<div dir="ltr">I am not aware of NTP. Pardon my ignorance, what's NTP.<div><br></div><div>The situation is, we are based in China where there is the infamous China Firewall that blocks practically everything unknown to the government. In the immediate past, we got by using OpenVPN to tunnel traffic through. For the past few weeks, the Firewall seems to be blocking all udp traffic that resembles openvpn. I've tried changing ports and IP address all to no avail.</div>
<div><br></div></div><div class="gmail_extra"><br><br><div class="gmail_quote">On Tue, Feb 4, 2014 at 9:17 PM, Guus Sliepen <span dir="ltr"><<a href="mailto:guus@tinc-vpn.org" target="_blank">guus@tinc-vpn.org</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div class="im">On Tue, Feb 04, 2014 at 08:55:01PM +0800, Terry T wrote:<br>
<br>
> Hi, I'm wondering how much performance boost there is to tinc if cipher and<br>
> digest are set to none.<br>
</div>[...]<br>
<div class="im">> Is there any additional ways to improve the performance and timeliness of<br>
> the delivery of the multicast packets in tinc?<br>
<br>
</div>No, if you disable the cipher and digest, it cannot be improved further.<br>
However, if it is not security sensitive, why not bypass tinc altogether? If<br>
you are using NTP, you can just let all peers make a direct connection to the<br>
NTP server.<br>
<span class="HOEnZb"><font color="#888888"><br>
--<br>
Met vriendelijke groet / with kind regards,<br>
Guus Sliepen <<a href="mailto:guus@tinc-vpn.org">guus@tinc-vpn.org</a>><br>
</font></span><br>_______________________________________________<br>
tinc mailing list<br>
<a href="mailto:tinc@tinc-vpn.org">tinc@tinc-vpn.org</a><br>
<a href="http://www.tinc-vpn.org/cgi-bin/mailman/listinfo/tinc" target="_blank">http://www.tinc-vpn.org/cgi-bin/mailman/listinfo/tinc</a><br>
<br></blockquote></div><br></div>