6
I Use This!
Inactive

News

Analyzed 3 days ago. based on code collected over 1 year ago.
Posted almost 14 years ago
Version 1.0.14 released. Fixed reading configuration files that do not end with a newline. Again. Allow arbitrary configuration options being specified on the command line. Allow all options in both tinc.conf and the local host config file. ... [More] Configurable replay window, UDP send and receive buffers for performance tuning. Try harder to get UDP communication back after falling back to TCP. Initial support for attaching tinc to a VDE switch. DragonFly BSD support. Allow linking with OpenSSL 1.0.0. Thanks to Brandon Black, Julien Muchembled, Michael Tokarev, Rumko and Timothy Redaelli for their contributions to this version of tinc. [Less]
Posted about 14 years ago
At FOSDEM 2011, on Sunday morning February 6, there will be three tinc related talks in the New challenges in Virtualization devroom: 10:00 Brandon Black: “Building VPNs in EC2” 10:20 Guus Sliepen: “The difficulties of a peer-to-peer VPN on the ... [More] hostile Internet” 11:00 Saverio Proto: “FairVPN - Fairness-oriented Overlay VPN topology construction” You are invited to come by and discuss tinc, VPNs and other virtualization issues here. [Less]
Posted about 14 years ago
A clone of the official tinc repository is now available at GitHub: https://github.com/gsliepen/tinc Developers can use this to make their own public “fork” of the git repository, and push their own commits to GitHub. One can still send regular patches or use other git workflows.
Posted over 14 years ago
At FOSDEM 2011, we will be present in the devroom New challenges in Virtualization. You are invited to come by and discuss tinc, VPNs and other virtualization issues here. FOSDEM 2011 will take place on February 5 and 6 in Brussels, Belgium.
Posted almost 15 years ago
Version 1.0.13 released. Allow building tinc without LZO and/or Zlib. Clamp MSS of TCP packets in both directions. Experimental StrictSubnets, Forwarding and DirectOnly options, giving more control over information and packets received from/sent to other nodes. Ensure tinc never sends symbolic names for ports over the wire.
Posted about 15 years ago
The slides from the FOSDEM 2010 lightning talk are now online.
Posted about 15 years ago
Version 1.0.12 released. Really allow fast roaming of hosts to other nodes in a switched VPN. Fixes missing or incorrect environment variables when calling host-up/down and subnet-up/down scripts in some cases. Allow port to be specified in Address ... [More] statements. Clamp MSS of TCP packets to the discovered path MTU. Let two nodes behind NAT learn each others current UDP address and port via a third node, potentially allowing direct communications in a similar way to STUN. The Windows installer now includes both 32 bit and 64 bit TAP drivers. [Less]
Posted about 15 years ago
At FOSDEM 2010, I will give a lightning talk titled “tinc: the difficulties of a peer-to-peer VPN on the hostile Internet”. The talk will probably be on Saturday 7th of Februari at 15:20 CET, but this might still change.
Posted over 15 years ago
Version 1.0.11 released. Fixed potential crash when the HUP signal is sent. Fixes handling of weighted Subnets in switch and hub modes, preventing unnecessary broadcasts. Works around a MinGW bug that caused packets to Windows nodes to always be ... [More] sent via TCP. Improvements to the PMTU discovery code, especially on Windows. Use UDP again in certain cases where 1.0.10 was too conservative and fell back to TCP unnecessarily. Allow fast roaming of hosts to other nodes in a switched VPN. [Less]
Posted over 15 years ago
Version 1.0.10 released. Fixed potential crashes during shutdown and (in rare conditions) when other nodes disconnected from the VPN. Improved NAT handling: tinc now copes with mangled port numbers, and will automatically fall back to TCP if direct ... [More] UDP connection between nodes is not possible. The TCPOnly option should not have to be used anymore. Allow configuration files with CRLF line endings to be read on UNIX. Disable old RSA keys when generating new ones, and raise the default size of new RSA keys to 2048 bits. Many fixes in the path MTU discovery code, especially when Compression is being used. Tinc can now drop privileges and/or chroot itself. The TunnelServer code now just ignores information from clients instead of disconnecting them. Improved performance on Windows by using the new ProcessPriority option and by making the handling of packets received from the TAP-Win32 adapter more efficient. Code cleanups: tinc now follows the C99 standard, copyright headers have been updated to include patch authors, checkpoint tracing and localisation features have been removed. Support for (jailbroken) iPhone and iPod Touch has been added. [Less]