-
Notifications
You must be signed in to change notification settings - Fork 325
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
L2TP support #752
Comments
Yeah, that sounds great. I think the most advanced repo for the tunneldigger is the FFRL repository: https://github.com/ffrl/tunneldigger The patch for fixing the broker selection by usage is already merged (https://github.com/ffrl/tunneldigger/commit/5d34ae6a1e1cecc2b5cfb72fb02bf3e6b78a763e). Questions to me are:
The client (l2tp_client.c) is badly structured and needs refractoring. We plan to start that tonight. |
If we have enough space to fit both fastd and tunneldigger on our nodes, we could even change the expert mode package that lets the user choose between "security" and "performance" to switch from fastd to L2TP instead of switching fastd to methd "null". |
Due to current batman-v15 refragmentation issues i susppose we are splitting to 1280 anyways, correct?
I assume that blocking nodes can be done on the node-id, since it's invoced to the wrapper-scripts. |
If batman always uses 1280 when fragmenting a frame then we could just stick with a statically asigned MTU.
Missing IPv6 support is also on the agenda of wlan slovenia: https://dev.wlan-si.net/ticket/1187 I will prepare a merge of the tunneldigger gluon packages into the main repository. 😄 |
having a security and a performance mode would be great. But couln't fastd reach similar performance resulting in reduced complexity in the image build? |
Tunneldigger gains it's speed advantage by using a tunneling method supported by the kernel; in fastd, each packet causes a context-switch (kernel-context -> user-context), whereas L2TP stays within the kernel-context. Unless fastd is moved into kernel-space, I don't see how it could compete with in-kernel methods like GRE, L2TP, IPIP, ... And the issue is exhibited mostly on low-end embedded CPUs; the (x86) CPU in a Futro has no issue doing OpenVPN at 50 MBit/sec, but even an RPi v2 cannot keep up beyond about 25 MBit/sec. |
The FFRL tunneldigger doesn't include any usable respondd data providers. |
For 2015.1.2 it is working, but since the switch to C it would be great if someone else could take care of that. My C skills are a bit rusty. I will glady implement this into the pull request to the Gluon main repository |
I don't have any C skills that could be rusty 😁 |
FTR: fastd currently reports in the nodeinfo part its version and whether it's enabled, and in the statistics part which neighbours it is connected to for how long. The 2015.1-style announce code in the ffrl repo reports whether tunneldigger is enabled in the nodeinfo part (can be copied 1:1 from the fastd module) and… nothing (o_O?) in the statistics part. So presumably, those who insist on a respondd provider are missing the list of connected neighbours? |
Yup that's the thing missing. |
Any News? |
Anything new about this Issue ? |
Any chance for native L2TP? is it just the Respondd missing |
perhaps also "No ipv6 support at all"? for me that's a no-go... |
I would also like to see the l2tp support added to gluon https://github.com/ffrl/tunneldigger @rotanid the missing IPv6 is not a problem, more a "nice to have". There aren't any ipv6 only isps in germany by now. tunneldigger is much better, also on dslight connections. It would be nice to connect to vpn servers via ipv6, yes.. but ipv4 still exists and works fine. so this should not stop us from implementing l2tp. the tunnel itself is layer2, so IPv6 connections from clients through the tunnel shouldnt be affected... |
for reference: ffrl/ffrl-packages#8 |
What really lacks for the moment (as far as i am aware): respondd support for L2TP. It looks like there is missing a lot of data which can only be "indirectly" (e.g. by knowing the MAC of the L2TP servers) |
I've created a pushrequest for this issue: #947 |
New PR for this issue is: #978 |
Support has been merged thanks to the work of @lcb01a :) |
Nice! Thank you!
2017-03-10 20:16 GMT+01:00 Matthias Schiffer <notifications@github.com>:
… Support has been merged thanks to the work of @lcb01a
<https://github.com/lcb01a> :)
—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub
<#752 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/AIA7Us0ljnDrcnTg5XDLulUNHH1tqWRBks5rkaGKgaJpZM4IW-82>
.
|
IPv6 support for Tunneldigger was selected as one of this years GSoC projects. So work on https://dev.wlan-si.net/ticket/1187 will start soon. Some comments for things mentioned above:
Server helping limiting is the only way you can limit bandwidth well in both directions. You cannot do that only on the node. Server has to participate.
We think that for authentication, authorization, and encryption one can use IPSec. But we could discuss such feature and see. How would you identify nodes to be blocked? BTW, the best way to reach us it to open issues on our Trac, or talk to us on our chat. |
Some communities are already experimenting with L2TP to connect Gluon nodes. It would be great to have this in the official Gluon repo.
The text was updated successfully, but these errors were encountered: