Go to file
Frank Denis 6165edf789 Try to guess what the intent was 2015-10-17 17:30:42 +02:00
freebsd Update copyrights. 2008-01-07 22:35:18 +00:00
generic Replace a couple sprintf() with snprintf() 2015-10-17 17:14:19 +02:00
linux Update copyrights. 2008-01-07 22:35:18 +00:00
openbsd Update copyrights. 2008-01-07 22:35:18 +00:00
packages Dropped a note into the SPEC to remind for arbitrary variable changes 2013-07-07 18:03:49 +00:00
scripts rfe1744575 - cfg_file.y bugs (mf) 2007-06-29 05:25:45 +00:00
svr4 Update copyrights. 2008-01-07 22:35:18 +00:00
.cvsignore more bits 2012-07-07 05:17:54 +00:00
.gitignore Import vtun.drivers, add an autogen.sh script to create autoconf files 2015-10-08 00:43:56 +02:00
ChangeLog bug53 - attribute fix properly to AHeisner 2013-07-07 20:24:07 +00:00
Credits bug53 - attribute fix properly to AHeisner 2013-07-07 20:24:07 +00:00
Makefile.in Remove legacy_encrypt form the Makefile template 2015-10-08 13:08:28 +02:00
README Update copyrights. 2008-01-07 22:35:18 +00:00
README.md Nits 2015-10-17 17:02:15 +02:00
TODO pre-release pokes 2012-07-09 05:01:05 +00:00
aclocal.m4 buy back changes from rfe2711212 - recompile bug 2012-07-09 01:11:08 +00:00
auth.c Replace a couple sprintf() with snprintf() 2015-10-17 17:14:19 +02:00
auth.h Implement a key exchange mechanism 2015-10-17 16:47:58 +02:00
autogen.sh Import vtun.drivers, add an autogen.sh script to create autoconf files 2015-10-08 00:43:56 +02:00
cfg_file.l Update copyrights. 2008-01-07 22:35:18 +00:00
cfg_file.y Implement a key exchange mechanism 2015-10-17 16:47:58 +02:00
cfg_kwords.h Port to libsodium, switch to AES256-GCM, revamp authentication 2015-10-09 02:24:01 +02:00
client.c 2951972 - make vtund quiet about connections (Sean MacLennan) 2012-07-08 05:32:57 +00:00
compat.h Update copyrights. 2008-01-07 22:35:18 +00:00
configure.ac Regen the autoconf file 2015-10-17 17:25:38 +02:00
driver.h Buy in rfe3561826/bug32/pbz5668 code to add an %h macro to up/downs 2013-07-07 20:36:33 +00:00
lfd_encrypt.c Implement a key exchange mechanism 2015-10-17 16:47:58 +02:00
lfd_lzo.c Merge changes from Andrey Mazo: 2013-07-07 19:54:20 +00:00
lfd_shaper.c Merge changes from Andrey Mazo: 2013-07-07 19:54:20 +00:00
lfd_zlib.c Merge changes from Andrey Mazo: 2013-07-07 19:54:20 +00:00
lib.c Try to guess what the intent was 2015-10-17 17:30:42 +02:00
lib.h Merge changes from Andrey Mazo: 2013-07-07 19:54:20 +00:00
linkfd.c Replace a couple sprintf() with snprintf() 2015-10-17 17:14:19 +02:00
linkfd.h Update copyrights. 2008-01-07 22:35:18 +00:00
llist.c Update copyrights. 2008-01-07 22:35:18 +00:00
llist.h Update copyrights. 2008-01-07 22:35:18 +00:00
lock.c Replace a couple sprintf() with snprintf() 2015-10-17 17:14:19 +02:00
lock.h Update copyrights. 2008-01-07 22:35:18 +00:00
main.c if the password supplied is 32 bit long, we should use it AS if 2015-10-09 18:00:06 +02:00
netlib.c Argh. Fix a missing declaration. 2009-03-29 10:44:02 +00:00
netlib.h Update copyrights. 2008-01-07 22:35:18 +00:00
server.c Another sigaction value worth initializing 2015-10-17 17:21:51 +02:00
tunnel.c Merge changes from Andrey Mazo: 2013-07-07 19:54:20 +00:00
vtun.drivers Import vtun.drivers, add an autogen.sh script to create autoconf files 2015-10-08 00:43:56 +02:00
vtun.h Implement a key exchange mechanism 2015-10-17 16:47:58 +02:00
vtun_socks.h Update copyrights. 2008-01-07 22:35:18 +00:00
vtund.8 2951972 - make vtund quiet about connections (Sean MacLennan) 2012-07-08 05:32:57 +00:00
vtund.conf Port to libsodium, switch to AES256-GCM, revamp authentication 2015-10-09 02:24:01 +02:00
vtund.conf.5 Port to libsodium, switch to AES256-GCM, revamp authentication 2015-10-09 02:24:01 +02:00

README.md

This is a fork of VTUN, with the following changes:

  • OpenSSL was replaced by Libsodium (this currently requires code from the git repository to be compiled until version 1.0.4 is out).

  • Unauthenticated encryption schemes were replaced with hardware-accelerated AES256-GCM.

  • The static, shared key was replaced by an ephemeral keys exchange with Curve25519. The PSK is now only used to sign ephemeral public keys and parameters.

  • Protection against replay attacks was added.

  • Passwords are not kept in memory, guarded memory allocations are used for secrets.