Subject | Hash | Author | Date (UTC) |
---|---|---|---|
Update README.md | 24a0f954ce773571aff6562084553028c8352142 | GDR! | 2016-10-04 08:16:39 |
Whitelist debug statement | a971c172985088d38297ed30318910144140a44b | GDR! | 2016-06-08 20:36:52 |
Coverity fix | b081686b05931064b4f9a26621d77a5d43941832 | GDR! | 2016-06-08 15:28:41 |
Fixed default value for server whitelist mode | e682a05cf64ea85e30cb88a089fe220c2081e5da | GDR! | 2016-06-08 15:16:25 |
Documentation for #14 | e9393fb439f94461fdc665eb85af54f156e5be75 | GDR! | 2016-06-07 20:00:13 |
"Whitelist clients by pubkeys" mode, re-request friends | 1013b2aaeafa9112849df4e08bcced23cbd91fdf | GDR! | 2016-06-07 19:52:48 |
Remove FDs of closed tunnels from fdset | 816245f429145052b8908d500c64d372fc8c2972 | GDR! | 2016-06-07 18:42:45 |
Mention toxvpn | c2a78f48bd44613162a6e3c1d02cb53266611936 | GDR! | 2016-05-05 17:55:59 |
ProxyCommand explained | c17be222aa46a4cf1a9d19c0ae767697ad585fd3 | GDR! | 2016-05-05 17:50:05 |
Visible ToxID | 4f38371fd72ba889e39805b76a1a2402194b5398 | GDR! | 2016-05-05 17:46:06 |
Tuntox does fork! | 0d1230def56597b25bcd731346794058c66d3e7c | GDR! | 2016-05-05 17:45:25 |
Tox.chat 2 | 90990f49bda18d06c89fca0495b39726bd55a076 | GDR! | 2016-05-05 17:43:58 |
Tox.chat | 5b921bc92cf04773f8e5b08120e5850156fbb580 | GDR! | 2016-05-05 17:43:11 |
Possible fix for Issue #16 | cc633e9ad431850d298638dbcdcbf1e8a4dfdeb1 | GDR! | 2016-05-05 17:39:42 |
Fix build on non-mac platforms | 981501cf1e19d07a11e28cff99b9cd7c7b1d0b1d | GDR! | 2015-09-17 08:30:57 |
* fix: Possibility to compile on Mac OS platform | 199787953243d91449ac5f4a5ac16edc2497e438 | Dawid 'nCore' Opis | 2015-09-16 18:14:03 |
remove tox.im because it's evil | b57ae8b86109e6fe6f626d03ddeca79539d07822 | GrayHatter | 2015-08-08 00:45:31 |
Update README.md | 9226aa00b30e7af7a0122b0772cc3e20ae5b49d0 | GDR! | 2015-07-14 12:57:55 |
CID 122512 (#1 of 1): Resource leak (RESOURCE_LEAK)11. leaked_storage: | 5d9e9c5d9078d8d1987375e972282220d50b9328 | GDR! | 2015-07-08 10:04:52 |
off_by_one: Testing whether handle sockfd is strictly greater than zero | a6d788c45764afb4d172dd3c75dfe593b85b5dab | GDR! | 2015-07-08 10:02:12 |
File | Lines added | Lines deleted |
---|---|---|
README.md | 3 | 1 |
File README.md changed (mode: 100644) (index c39c82c..cd38142) | |||
... | ... | To daemonize on startup, add -D: | |
34 | 34 | ||
35 | 35 | /path/to/tuntox -D | /path/to/tuntox -D |
36 | 36 | ||
37 | Or, if you run something like supervisord or systemd, you're welcome to contribute a configuration file for the system of your choice (see #3, #4, #6) | ||
37 | Or, if you run something like supervisord or systemd, you're welcome to contribute a configuration file for the system of your choice (see #3, #4, #6). There's absolutely no need to run the server as root. | ||
38 | 38 | ||
39 | 39 | ## Client | ## Client |
40 | 40 | ||
... | ... | Alternatively, SSH ProxyCommand mode works too: | |
58 | 58 | ||
59 | 59 | Fun stuff: [VPN over Tox](VPN.md) | Fun stuff: [VPN over Tox](VPN.md) |
60 | 60 | ||
61 | Client can be ran as a regular non-root user, [unless A < 1024](https://www.linuxquestions.org/linux/articles/Technical/Why_can_only_root_listen_to_ports_below_1024) ("A" is the local port). There's a [workaround](http://unix.stackexchange.com/a/10737) available. | ||
62 | |||
61 | 63 | ## Security / threat model | ## Security / threat model |
62 | 64 | ||
63 | 65 | **TUNTOX IS NOT SECURE WITHOUT THE -s SWITCH.** Supply *-s yourpassword* both on the server and the client, and you will be fine. This switch is introduced in 0.0.4, codename "Mr. Lahey's Got My Porno Tape!". | **TUNTOX IS NOT SECURE WITHOUT THE -s SWITCH.** Supply *-s yourpassword* both on the server and the client, and you will be fine. This switch is introduced in 0.0.4, codename "Mr. Lahey's Got My Porno Tape!". |