Previous:
About us
, Up:
Top
[
Contents
][
Index
]
Concept Index
Jump to:
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
R
S
T
U
V
W
Z
Index Entry
Section
A
ACK
:
Legacy authentication protocol
add
:
tinc commands
Address
:
Host configuration variables
AddressFamily
:
Main configuration variables
ADD_EDGE
:
The meta-protocol
ADD_SUBNET
:
The meta-protocol
ANS_KEY
:
The meta-protocol
AutoConnect
:
Main configuration variables
B
batch
:
tinc runtime options
binary package
:
Building and installing tinc
BindToAddress
:
Main configuration variables
BindToInterface
:
Main configuration variables
Broadcast
:
Main configuration variables
BroadcastSubnet
:
Main configuration variables
C
Cabal
:
Security
CHALLENGE
:
Legacy authentication protocol
CHAL_REPLY
:
Legacy authentication protocol
CIDR notation
:
Host configuration variables
Cipher
:
Host configuration variables
ClampMSS
:
Host configuration variables
client
:
How connections work
command line
:
Runtime options
command line interface
:
Controlling tinc
Compression
:
Host configuration variables
connection
:
The connection
ConnectTo
:
Main configuration variables
D
daemon
:
Running tinc
data-protocol
:
The meta-connection
debug
:
tinc commands
debug level
:
Runtime options
debug levels
:
Debug levels
DecrementTTL
:
Main configuration variables
del
:
tinc commands
DEL_EDGE
:
The meta-protocol
DEL_SUBNET
:
The meta-protocol
Device
:
Main configuration variables
DEVICE
:
Scripts
device files
:
Device files
DeviceStandby
:
Main configuration variables
DeviceType
:
Main configuration variables
Digest
:
Host configuration variables
DirectOnly
:
Main configuration variables
disconnect
:
tinc commands
dummy
:
Main configuration variables
dump
:
tinc commands
E
Ed25519PrivateKeyFile
:
Main configuration variables
edit
:
tinc commands
encapsulating
:
The UDP tunnel
encryption
:
Encryption of network packets
environment variables
:
Scripts
example
:
Example configuration
exchange
:
tinc commands
exchange-all
:
tinc commands
exec
:
Main configuration variables
ExperimentalProtocol
:
Main configuration variables
export
:
tinc commands
export-all
:
tinc commands
F
fd
:
Main configuration variables
Forwarding
:
Main configuration variables
frame type
:
The UDP tunnel
fsck
:
tinc commands
FWMark
:
Main configuration variables
G
generate-ed25519-keys
:
tinc commands
generate-keys
:
tinc commands
generate-rsa-keys
:
tinc commands
get
:
tinc commands
graph
:
tinc commands
H
Hostnames
:
Main configuration variables
http
:
Main configuration variables
hub
:
Main configuration variables
I
ID
:
Legacy authentication protocol
Ifconfig
:
Invitation file format
import
:
tinc commands
IndirectData
:
Host configuration variables
info
:
tinc commands
init
:
tinc commands
Interface
:
Main configuration variables
INTERFACE
:
Scripts
InvitationExpire
:
Main configuration variables
INVITATION_FILE
:
Scripts
INVITATION_URL
:
Scripts
invite
:
tinc commands
IRC
:
Contact information
J
join
:
tinc commands
K
KeyExpire
:
Main configuration variables
KEY_CHANGED
:
The meta-protocol
L
legacy authentication protocol
:
Legacy authentication protocol
libcurses
:
libcurses
libraries
:
Libraries
libreadline
:
libreadline
LibreSSL
:
LibreSSL/OpenSSL
license
:
LibreSSL/OpenSSL
ListenAddress
:
Main configuration variables
LocalDiscovery
:
Main configuration variables
log
:
tinc commands
LogLevel
:
Main configuration variables
LZO
:
LZO
M
MACExpire
:
Main configuration variables
MACLength
:
Host configuration variables
MaxConnectionBurst
:
Main configuration variables
meta-protocol
:
The meta-connection
META_KEY
:
Legacy authentication protocol
Mode
:
Main configuration variables
MTUInfoInterval
:
Host configuration variables
multicast
:
Main configuration variables
multiple networks
:
Multiple networks
N
Name
:
Main configuration variables
NAME
:
Scripts
netmask
:
Network interfaces
netname
:
Multiple networks
NETNAME
:
Scripts
NETNAME
:
tinc environment variables
network
:
tinc commands
Network Administrators Guide
:
Configuration introduction
NODE
:
Scripts
O
OpenSSL
:
LibreSSL/OpenSSL
options
:
Runtime options
P
pcap
:
tinc commands
PEM format
:
Host configuration variables
pid
:
tinc commands
PING
:
The meta-protocol
PingInterval
:
Main configuration variables
PingTimeout
:
Main configuration variables
platforms
:
Supported platforms
PMTU
:
Host configuration variables
PMTUDiscovery
:
Host configuration variables
PONG
:
The meta-protocol
Port
:
Host configuration variables
port numbers
:
Other files
PriorityInheritance
:
Main configuration variables
private
:
Virtual Private Networks
PrivateKey
:
Main configuration variables
PrivateKeyFile
:
Main configuration variables
ProcessPriority
:
Main configuration variables
Proxy
:
Main configuration variables
PublicKey
:
Host configuration variables
PublicKeyFile
:
Host configuration variables
purge
:
tinc commands
R
raw_socket
:
Main configuration variables
release
:
Supported platforms
reload
:
tinc commands
REMOTEADDRESS
:
Scripts
REMOTEPORT
:
Scripts
ReplayWindow
:
Main configuration variables
requirements
:
Libraries
REQ_KEY
:
The meta-protocol
restart
:
tinc commands
retry
:
tinc commands
Route
:
Invitation file format
router
:
Main configuration variables
runtime options
:
Runtime options
S
scalability
:
tinc
scripts
:
Scripts
server
:
How connections work
set
:
tinc commands
shell
:
Controlling tinc
sign
:
tinc commands
signals
:
Signals
socks4
:
Main configuration variables
socks5
:
Main configuration variables
SPTPS
:
Simple Peer-to-Peer Security
start
:
tinc commands
stop
:
tinc commands
StrictSubnets
:
Main configuration variables
Subnet
:
Host configuration variables
SUBNET
:
Scripts
SVPN
:
Security
switch
:
Main configuration variables
systemd
:
Linux
T
TCP
:
The meta-connection
TCPonly
:
Host configuration variables
tinc
:
Introduction
TINC
:
Security
tinc-down
:
Scripts
tinc-up
:
Scripts
tinc-up
:
Network interfaces
tincd
:
tinc
top
:
tinc commands
top
:
tinc top
traditional VPNs
:
tinc
tunifhead
:
Main configuration variables
TunnelServer
:
Main configuration variables
tunnohead
:
Main configuration variables
U
UDP
:
The UDP tunnel
UDP
:
Encryption of network packets
UDPDiscoveryInterval
:
Main configuration variables
UDPDiscoveryKeepaliveInterval
:
Main configuration variables
UDPDiscoveryTimeout
:
Main configuration variables
UDPDiscovey
:
Main configuration variables
UDPInfoInterval
:
Main configuration variables
UDPRcvBuf
:
Main configuration variables
UDPSndBuf
:
Main configuration variables
UML
:
Main configuration variables
Universal tun/tap
:
Configuration of Linux kernels
UPnP
:
Main configuration variables
UPnPDiscoverWait
:
Main configuration variables
UPnPRefreshPeriod
:
Main configuration variables
utun
:
Main configuration variables
V
VDE
:
Main configuration variables
verify
:
tinc commands
virtual
:
Virtual Private Networks
virtual network device
:
The UDP tunnel
VPN
:
Virtual Private Networks
vpnd
:
tinc
W
website
:
Contact information
Weight
:
Host configuration variables
WEIGHT
:
Scripts
Z
zlib
:
zlib
Jump to:
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
R
S
T
U
V
W
Z
Table of Contents
1 Introduction
1.1 Virtual Private Networks
1.2 tinc
1.3 Supported platforms
2 Preparations
2.1 Configuring the kernel
2.1.1 Configuration of Linux kernels
2.1.2 Configuration of FreeBSD kernels
2.1.3 Configuration of OpenBSD kernels
2.1.4 Configuration of NetBSD kernels
2.1.5 Configuration of Solaris kernels
2.1.6 Configuration of Darwin (MacOS/X) kernels
2.1.7 Configuration of Windows
2.2 Libraries
2.2.1 LibreSSL/OpenSSL
2.2.2 zlib
2.2.3 LZO
2.2.4 libcurses
2.2.5 libreadline
3 Installation
3.1 Building and installing tinc
3.1.1 Darwin (MacOS/X) build environment
3.1.2 MinGW (Windows) build environment
3.2 System files
3.2.1 Device files
3.2.2 Other files
4 Configuration
4.1 Configuration introduction
4.2 Multiple networks
4.3 How connections work
4.4 Configuration files
4.4.1 Main configuration variables
4.4.2 Host configuration variables
4.4.3 Scripts
4.4.4 How to configure
4.5 Network interfaces
4.6 Example configuration
5 Running tinc
5.1 Runtime options
5.2 Signals
5.3 Debug levels
5.4 Solving problems
5.5 Error messages
5.6 Sending bug reports
6 Controlling tinc
6.1 tinc runtime options
6.2 tinc environment variables
6.3 tinc commands
6.4 tinc examples
6.5 tinc top
7 Invitations
7.1 How invitations work
7.2 Invitation file format
7.3 Writing an invitation-created script
8 Technical information
8.1 The connection
8.1.1 The UDP tunnel
8.1.2 The meta-connection
8.2 The meta-protocol
8.3 Security
8.3.1 Legacy authentication protocol
8.3.2 Simple Peer-to-Peer Security
8.3.3 Encryption of network packets
8.3.4 Security issues
9 Platform specific information
9.1 Interface configuration
9.2 Routes
9.3 Automatically starting tinc
9.3.1 Linux
9.3.2 Windows
9.3.3 Other platforms
10 About us
10.1 Contact information
10.2 Authors
Concept Index
Previous:
About us
, Up:
Top
[
Contents
][
Index
]