Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

tcpcryptd should be enabled by default for security. #18176

Closed
spacekitteh opened this issue Sep 1, 2016 · 3 comments
Closed

tcpcryptd should be enabled by default for security. #18176

spacekitteh opened this issue Sep 1, 2016 · 3 comments

Comments

@spacekitteh
Copy link
Contributor

So, as part of the hardening process of NixOS, I think tcpcryptd should be enabled by default - it encrypts TCP connections if it's talking to another tcpcryptd-enabled server, otherwise it falls back to standard TCP connections.

@spacekitteh spacekitteh mentioned this issue Sep 1, 2016
17 tasks
@teh
Copy link
Contributor

teh commented Sep 2, 2016

I think tcpcryptd is a fantastic idea in principle but I'm -1 on enable-by-default. IMHO daemons that rewrite network traffic to that extend should be opt-in (principle of least surprise).

On top of that I'm not convinced that exposing another daemon written in c to the Internet is a great idea :)

@langston-barrett
Copy link
Contributor

Can we close this? Seems to be majority-against.

@globin
Copy link
Member

globin commented Jan 29, 2017

I don't see this getting general support and it is easy enough to enable, with e.g. nixops especially for multiple machines.

@globin globin closed this as completed Jan 29, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants