Per host key authentication

Parke parke.nexus at gmail.com
Tue Oct 2 23:58:22 CEST 2018


On Tue, Oct 2, 2018 at 2:41 PM, Michael Munger <mj at hph.io> wrote:
> It would be nice to just disable the key at some central point and then
> authentication / encryption / decryption just *break* for that bad actor.

Depending on your specific network topology, 4 separate VPNs might
very well give you the single break point you want.

If I was going to try to use Tinc to solve your problem, I would start
by trying the 4 separate VPN approach.

-Parke


More information about the tinc mailing list