On Saturday 05 Dec 2015 14:31:57 Neil Bothwick wrote: > On Sat, 5 Dec 2015 14:13:00 +0000, Mick wrote: > > Neil, could you please spare a couple of words to explain how the > > zerotier architecture works? > > I can do it in one word - magic!
:-) > It's basically a P2P VPN. You set up a network on the controller and then > join it from various machines. Those machines register with the network > controller, and receive an IP address from it, but the actual > communication is direct between the computers. So your data is private > and if both computers are on the same LAN, you still get full LAN speed > between them. > > It use a TUN/TAP interface, for example on this laptop: > > zt0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 2800 > inet 10.252.252.6 netmask 255.255.255.0 broadcast 10.252.252.255 > ether 46:96:8c:9c:02:e1 txqueuelen 500 (Ethernet) So is this a userspace tunnel implementation, with the controller playing the role of a remote VPN gateway? Like OpenVPN? What encryption does it use? > So I can connect to 10.252.252.6 from any computer on my zerotier > network, but you cannot. You may even have the same IP address for one of > the computers on your network. > > It's open source and if you want optimum security, or want to run a > network of more than 10 computers without paying a fee, you can run your > own controller. Wouldn't IPSec be more preferable? I'm trying to understand the benefit/need for yet another tunneling solution. -- Regards, Mick
signature.asc
Description: This is a digitally signed message part.