Per host key authentication
Parke
parke.nexus at gmail.com
Tue Oct 2 23:58:22 CEST 2018
On Tue, Oct 2, 2018 at 2:41 PM, Michael Munger <mj at hph.io> wrote:
> It would be nice to just disable the key at some central point and then
> authentication / encryption / decryption just *break* for that bad actor.
Depending on your specific network topology, 4 separate VPNs might
very well give you the single break point you want.
If I was going to try to use Tinc to solve your problem, I would start
by trying the 4 separate VPN approach.
-Parke
More information about the tinc
mailing list