From 14856ad4e98c20cc8b59936415e4dd2f80a049d8 Mon Sep 17 00:00:00 2001 From: Daniel Borkmann Date: Wed, 14 Mar 2012 10:59:23 +0100 Subject: [PATCH] docs: removed paragraph with compression in curvetun The paragraph with compression in curvetun's documentation has been removed since there is no compression. Also other minor things have been removed. Signed-off-by: Daniel Borkmann --- Documentation/Curvetun | 18 ++++++------------ 1 file changed, 6 insertions(+), 12 deletions(-) diff --git a/Documentation/Curvetun b/Documentation/Curvetun index a8fddbd1..5bd2df99 100644 --- a/Documentation/Curvetun +++ b/Documentation/Curvetun @@ -6,18 +6,12 @@ that is based on epoll(2). curvetun uses the Linux TUN/TAP interface and supports {IPv4,IPv6} over {IPv4,IPv6} with UDP or TCP as carrier protocols. It has an integrated packet forwarding trie, thus multiple users with different IPs can be handled via a single tunnel device on the server side -and flows are scheduled for processing in a CPU-local manner. For transmission, -packets are being compressed and encrypted by both, the client and the -server side. As an appropriate key management, public-key cryptography based -on elliptic curves are being used and packets are encrypted by a symmetric -stream cipher (Salsa20) and authenticated by a MAC (Poly1305), where keys -have previously been computed with the ECDH key agreement protocol (Curve25519). -Cryptography is based on Daniel J. Bernsteins Networking and Cryptography -library (NaCl). One of the motivations for curvetun is to 'bypass' Internet -censorship, filtering or wiretapping with the help of modern cryptography as -it is becoming more and more a trend by todays politicians or lobbies of -large media companies to 'regulate' the Internet. With curvetun, network -traffic can be tunneled encrypted to censorship-free regions of the Internet. +and flows are scheduled for processing in a CPU-local manner. As an appropriate +key management, public-key cryptography based on elliptic curves are being +used and packets are encrypted by a symmetric stream cipher (Salsa20) and +authenticated by a MAC (Poly1305), where keys have previously been computed +with the ECDH key agreement protocol (Curve25519). Cryptography is based on +Daniel J. Bernsteins Networking and Cryptography library (NaCl). Motivation ////////// -- 2.11.4.GIT