<ivo@@o2w.nl>, Guus Sliepen <guus@@sliepen.eu.org> and
Wessel Dankers <wsl@@nl.linux.org>.
<ivo@@o2w.nl>, Guus Sliepen <guus@@sliepen.eu.org> and
Wessel Dankers <wsl@@nl.linux.org>.
Permission is granted to make and distribute verbatim copies of this
manual provided the copyright notice and this permission notice are
Permission is granted to make and distribute verbatim copies of this
manual provided the copyright notice and this permission notice are
<ivo@@o2w.nl>, Guus Sliepen <guus@@sliepen.eu.org> and
Wessel Dankers <wsl@@nl.linux.org>.
<ivo@@o2w.nl>, Guus Sliepen <guus@@sliepen.eu.org> and
Wessel Dankers <wsl@@nl.linux.org>.
Permission is granted to make and distribute verbatim copies of this
manual provided the copyright notice and this permission notice are
Permission is granted to make and distribute verbatim copies of this
manual provided the copyright notice and this permission notice are
@cindex scalability
Tinc also allows more than two sites to connect to eachother and form a single VPN.
Traditionally VPNs are created by making tunnels, which only have two endpoints.
@cindex scalability
Tinc also allows more than two sites to connect to eachother and form a single VPN.
Traditionally VPNs are created by making tunnels, which only have two endpoints.
@c ==================================================================
@node Encryption of network packets
@c ==================================================================
@node Encryption of network packets
In August 2000, we discovered the existence of a security hole in all versions
of tinc up to and including 1.0pre2. This had to do with the way we exchanged
In August 2000, we discovered the existence of a security hole in all versions
of tinc up to and including 1.0pre2. This had to do with the way we exchanged