1 |
On Sat, 5 Dec 2015 18:49:16 +0000, Mick wrote: |
2 |
|
3 |
> > It's basically a P2P VPN. You set up a network on the controller and |
4 |
> > then join it from various machines. Those machines register with the |
5 |
> > network controller, and receive an IP address from it, but the actual |
6 |
> > communication is direct between the computers. So your data is private |
7 |
> > and if both computers are on the same LAN, you still get full LAN |
8 |
> > speed between them. |
9 |
> > |
10 |
> > It use a TUN/TAP interface, for example on this laptop: |
11 |
> > |
12 |
> > zt0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 2800 |
13 |
> > inet 10.252.252.6 netmask 255.255.255.0 broadcast |
14 |
> > 10.252.252.255 ether 46:96:8c:9c:02:e1 txqueuelen 500 (Ethernet) |
15 |
> |
16 |
> So is this a userspace tunnel implementation, with the controller |
17 |
> playing the role of a remote VPN gateway? Like OpenVPN? |
18 |
|
19 |
The controller is not a gateway, it is only used to connect the computers |
20 |
initially. It's more like a bittorrent tracker or DNS server, it |
21 |
facilitates the connection but doesn't see any of it. |
22 |
|
23 |
> What encryption does it use? |
24 |
|
25 |
From https://www.zerotier.com/tech_faq.shtml |
26 |
|
27 |
ZeroTier currently uses 256-bit Curve25519 elliptic curve Diffie-Hellman |
28 |
for shared key agreement and Ed25519 for elliptic curve signatures. |
29 |
256-bit Salsa20 with Poly1305 authentication is used to encrypt traffic |
30 |
in transit. The construction and use of these algorithms is identical to |
31 |
the well-regarded NaCl cryptographic library. |
32 |
|
33 |
> > So I can connect to 10.252.252.6 from anycomputer on my zerotier |
34 |
> > network, but you cannot. You may even have the same IP address for |
35 |
> > one of the computers on your network. |
36 |
> > |
37 |
> > It's open source and if you want optimum security, or want to run a |
38 |
> > network of more than 10 computers without paying a fee, you can run |
39 |
> > your own controller. |
40 |
> |
41 |
> Wouldn't IPSec be more preferable? I'm trying to understand the |
42 |
> benefit/need for yet another tunneling solution. |
43 |
|
44 |
Ease of use and maintenance and flexibility. Creating a network takes |
45 |
seconds, adding a client takes a few more, and you can use it all the |
46 |
time, even if you are already connected to your physical network. |
47 |
|
48 |
|
49 |
-- |
50 |
Neil Bothwick |
51 |
|
52 |
Top Oxymorons Number 39: Almost exactly |