projects
/
tinc
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
Fix indentation and some whitespace issues.
[tinc]
/
README
diff --git
a/README
b/README
index
1f534d0
..
c88027b
100644
(file)
--- a/
README
+++ b/
README
@@
-1,7
+1,7
@@
-This is the README file for tinc version 1.1pre
6
. Installation
+This is the README file for tinc version 1.1pre
11
. Installation
instructions may be found in the INSTALL file.
instructions may be found in the INSTALL file.
-tinc is Copyright (C) 1998-201
3
by:
+tinc is Copyright (C) 1998-201
4
by:
Ivo Timmermans,
Guus Sliepen <guus@tinc-vpn.org>,
Ivo Timmermans,
Guus Sliepen <guus@tinc-vpn.org>,
@@
-36,11
+36,11
@@
at your own risk.
Compatibility
-------------
Compatibility
-------------
-Version 1.1pre
6
is compatible with 1.0pre8, 1.0 and later, but not with older
+Version 1.1pre
11
is compatible with 1.0pre8, 1.0 and later, but not with older
versions of tinc.
When the ExperimentalProtocol option is used, tinc is still compatible with
versions of tinc.
When the ExperimentalProtocol option is used, tinc is still compatible with
-1.0.X and 1.1pre
6
itself, but not with any other 1.1preX version.
+1.0.X and 1.1pre
11
itself, but not with any other 1.1preX version.
Requirements
Requirements
@@
-49,7
+49,8
@@
Requirements
In order to compile tinc, you will need a GNU C compiler environment. Please
ensure you have the latest stable versions of all the required libraries:
In order to compile tinc, you will need a GNU C compiler environment. Please
ensure you have the latest stable versions of all the required libraries:
-- OpenSSL (http://www.openssl.org/) version 1.0.0 or later.
+- OpenSSL (http://www.openssl.org/) version 1.0.0 or later, with support for
+ elliptic curve cryptography (ECC) and Galois counter mode (GCM) enabled.
The following libraries are used by default, but can be disabled if necessary:
The following libraries are used by default, but can be disabled if necessary:
@@
-71,8
+72,8
@@
be forwarded by intermediate nodes.
By default, nodes authenticate each other using 2048 bit RSA (or 521 bit
ECDSA*) keys. Traffic is encrypted using Blowfish in CBC mode (or AES-256 in
By default, nodes authenticate each other using 2048 bit RSA (or 521 bit
ECDSA*) keys. Traffic is encrypted using Blowfish in CBC mode (or AES-256 in
-CTR mode*), authenticated using HMAC-SHA1 (or HMAC-SHA-256*), and is protected
-
against
replay attacks.
+GCM mode*), authenticated using HMAC-SHA1 (or GCM*), and is protected against
+replay attacks.
*) When using the ExperimentalProtocol option.
*) When using the ExperimentalProtocol option.