This is the protocol documentation for tinc, a Virtual Private Network daemon.
- Copyright 2000-2004 Guus Sliepen <guus@tinc-vpn.org>,
- 2000-2004 Ivo Timmmermans <ivo@tinc-vpn.org>
+ Copyright 2000-2006 Guus Sliepen <guus@tinc-vpn.org>,
+ 2000-2005 Ivo Timmmermans
Permission is granted to make and distribute verbatim copies of
this documentation provided the copyright notice and this
provided that the entire resulting derived work is distributed
under the terms of a permission notice identical to this one.
- $Id$
-
-
1. Protocols used in tinc
-------------------------
A data packet can only be sent if the encryption key, cipher and digest are
known to both parties, and the connection is activated. If the encryption key
is not known, a request is sent to the destination using the meta connection to
-retreive it.
+retrieve it.
0 1 2 3 4 5 6 7 ... 97 98 99 100
| seqno | data | MAC |
understands the numeric codes sent.
The authentication scheme is described in the SECURITY2 file. After a
-succesful authentication, the server and the client will exchange all the
+successful authentication, the server and the client will exchange all the
information about other tinc daemons and subnets they know of, so that both
sides (and all the other tinc daemons behind them) have their information
synchronised.