Go to file
2015-10-09 18:17:35 +02:00
freebsd Update copyrights. 2008-01-07 22:35:18 +00:00
generic rfe2636157 - Permit a delayed UDP connection to overcome unpredictable 2009-03-29 10:08:41 +00:00
linux Update copyrights. 2008-01-07 22:35:18 +00:00
openbsd Update copyrights. 2008-01-07 22:35:18 +00:00
packages Dropped a note into the SPEC to remind for arbitrary variable changes 2013-07-07 18:03:49 +00:00
scripts rfe1744575 - cfg_file.y bugs (mf) 2007-06-29 05:25:45 +00:00
svr4 Update copyrights. 2008-01-07 22:35:18 +00:00
.cvsignore more bits 2012-07-07 05:17:54 +00:00
.gitignore Import vtun.drivers, add an autogen.sh script to create autoconf files 2015-10-08 00:43:56 +02:00
aclocal.m4 buy back changes from rfe2711212 - recompile bug 2012-07-09 01:11:08 +00:00
auth.c fix use of an unallocated variable 2015-10-09 18:17:35 +02:00
auth.h Port to libsodium, switch to AES256-GCM, revamp authentication 2015-10-09 02:24:01 +02:00
autogen.sh Import vtun.drivers, add an autogen.sh script to create autoconf files 2015-10-08 00:43:56 +02:00
cfg_file.l Update copyrights. 2008-01-07 22:35:18 +00:00
cfg_file.y Port to libsodium, switch to AES256-GCM, revamp authentication 2015-10-09 02:24:01 +02:00
cfg_kwords.h Port to libsodium, switch to AES256-GCM, revamp authentication 2015-10-09 02:24:01 +02:00
ChangeLog bug53 - attribute fix properly to AHeisner 2013-07-07 20:24:07 +00:00
client.c 2951972 - make vtund quiet about connections (Sean MacLennan) 2012-07-08 05:32:57 +00:00
compat.h Update copyrights. 2008-01-07 22:35:18 +00:00
configure.ac Port to libsodium, switch to AES256-GCM, revamp authentication 2015-10-09 02:24:01 +02:00
Credits bug53 - attribute fix properly to AHeisner 2013-07-07 20:24:07 +00:00
driver.h Buy in rfe3561826/bug32/pbz5668 code to add an %h macro to up/downs 2013-07-07 20:36:33 +00:00
lfd_encrypt.c Untab 2015-10-09 13:21:10 +02:00
lfd_lzo.c Merge changes from Andrey Mazo: 2013-07-07 19:54:20 +00:00
lfd_shaper.c Merge changes from Andrey Mazo: 2013-07-07 19:54:20 +00:00
lfd_zlib.c Merge changes from Andrey Mazo: 2013-07-07 19:54:20 +00:00
lib.c Buy in changes to fix bug53 - race condition in socket - patch from alfred heisner 2013-07-07 20:21:20 +00:00
lib.h Merge changes from Andrey Mazo: 2013-07-07 19:54:20 +00:00
linkfd.c Remove utterly broken and already deprecated legacy VTUN encryption 2015-10-08 12:38:13 +02:00
linkfd.h Update copyrights. 2008-01-07 22:35:18 +00:00
llist.c Update copyrights. 2008-01-07 22:35:18 +00:00
llist.h Update copyrights. 2008-01-07 22:35:18 +00:00
lock.c Update copyrights. 2008-01-07 22:35:18 +00:00
lock.h Update copyrights. 2008-01-07 22:35:18 +00:00
main.c if the password supplied is 32 bit long, we should use it AS if 2015-10-09 18:00:06 +02:00
Makefile.in Remove legacy_encrypt form the Makefile template 2015-10-08 13:08:28 +02:00
netlib.c Argh. Fix a missing declaration. 2009-03-29 10:44:02 +00:00
netlib.h Update copyrights. 2008-01-07 22:35:18 +00:00
README Update copyrights. 2008-01-07 22:35:18 +00:00
README.md Describe changes 2015-10-09 10:11:57 +02:00
server.c if the password supplied is 32 bit long, we should use it AS if 2015-10-09 18:00:06 +02:00
TODO pre-release pokes 2012-07-09 05:01:05 +00:00
tunnel.c Merge changes from Andrey Mazo: 2013-07-07 19:54:20 +00:00
vtun_socks.h Update copyrights. 2008-01-07 22:35:18 +00:00
vtun.drivers Import vtun.drivers, add an autogen.sh script to create autoconf files 2015-10-08 00:43:56 +02:00
vtun.h Port to libsodium, switch to AES256-GCM, revamp authentication 2015-10-09 02:24:01 +02:00
vtund.8 2951972 - make vtund quiet about connections (Sean MacLennan) 2012-07-08 05:32:57 +00:00
vtund.conf Port to libsodium, switch to AES256-GCM, revamp authentication 2015-10-09 02:24:01 +02:00
vtund.conf.5 Port to libsodium, switch to AES256-GCM, revamp authentication 2015-10-09 02:24:01 +02:00

This is a fork of VTUN, with the following changes:

  • OpenSSL was replaced by Libsodium (this currently requires the aes256gcm branch).

  • Unauthenticated encryption schemes were replaced with aesni and pclmulqdq-accelerated AES256-GCM.

  • Protection against replay attacks was added.

  • More secure key derivation and initial handshake.

  • Passwords are not kept in memory.

  • Guarded memory allocations for secrets.