Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Route traffic over Serval proxy for end-to-end encryption. #48

Open
jheretic opened this issue Oct 11, 2013 · 3 comments
Open

Route traffic over Serval proxy for end-to-end encryption. #48

jheretic opened this issue Oct 11, 2013 · 3 comments

Comments

@jheretic
Copy link
Member

The Serval Project is implementing a generic proxy for network traffic. We should, by default for a secure network, route all traffic over this proxy so that it is end-to-end encrypted.

@westbywest
Copy link
Collaborator

Would it make sense to offer the option to explicitly select serval-encrypted tunnels in QuickStart? Likewise, implement a straightforward on/off checkbox in luci to toggle serval tunnels for nodes that have already completed Quickstart? serval is definitely a viable option for encrypted tunnels, like tinc or even n2n, but it has so far shown to have large memory demands and affect nodes' stability.

@jheretic
Copy link
Member Author

I guess if we have robust per-interface configuration, we might want to select on a per-interface basis whether ALL traffic is routed over Serval, or whether we just provide a proxy. That's largely a UI and documentation issue. I'll go ahead and flag this for the UI review, so that we can address the question. Thanks, that's a good point about how we present options.

We could potentially support a different tunneling solution, but I would like to focus on bugfixing and improving one cryptosystem vs. supporting multiple in parallel, as much as possible. But ultimately, I see all of this as fairly pluggable, so that even if OTI doesn't implement, say, a tinc or ipsec or n2n based backhaul transport for v1, someone else could write a Commotiond plugin that would implement that functionality without having to rewrite all the interfaces and other pieces.

@critzo
Copy link

critzo commented Nov 4, 2013

Once this functionality is in place within Serval, we need these UI options in Commotion OpenWRT:

  • Disable/Enable SOCKS proxy on this interface
  • Route all traffic on this interface through SOCKS proxy

Not an R1 target. Tagging for future point release.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants