From: bishop <bi...@pl...> - 2002-03-31 11:10:24
|
- public-key encryption based on KEY records in DNS Hit the DNS, get the key, now you don't have to store it any place, and you can discover it. If you can think of an easier way to discover a KEY, then I'm all ears. - on-demand connections. Keep the IFaces up all the time. Route data to it, and connect the actual TUNs with the high-water mark is reached. - Dynamic on-demand default tunnels using discovered Keys Send all data out via the TUN, except data that's already encapsulated. If a tunnel cannot be established, then send it in the clear. Otherwise, set up tunnel and shoot data. -- Excellent... rime ice, a summit ridge, small trees blanketed in snow and ice like legions of twisted killer mutant deranged snow goons. -- Erick DeOliveira 20020208 Describing his first Winter Ascent |