docs: update again.
This commit is contained in:
parent
deecb3d021
commit
7a7a1ce08c
@ -1,45 +1,54 @@
|
|||||||
VPN
|
Mesh-VPN
|
||||||
===
|
========
|
||||||
|
|
||||||
Gluon supports different options to establish vpn tunnels,
|
Gluon integrates several OSI-Layer 2 tunneling protocols to
|
||||||
which connect mesh clouds and provide internet access.
|
enable interconnects between local meshes and provide
|
||||||
Currently the available vpn protocols options are:
|
internetwork access. Available protocols currently are:
|
||||||
|
|
||||||
- fastd
|
- fastd
|
||||||
- L2TP (tunneldigger)
|
- L2TPv3 (via tunneldigger)
|
||||||
|
|
||||||
Fastd is a lightweight vpn daemon in userspace, which is
|
fastd is a lightweight userspace tunneling daemon, that
|
||||||
especially designed for embedded hardware. It supports
|
implements cipher suites that are specifically designed
|
||||||
encryption and authentication.
|
to work well on embedded devices. It offers encryption
|
||||||
|
and authentication. Its primary drawback are the necessary
|
||||||
|
context-switches when forwarding packets.
|
||||||
|
|
||||||
L2TP is implemented inside the linux kernel and has
|
L2TPv3 is an in-kernel tunneling protocol that performs well,
|
||||||
therefore performance advantages over fastd. The
|
but offers no security properties by itself.
|
||||||
disadvantage of L2TP is, that it does not support any
|
The brokering of the tunnel happens through tunneldigger,
|
||||||
encryption. So everything is sent in plain.
|
its primary drawback being the lack of IPv6 support.
|
||||||
|
|
||||||
Optional Encryption (fastd only):
|
fastd
|
||||||
---------------------------------
|
-----
|
||||||
|
|
||||||
When using fastd, the firmware can allow the user to
|
### Configurable Cipher
|
||||||
decide by itself, whether he want's to use encryption
|
|
||||||
or not. If the firmware builder doesn't like this, he
|
|
||||||
is also able to hide (or even forbid) the encryptionless
|
|
||||||
option to the user.
|
|
||||||
|
|
||||||
If you want to allow users to decide by themselves:
|
|
||||||
|
|
||||||
- Be sure, the package ``gluon-web-mesh-vpn-fastd`` is enabled in ``site.mk``
|
From the site configuration fastd can be allowed to offer
|
||||||
- Set the option ``mesh_vpn.fastd.configurable = true`` in ``site.conf``
|
toggleable encryption in the config mode with the intent to
|
||||||
- On the server side, be sure that ``null`` cipher is allowed and preferred over ``salsa2012+umac``. You can ensure this by inserting the ``method "null";`` entry before the ``method "salsa2012+umac";`` in your fastd.conf.
|
increase throughput, although in practice the gain is minimal.
|
||||||
|
|
||||||
Users now should have the choice in expert mode to decide
|
**Site configuration:**
|
||||||
by themselves, which looks like this:
|
|
||||||
|
1) Install ``gluon-web-mesh-vpn-fastd`` in ``site.mk``
|
||||||
|
2) Set ``mesh_vpn.fastd.configurable = true`` in ``site.conf``
|
||||||
|
|
||||||
|
**Gateway configuration:**
|
||||||
|
|
||||||
|
1) Prepend the ``none`` cipher in fastds method list
|
||||||
|
|
||||||
|
|
||||||
|
**Config Mode:**
|
||||||
|
The resulting firmware will allow users to choose between secure (encrypted) and fast (unencrypted) transport.
|
||||||
|
|
||||||
.. image:: fastd_mode.gif
|
.. image:: fastd_mode.gif
|
||||||
|
|
||||||
If you want to ensure, that the correct chipher is chosen,
|
**Unix socket:**
|
||||||
you can use the following command on a router. You maybe
|
To confirm whether the correct cipher is being used, fastds unix
|
||||||
have to install socat before.
|
socket can be interrogated, after installing for example `socat`.
|
||||||
|
|
||||||
|
opkg update
|
||||||
|
opkg install socat
|
||||||
socat - UNIX-CONNECT:/var/run/fastd.mesh_vpn.socket
|
socat - UNIX-CONNECT:/var/run/fastd.mesh_vpn.socket
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user