gdr / tuntox (public) (License: GPLv3) (since 2017-01-24) (hash sha1)
Tunnel TCP connections over the Tox protocol
List of commits:
Subject Hash Author Date (UTC)
Clarify PSK 8498602e68a73b56675d1a022f9f84aa3d504b9b GDR! 2017-06-28 13:42:56
Close Issue #42 c1a04ae71aa9dd7a590035326d5dabac31645fca Andrzej Godziuk 2017-05-04 10:17:49
Configurable TCP and UDP listen ports 3acdcaaa65badbf3feb7d5438fdf1f66e1faa955 Andrzej Godziuk 2017-04-19 20:30:10
Fix Travis build 38678c2c0a3c03acece160a05a771dd10ee20277 Andrzej Godziuk 2017-04-19 12:09:33
Fix Travis build f12ed68c482d08681b6be2e2045c1840a52d1e97 Andrzej Godziuk 2017-04-19 12:03:22
Fix Travis build 1931c1218b24612724c2da679199c786e6a30652 Andrzej Godziuk 2017-04-19 11:52:34
Update VPN.md 8bacf02a4bd50eaded5d9c86fc8b7ff103d16341 GDR! 2017-04-18 16:40:38
Improve data transfer speed and latency fe1b53fd47ffd5a527d9e072ad179028e0330d2c ValdikSS 2017-04-16 18:19:07
tokssh: add missing secret option to cmd line 🤦 65243979ba7216b32045c5da98c98f2686a97f7a fabrixxm 2017-04-07 19:11:12
tokssh: shared secret support,fix no user cmd line d59b35d00bf2da3eb185043bba08acb3acc7c977 fabrixxm 2017-04-07 19:07:03
Try installing jinja2 with pip not apt 0ba5a19f9942b8086474d91561b9b14a87aa042e GDR! 2017-02-01 10:52:10
Remove devnull redirect in travis.yml 162b886c7e7a8f59aee7f7e58ec7dee338d327d0 GDR! 2017-01-31 21:16:12
Install jinja2 in Travis 1d49afc7c880d940ba2d75ff7807b64d27de15ca GDR! 2017-01-31 20:12:24
Nicer help message d77375c08113707235fe3949a7020bb87a7fdc41 Francesco Gazzetta 2017-01-24 18:16:03
Increased security e32c14ff83b4e44067b1f0a2fa977a31e3962797 Francesco Gazzetta 2017-01-24 17:24:36
rebuild bootstrap nodes on make clean 820360140e012ae26c5d048cca2775a96f52812b GDR! 2017-01-24 16:39:18
CID 122502 (#1 of 1): 'Constant' variable guards dead code 5d23e782ff74a287202dec0b61132258d42c3221 GDR! 2017-01-24 16:23:16
CID 122516 (#1 of 1): Resource leak (RESOURCE_LEAK)10. leaked_storage: cd1aa90632cf8853cbeb3610d254afc3d7d95b6b GDR! 2017-01-24 16:18:17
Update .travis.yml e5483bc4662dc95665aeef5bc84adf95a81f7f3c GDR! 2017-01-24 15:23:06
Update .travis.yml 5c2e4263fae3b78be4c4424fa846cd06915a0b8c GDR! 2017-01-24 15:15:34
Commit 8498602e68a73b56675d1a022f9f84aa3d504b9b - Clarify PSK
Author: GDR!
Author date (UTC): 2017-06-28 13:42
Committer name: GitHub
Committer date (UTC): 2017-06-28 13:42
Parent(s): c1a04ae71aa9dd7a590035326d5dabac31645fca
Signer:
Signing key:
Signing status: N
Tree: 76bf0d5c1171a3d5b648c5ad30da5830b6f56db9
File Lines added Lines deleted
README.md 1 1
File README.md changed (mode: 100644) (index 5d12afa..06443ef)
... ... The Tuntox server generates a new Tox ID on every startup, or saves its private
68 68
69 69 Therefore, posession of the server's Tox ID and a secret should be considered equivalent to posession of an Unix account with SSH access. Tuntox does not implement remote shell capability, but it is possible that it's exploitable. Therefore, posession of the server's Tox ID and a secret should be considered equivalent to posession of an Unix account with SSH access. Tuntox does not implement remote shell capability, but it is possible that it's exploitable.
70 70
71 PSK authentication is optional - it's only enabled when -s switch is present on server side. PSK is sent as Tox friend request message - as far as the author understands libtoxcore code, it's encrypted using server's public EC key.
71 PSK authentication is optional but recommended - it's only enabled when -s switch is present on server side or the TUNTOX_SHARED_SECRET environment variable is set. PSK is sent as Tox friend request message - as far as the author understands libtoxcore code, it's encrypted using server's public EC key.
72 72
73 73 The Tuntox Server can optionally allow only whitelisted ToxIDs. Supply *-i yourallowedtoxid* one time or more to add a ToxID to the whitelist. Note: The default client behavior is to generate a new ToxID for every run (because author thinks it's a nice privacy feature). You will want to use the -C switch in client to force reading a saved identity from tox_save. The Tuntox Server can optionally allow only whitelisted ToxIDs. Supply *-i yourallowedtoxid* one time or more to add a ToxID to the whitelist. Note: The default client behavior is to generate a new ToxID for every run (because author thinks it's a nice privacy feature). You will want to use the -C switch in client to force reading a saved identity from tox_save.
74 74
Hints:
Before first commit, do not forget to setup your git environment:
git config --global user.name "your_name_here"
git config --global user.email "your@email_here"

Clone this repository using HTTP(S):
git clone https://rocketgit.com/user/gdr/tuntox

Clone this repository using ssh (do not forget to upload a key first):
git clone ssh://rocketgit@ssh.rocketgit.com/user/gdr/tuntox

Clone this repository using git:
git clone git://git.rocketgit.com/user/gdr/tuntox

You are allowed to anonymously push to this repository.
This means that your pushed commits will automatically be transformed into a merge request:
... clone the repository ...
... make some changes and some commits ...
git push origin main