Links for 2010-08-26

This entry was posted in Uncategorized. Bookmark the permalink. Both comments and trackbacks are currently closed.

2 Comments

  1. Craig Hughes
    Posted August 27, 2010 at 01:57 | Permalink

    …instead of tcpcrypt, why wouldn’t you use IPSec for that, so you’re using something standard which might actually sometimes opportunistically exist on the other end?

  2. Posted August 27, 2010 at 09:44 | Permalink

    I think tcpcrypt can set up new opportunistic crypto rather than requiring pre-existing keys be set up. Also tcpcrypt can handle NAT — more or less….