X-Git-Url: https://www.tinc-vpn.org/git/browse?a=blobdiff_plain;f=goals.mdwn;fp=goals.mdwn;h=19f02f5cdc4d78e4f8c6a9ca964762e8ccb2adad;hb=e45797c2adf3298c676ef3ad7315dd7b58f25f7b;hp=8a0eebb8d4c17684085150a67f97d8831a7bbede;hpb=b6ab526349d26ff292cf8c8d9f7f0c4d0b1b5c51;p=wiki diff --git a/goals.mdwn b/goals.mdwn index 8a0eebb..19f02f5 100644 --- a/goals.mdwn +++ b/goals.mdwn @@ -146,14 +146,14 @@ PGP, where peers can sign each other, and if there are enough signatures, they can allow communication. Trust management should be simple, for example using a command like - tinc trust *foo* + tinc trust foo which should let the local tinc daemon trust information from the peer named *foo*. To authorise the use of addresses on the VPN, a command like the following could be used: - tinc allow *bar* 192.168.3.0/24 + tinc allow bar 192.168.3.0/24 This should generate a small certificate that proves that the node that issued this command trusts node *bar* with the 192.168.3.0/24 range @@ -162,11 +162,11 @@ tinc daemon's configuration, but also spread immediately amongst the other peers in the VPN. It is also important to allow trust and authorisation to be revoked in the same way: - tinc distrust *foo* + tinc distrust foo This should make the local tinc daemon stop trusting any information from *foo*. - tinc deny *bar* + tinc deny bar This should generate a certificate (with a newer timestamp than the previous one) denying *bar* any access, and spread this amongst the other peers as well.