- Update.

This commit is contained in:
Guus Sliepen 2000-10-31 16:10:17 +00:00
parent b4c1d4e2d3
commit af565d0022
3 changed files with 69 additions and 42 deletions

7
NEWS
View file

@ -1,3 +1,10 @@
version 1.0pre3 Oct 31 2000
* Major overhaul
* Use public/private key cryptography (fixes security hole)
* Use OpenSSL crypto library for all cryptography
* Support for multiple subnets per tinc daemon
* Support for tun/tap device
version 1.0pre2 May 31 2000 version 1.0pre2 May 31 2000
* Internationalized, Dutch translation available * Internationalized, Dutch translation available
* Many sanity checks on the meta protocol added * Many sanity checks on the meta protocol added

79
README
View file

@ -1,47 +1,60 @@
This is the README file for tinc version 1.0. This is the README file for tinc version 1.0pre3. Installation instructions may
Installation instructions may be found in the INSTALL file. be found in the INSTALL file.
tinc is Copyright (C) 1998,1999,2000 Ivo Timmermans tinc is Copyright (C) 1998,1999,2000 Ivo Timmermans <itimmermans@bigfoot.com>,
<itimmermans@bigfoot.com>, Guus Sliepen <guus@sliepen.warande.net> and Guus Sliepen <guus@sliepen.warande.net> and others. For a complete list of
others. For a complete list of authors see the AUTHORS file. authors see the AUTHORS file.
This program is free software; you can redistribute it and/or modify This program is free software; you can redistribute it and/or modify it under
it under the terms of the GNU General Public License as published by the terms of the GNU General Public License as published by the Free Software
the Free Software Foundation; either version 2 of the License, or (at Foundation; either version 2 of the License, or (at your option) any later
your option) any later version. See the file COPYING for more details. version. See the file COPYING for more details.
Security statement
------------------
In august 2000, we discovered the existence of a security hole in all versions
of tinc up to and including 1.0pre2. This had to do with the way we exchanged
keys. Since then, we have been working on a new authentication scheme to make
tinc as secure as possible. The current version uses the OpenSSL library and
does authentication in much the same way as the SSH protocol does.
Cryptography is a hard thing to get right. We cannot make any guarantees. Time,
review and feedback are the only things that can prove the security of any
cryptographic product. If you wish to review tinc or give us feedback, you are
stronly encouraged to do so.
Requirements Requirements
------------ ------------
Since 1.0pre3, we use OpenSSL for all cryptographic functions. So you Since 1.0pre3, we use OpenSSL for all cryptographic functions. So you need to
need to install this library first; grab it from install this library first; grab it from http://www.openssl.org/. We recommend
http://www.openssl.org/. We recommend version 0.9.5 or better. If version 0.9.5 or better. If this library is not installed on you system,
this library is not installed on you system, configure will fail. The configure will fail. The manual in doc/tinc.texi contains more detailed
manual in doc/tinc.texi contains more detailed information on how to information on how to install this library.
install this library.
Features Features
-------- --------
This version of tinc supports multiple virtual networks at once. To This version of tinc supports multiple virtual networks at once. To use this
use this feature, you may supply a netname via the -n or --net feature, you may supply a netname via the -n or --net options. The standard
options. The standard locations for the config files will then be locations for the config files will then be /etc/tinc/<net>/. Because of this
/etc/tinc/<net>/. Because of this feature, tinc will send packets feature, tinc will send packets directly to their destinations, instead of to
directly to their destinations, instead of to the uplink. If this the uplink. If this behaviour is undesirable (for instance because of firewalls
behaviour is undesirable (for instance because of firewalls or or other restrictions), please use an older version of tinc (I would recommend
other restrictions), please use an older version of tinc (I would tinc-0.2.19).
recommend tinc-0.2.19).
In this version, MAC addresses are stripped off before encoding and In order to force the kernel to accept received packets, the destination MAC
sending a packet. When the packet reaches its destination, the MAC address will be set to FE:FD:00:00:00:00 upon reception. The MAC address of the
addresses are rebuilt again. They then have the form ethertap or tun/tap interface must also be set to this address. See the manual
FE:FD:aa:bb:cc:dd. aa, bb, cc and dd are taken from the destination for more detailed information.
and source IP address. See the manual for more detailed information.
tincd regenerates its encryption key pairs. It does this on the first tincd regenerates its encryption key pairs. It does this on the first activity
activity after the keys have expired. This period is adjustable in the after the keys have expired. This period is adjustable in the configuration
configuration file, and the default time is 3600 seconds (one file, and the default time is 3600 seconds (one hour).
hour). If you send a USR2 signal to the daemon, it'll regenerate
immediately. This version supports multiple subnets at once. They are also sorted on subnet
mask size. This means that it is possible to have overlapping subnets on the
VPN, as long as their subnet mask sizes differ.

25
TODO
View file

@ -1,9 +1,16 @@
Things left to do to make cabal superstable: Todo list (in no specific order):
--------------------------------------------
* Check for connection loops. Inter-daemon * Compression
connections should always satisfy the * Routing by MAC (allows for more than only IPv4)
tree property. * Store private key in a separate file
* Redundancy: multiple ConnectTo lines, if * Sanity checks on configuration directory
one fails others might be tried. * Use efficient tree algorithms instead of linked lists
* Allow connects to hosts that use * Reenable queues for delayed packets
nodirectdata. * Broadcast/multicast
* Windowing, chaffing, scattering, background noise
* ABC protocol (superscalabilty)
* Proxy ARP
* Eazy setup scripts (graphical?)
* FreeBSD and Solaris ports
* Threading
* Everything else not mentioned.