1 |
On Sunday 06 Dec 2015 09:24:51 Neil Bothwick wrote: |
2 |
> On Sat, 5 Dec 2015 18:49:16 +0000, Mick wrote: |
3 |
> > > It's basically a P2P VPN. You set up a network on the controller and |
4 |
> > > then join it from various machines. Those machines register with the |
5 |
> > > network controller, and receive an IP address from it, but the actual |
6 |
> > > communication is direct between the computers. So your data is private |
7 |
> > > and if both computers are on the same LAN, you still get full LAN |
8 |
> > > speed between them. |
9 |
> > > |
10 |
> > > It use a TUN/TAP interface, for example on this laptop: |
11 |
> > > |
12 |
> > > zt0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 2800 |
13 |
> > > |
14 |
> > > inet 10.252.252.6 netmask 255.255.255.0 broadcast |
15 |
> > > |
16 |
> > > 10.252.252.255 ether 46:96:8c:9c:02:e1 txqueuelen 500 (Ethernet) |
17 |
> > |
18 |
> > So is this a userspace tunnel implementation, with the controller |
19 |
> > playing the role of a remote VPN gateway? Like OpenVPN? |
20 |
> |
21 |
> The controller is not a gateway, it is only used to connect the computers |
22 |
> initially. It's more like a bittorrent tracker or DNS server, it |
23 |
> facilitates the connection but doesn't see any of it. |
24 |
> |
25 |
> > What encryption does it use? |
26 |
> |
27 |
> From https://www.zerotier.com/tech_faq.shtml |
28 |
> |
29 |
> ZeroTier currently uses 256-bit Curve25519 elliptic curve Diffie-Hellman |
30 |
> for shared key agreement and Ed25519 for elliptic curve signatures. |
31 |
> 256-bit Salsa20 with Poly1305 authentication is used to encrypt traffic |
32 |
> in transit. The construction and use of these algorithms is identical to |
33 |
> the well-regarded NaCl cryptographic library. |
34 |
> |
35 |
> > > So I can connect to 10.252.252.6 from anycomputer on my zerotier |
36 |
> > > network, but you cannot. You may even have the same IP address for |
37 |
> > > one of the computers on your network. |
38 |
> > > |
39 |
> > > It's open source and if you want optimum security, or want to run a |
40 |
> > > network of more than 10 computers without paying a fee, you can run |
41 |
> > > your own controller. |
42 |
> > |
43 |
> > Wouldn't IPSec be more preferable? I'm trying to understand the |
44 |
> > benefit/need for yet another tunneling solution. |
45 |
> |
46 |
> Ease of use and maintenance and flexibility. Creating a network takes |
47 |
> seconds, adding a client takes a few more, and you can use it all the |
48 |
> time, even if you are already connected to your physical network. |
49 |
|
50 |
Thank you Neil! I couldn't find the FAQ page when I had a cursory look at the |
51 |
beginning. This looks like a very flexible and quite secure option for |
52 |
tunnelling connections, especially as they plan to implement PFS in the near |
53 |
future. From what I read here I am not sure if the initial generation of each |
54 |
device's keys can be controlled by the end user, but even so zerotier still |
55 |
has a good security model. |
56 |
|
57 |
-- |
58 |
Regards, |
59 |
Mick |