On Saturday 05 Dec 2015 14:31:57 Neil Bothwick wrote:
> On Sat, 5 Dec 2015 14:13:00 +0000, Mick wrote:
> > Neil, could you please spare a couple of words to explain how the
> > zerotier architecture works?
> 
> I can do it in one word - magic!

:-)


> It's basically a P2P VPN. You set up a network on the controller and then
> join it from various machines. Those machines register with the network
> controller, and receive an IP address from it, but the actual
> communication is direct between the computers. So your data is private
> and if both computers are on the same LAN, you still get full LAN speed
> between them.
> 
> It use a TUN/TAP interface, for example on this laptop:
> 
> zt0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 2800
>         inet 10.252.252.6  netmask 255.255.255.0  broadcast 10.252.252.255
>         ether 46:96:8c:9c:02:e1  txqueuelen 500  (Ethernet)

So is this a userspace tunnel implementation, with the controller playing the 
role of a remote VPN gateway?  Like OpenVPN?  What encryption does it use?
 

> So I can connect to 10.252.252.6 from any computer on my zerotier
> network, but you cannot. You may even have the same IP address for one of
> the computers on your network.
> 
> It's open source and if you want optimum security, or want to run a
> network of more than 10 computers without paying a fee, you can run your
> own controller.

Wouldn't IPSec be more preferable?  I'm trying to understand the benefit/need 
for yet another tunneling solution.
-- 
Regards,
Mick

Attachment: signature.asc
Description: This is a digitally signed message part.

Reply via email to