We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

tinc: the difficulties of a peer-to-peer VPN on the hostile Internet

Formal Metadata

Title
tinc: the difficulties of a peer-to-peer VPN on the hostile Internet
Title of Series
Number of Parts
97
Author
License
CC Attribution 2.0 Belgium:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Rather than configuring tunnels, a tinc VPN is more or less specified by its endpoints. The tinc daemons will automatically set up tunnels in order to create a full mesh network. The problem in today's Internet is that many users are trapped behind NAT, and ISPs are known to drop ICMP packets, IP fragments, and/or UDP packets, making reliable connections between peers difficult. Another problem is how to manage authentication and authorization in a fully decentralized, but user-friendly way. In this talk I will look at solutions already implemented in tinc and other VPN software, and I look at future work to solve the remaining problems. tinc is a Virtual Private Network (VPN) daemon that automatically tries to create a full mesh network between peers. It can route IPv4 and IPv6 packets, or switch any type of Ethernet packet to create a virtual LAN. It can tunnel over IPv4 and IPv6, and runs on Linux, *BSD, Solaris, MacOS/X and Windows.