High-performant tinc (without encryption?)

Guus Sliepen guus at tinc-vpn.org
Tue Jan 13 17:34:01 CET 2015


On Thu, Jan 08, 2015 at 12:08:30PM +0100, Eric Feliksik wrote:

> I am looking to connect edge-routers in a VPN over the Internet, with
> requirement:
> - Mesh
> - NAT-traversing
> - 500 mbit throughput.
> 
> I'm using Tinc 1.0.23 and it does this very nicely (I think I could also
> use 1.1, once it's considered stable) except for the througphut: the
> edgerouters cannot encrypt this fast. So I want to relieve the edge routers
> from this responsibility.
> 
> If the end hosts can encrypt their point-to-point communication with ipsec
> (but the mesh vpn and nat-T is done by tinc), what would be the
> consequences of using tinc with "Cipher = none"? What ipsec-wrapping
> headers (from tinc, I assume) would be exposed, and is this a bad idea,
> security wise?

IPsec is designed to run over the open Internet, so there is no harm in
setting Cipher = none in this case. You could also try seting Digest =
none as well. Of course, how you set up keys for IPsec is also
important; make sure that is also done in a secure way.

If you use the new protocol in tinc 1.1, it will use the ChaCha-Poly1305
authenticated cipher. Even though only a C implementation of it without any
assembler optimizations is used, it is a very fast cipher. You can try
to run the "sptps_speed" command from 1.1pre11 on your edge router and
see how fast they can theoretically go.

-- 
Met vriendelijke groet / with kind regards,
     Guus Sliepen <guus at tinc-vpn.org>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: Digital signature
URL: <http://www.tinc-vpn.org/pipermail/tinc/attachments/20150113/ddae4579/attachment-0001.sig>


More information about the tinc mailing list