Previous:
About us
, Up:
Top
Concept Index
ACK
:
Legacy authentication protocol
add
:
tinc commands
ADD_EDGE
:
The meta-protocol
ADD_SUBNET
:
The meta-protocol
Address
:
Host configuration variables
AddressFamily
:
Main configuration variables
ANS_KEY
:
The meta-protocol
AutoConnect
:
Main configuration variables
binary package
:
Building and installing tinc
BindToAddress
:
Main configuration variables
BindToInterface
:
Main configuration variables
Broadcast
:
Main configuration variables
BroadcastSubnet
:
Main configuration variables
Cabal
:
Security
CHAL_REPLY
:
Legacy authentication protocol
CHALLENGE
:
Legacy authentication protocol
CIDR notation
:
Host configuration variables
Cipher
:
Host configuration variables
ClampMSS
:
Host configuration variables
client
:
How connections work
command line
:
Runtime options
command line interface
:
Controlling tinc
Compression
:
Host configuration variables
connection
:
The connection
ConnectTo
:
Main configuration variables
daemon
:
Running tinc
data-protocol
:
The meta-connection
debug
:
tinc commands
debug level
:
Runtime options
debug levels
:
Debug levels
DecrementTTL
:
Main configuration variables
del
:
tinc commands
DEL_EDGE
:
The meta-protocol
DEL_SUBNET
:
The meta-protocol
DEVICE
:
Scripts
Device
:
Main configuration variables
device files
:
Device files
DeviceStandby
:
Main configuration variables
DeviceType
:
Main configuration variables
Digest
:
Host configuration variables
DirectOnly
:
Main configuration variables
disconnect
:
tinc commands
dummy
:
Main configuration variables
dump
:
tinc commands
Ed25519PrivateKeyFile
:
Main configuration variables
edit
:
tinc commands
encapsulating
:
The UDP tunnel
encryption
:
Encryption of network packets
environment variables
:
Scripts
example
:
Example configuration
exchange
:
tinc commands
exchange-all
:
tinc commands
exec
:
Main configuration variables
ExperimentalProtocol
:
Main configuration variables
export
:
tinc commands
export-all
:
tinc commands
Forwarding
:
Main configuration variables
frame type
:
The UDP tunnel
fsck
:
tinc commands
generate-ed25519-keys
:
tinc commands
generate-keys
:
tinc commands
generate-rsa-keys
:
tinc commands
get
:
tinc commands
graph
:
tinc commands
Hostnames
:
Main configuration variables
http
:
Main configuration variables
hub
:
Main configuration variables
ID
:
Legacy authentication protocol
Ifconfig
:
Invitation file format
import
:
tinc commands
IndirectData
:
Host configuration variables
info
:
tinc commands
init
:
tinc commands
INTERFACE
:
Scripts
Interface
:
Main configuration variables
INVITATION_FILE
:
Scripts
INVITATION_URL
:
Scripts
invite
:
tinc commands
IRC
:
Contact information
join
:
tinc commands
KEY_CHANGED
:
The meta-protocol
KeyExpire
:
Main configuration variables
legacy authentication protocol
:
Legacy authentication protocol
libcurses
:
libcurses
libraries
:
Libraries
libreadline
:
libreadline
LibreSSL
:
LibreSSL/OpenSSL
license
:
LibreSSL/OpenSSL
ListenAddress
:
Main configuration variables
LocalDiscovery
:
Main configuration variables
LocalDiscoveryAddress
:
Main configuration variables
log
:
tinc commands
lzo
:
lzo
MACExpire
:
Main configuration variables
MACLength
:
Host configuration variables
MaxConnectionBurst
:
Main configuration variables
meta-protocol
:
The meta-connection
META_KEY
:
Legacy authentication protocol
Mode
:
Main configuration variables
MTUInfoInterval
:
Host configuration variables
multicast
:
Main configuration variables
multiple networks
:
Multiple networks
NAME
:
Scripts
Name
:
Main configuration variables
netmask
:
Network interfaces
NETNAME
:
tinc environment variables
NETNAME
:
Scripts
netname
:
Multiple networks
network
:
tinc commands
Network Administrators Guide
:
Configuration introduction
NODE
:
Scripts
OpenSSL
:
LibreSSL/OpenSSL
options
:
Runtime options
pcap
:
tinc commands
PEM format
:
Host configuration variables
pid
:
tinc commands
PING
:
The meta-protocol
PingInterval
:
Main configuration variables
PingTimeout
:
Main configuration variables
platforms
:
Supported platforms
PMTU
:
Host configuration variables
PMTUDiscovery
:
Host configuration variables
PONG
:
The meta-protocol
Port
:
Host configuration variables
port numbers
:
Other files
PriorityInheritance
:
Main configuration variables
private
:
Virtual Private Networks
PrivateKey
:
Main configuration variables
PrivateKeyFile
:
Main configuration variables
ProcessPriority
:
Main configuration variables
Proxy
:
Main configuration variables
PublicKey
:
Host configuration variables
PublicKeyFile
:
Host configuration variables
purge
:
tinc commands
raw_socket
:
Main configuration variables
release
:
Supported platforms
reload
:
tinc commands
REMOTEADDRESS
:
Scripts
REMOTEPORT
:
Scripts
ReplayWindow
:
Main configuration variables
REQ_KEY
:
The meta-protocol
requirements
:
Libraries
restart
:
tinc commands
retry
:
tinc commands
Route
:
Invitation file format
router
:
Main configuration variables
runtime options
:
Runtime options
scalability
:
tinc
scripts
:
Scripts
server
:
How connections work
set
:
tinc commands
shell
:
Controlling tinc
sign
:
tinc commands
signals
:
Signals
socks4
:
Main configuration variables
socks5
:
Main configuration variables
SPTPS
:
Simple Peer-to-Peer Security
start
:
tinc commands
stop
:
tinc commands
StrictSubnets
:
Main configuration variables
SUBNET
:
Scripts
Subnet
:
Host configuration variables
SVPN
:
Security
switch
:
Main configuration variables
TCP
:
The meta-connection
TCPonly
:
Host configuration variables
TINC
:
Security
tinc
:
Introduction
tinc-down
:
Scripts
tinc-up
:
Network interfaces
tinc-up
:
Scripts
tincd
:
tinc
top
:
tinc top
top
:
tinc commands
traditional VPNs
:
tinc
tunifhead
:
Main configuration variables
TunnelServer
:
Main configuration variables
tunnohead
:
Main configuration variables
UDP
:
Encryption of network packets
UDP
:
The UDP tunnel
UDPDiscoveryInterval
:
Main configuration variables
UDPDiscoveryKeepaliveInterval
:
Main configuration variables
UDPDiscoveryTimeout
:
Main configuration variables
UDPDiscovey
:
Main configuration variables
UDPInfoInterval
:
Main configuration variables
UDPRcvBuf
:
Main configuration variables
UDPSndBuf
:
Main configuration variables
UML
:
Main configuration variables
Universal tun/tap
:
Configuration of Linux kernels
UPnP
:
Main configuration variables
UPnPDiscoverWait
:
Main configuration variables
UPnPRefreshPeriod
:
Main configuration variables
utun
:
Main configuration variables
VDE
:
Main configuration variables
verify
:
tinc commands
virtual
:
Virtual Private Networks
virtual network device
:
The UDP tunnel
VPN
:
Virtual Private Networks
vpnd
:
tinc
website
:
Contact information
WEIGHT
:
Scripts
Weight
:
Host configuration variables
zlib
:
zlib
Table of Contents
Top
1 Introduction
1.1 Virtual Private Networks
1.2 tinc
1.3 Supported platforms
2 Preparations
2.1 Configuring the kernel
2.1.1 Configuration of Linux kernels
2.1.2 Configuration of FreeBSD kernels
2.1.3 Configuration of OpenBSD kernels
2.1.4 Configuration of NetBSD kernels
2.1.5 Configuration of Solaris kernels
2.1.6 Configuration of Darwin (MacOS/X) kernels
2.1.7 Configuration of Windows
2.2 Libraries
2.2.1 LibreSSL/OpenSSL
2.2.2 zlib
2.2.3 lzo
2.2.4 libcurses
2.2.5 libreadline
3 Installation
3.1 Building and installing tinc
3.1.1 Darwin (MacOS/X) build environment
3.1.2 Cygwin (Windows) build environment
3.1.3 MinGW (Windows) build environment
3.2 System files
3.2.1 Device files
3.2.2 Other files
4 Configuration
4.1 Configuration introduction
4.2 Multiple networks
4.3 How connections work
4.4 Configuration files
4.4.1 Main configuration variables
4.4.2 Host configuration variables
4.4.3 Scripts
4.4.4 How to configure
4.5 Network interfaces
4.6 Example configuration
5 Running tinc
5.1 Runtime options
5.2 Signals
5.3 Debug levels
5.4 Solving problems
5.5 Error messages
5.6 Sending bug reports
6 Controlling tinc
6.1 tinc runtime options
6.2 tinc environment variables
6.3 tinc commands
6.4 tinc examples
6.5 tinc top
7 Invitations
7.1 How invitations work
7.2 Invitation file format
7.3 Writing an invitation-created script
8 Technical information
8.1 The connection
8.1.1 The UDP tunnel
8.1.2 The meta-connection
8.2 The meta-protocol
8.3 Security
8.3.1 Legacy authentication protocol
8.3.2 Simple Peer-to-Peer Security
8.3.3 Encryption of network packets
8.3.4 Security issues
9 Platform specific information
9.1 Interface configuration
9.2 Routes
10 About us
10.1 Contact information
10.2 Authors
Concept Index