Subject | Hash | Author | Date (UTC) |
---|---|---|---|
Clarify PSK | 8498602e68a73b56675d1a022f9f84aa3d504b9b | GDR! | 2017-06-28 13:42:56 |
Close Issue #42 | c1a04ae71aa9dd7a590035326d5dabac31645fca | Andrzej Godziuk | 2017-05-04 10:17:49 |
Configurable TCP and UDP listen ports | 3acdcaaa65badbf3feb7d5438fdf1f66e1faa955 | Andrzej Godziuk | 2017-04-19 20:30:10 |
Fix Travis build | 38678c2c0a3c03acece160a05a771dd10ee20277 | Andrzej Godziuk | 2017-04-19 12:09:33 |
Fix Travis build | f12ed68c482d08681b6be2e2045c1840a52d1e97 | Andrzej Godziuk | 2017-04-19 12:03:22 |
Fix Travis build | 1931c1218b24612724c2da679199c786e6a30652 | Andrzej Godziuk | 2017-04-19 11:52:34 |
Update VPN.md | 8bacf02a4bd50eaded5d9c86fc8b7ff103d16341 | GDR! | 2017-04-18 16:40:38 |
Improve data transfer speed and latency | fe1b53fd47ffd5a527d9e072ad179028e0330d2c | ValdikSS | 2017-04-16 18:19:07 |
tokssh: add missing secret option to cmd line 🤦 | 65243979ba7216b32045c5da98c98f2686a97f7a | fabrixxm | 2017-04-07 19:11:12 |
tokssh: shared secret support,fix no user cmd line | d59b35d00bf2da3eb185043bba08acb3acc7c977 | fabrixxm | 2017-04-07 19:07:03 |
Try installing jinja2 with pip not apt | 0ba5a19f9942b8086474d91561b9b14a87aa042e | GDR! | 2017-02-01 10:52:10 |
Remove devnull redirect in travis.yml | 162b886c7e7a8f59aee7f7e58ec7dee338d327d0 | GDR! | 2017-01-31 21:16:12 |
Install jinja2 in Travis | 1d49afc7c880d940ba2d75ff7807b64d27de15ca | GDR! | 2017-01-31 20:12:24 |
Nicer help message | d77375c08113707235fe3949a7020bb87a7fdc41 | Francesco Gazzetta | 2017-01-24 18:16:03 |
Increased security | e32c14ff83b4e44067b1f0a2fa977a31e3962797 | Francesco Gazzetta | 2017-01-24 17:24:36 |
rebuild bootstrap nodes on make clean | 820360140e012ae26c5d048cca2775a96f52812b | GDR! | 2017-01-24 16:39:18 |
CID 122502 (#1 of 1): 'Constant' variable guards dead code | 5d23e782ff74a287202dec0b61132258d42c3221 | GDR! | 2017-01-24 16:23:16 |
CID 122516 (#1 of 1): Resource leak (RESOURCE_LEAK)10. leaked_storage: | cd1aa90632cf8853cbeb3610d254afc3d7d95b6b | GDR! | 2017-01-24 16:18:17 |
Update .travis.yml | e5483bc4662dc95665aeef5bc84adf95a81f7f3c | GDR! | 2017-01-24 15:23:06 |
Update .travis.yml | 5c2e4263fae3b78be4c4424fa846cd06915a0b8c | GDR! | 2017-01-24 15:15:34 |
File | Lines added | Lines deleted |
---|---|---|
README.md | 1 | 1 |
File README.md changed (mode: 100644) (index 5d12afa..06443ef) | |||
... | ... | The Tuntox server generates a new Tox ID on every startup, or saves its private | |
68 | 68 | ||
69 | 69 | Therefore, posession of the server's Tox ID and a secret should be considered equivalent to posession of an Unix account with SSH access. Tuntox does not implement remote shell capability, but it is possible that it's exploitable. | Therefore, posession of the server's Tox ID and a secret should be considered equivalent to posession of an Unix account with SSH access. Tuntox does not implement remote shell capability, but it is possible that it's exploitable. |
70 | 70 | ||
71 | PSK authentication is optional - it's only enabled when -s switch is present on server side. PSK is sent as Tox friend request message - as far as the author understands libtoxcore code, it's encrypted using server's public EC key. | ||
71 | PSK authentication is optional but recommended - it's only enabled when -s switch is present on server side or the TUNTOX_SHARED_SECRET environment variable is set. PSK is sent as Tox friend request message - as far as the author understands libtoxcore code, it's encrypted using server's public EC key. | ||
72 | 72 | ||
73 | 73 | The Tuntox Server can optionally allow only whitelisted ToxIDs. Supply *-i yourallowedtoxid* one time or more to add a ToxID to the whitelist. Note: The default client behavior is to generate a new ToxID for every run (because author thinks it's a nice privacy feature). You will want to use the -C switch in client to force reading a saved identity from tox_save. | The Tuntox Server can optionally allow only whitelisted ToxIDs. Supply *-i yourallowedtoxid* one time or more to add a ToxID to the whitelist. Note: The default client behavior is to generate a new ToxID for every run (because author thinks it's a nice privacy feature). You will want to use the -C switch in client to force reading a saved identity from tox_save. |
74 | 74 |