to leave this option out or set it to no.
With this node A can't connect directly with node C
>
>> Use iptables for access restrictions.
>>
> I don't like the Idea. The blocked far end could simple use a IP Address from
> the range of the allowed nodes.
>
Yep, but you need to have the good routing topology to do that.... If
someone use ip range from node A on the node C, I doesn't think that
will work....
>
>>> * Is this (nodes can talk to eachother without having the crypto keys) the
>>> correct behavior?
>>>
>> Yes, that's one of the advantages of using tinc.
>>
>
> Then why use different keys for each node and not a shared key for everyone?
>
With this you can add or remove other node, or just stop the access
right for one specific node without regenerating all the key....
> Greetings
> Frithjof
> _______________________________________________
> tinc mailing list
> tinc at tinc-vpn.org
> http://www.tinc-vpn.org/cgi-bin/mailman/listinfo/tinc
>
More information about the tinc
mailing list