ViewVC Help
View File | Revision Log | Show Annotations | Download File
/cvs/gvpe/doc/vpe.protocol.7.pod
(Generate patch)

Comparing gvpe/doc/vpe.protocol.7.pod (file contents):
Revision 1.1 by pcg, Tue Apr 15 04:32:34 2003 UTC vs.
Revision 1.2 by pcg, Tue Apr 15 04:54:44 2003 UTC

72floods due to protocol problems (like a rsa key file mismatch between two 72floods due to protocol problems (like a rsa key file mismatch between two
73hosts). 73hosts).
74 74
75=head2 Routing and Protocol translation 75=head2 Routing and Protocol translation
76 76
77... not yet written, please bug me ... 77The vpe routing algorithm is easy: there isn't any routing. Vped always
78tries to establish direct connections, if the protocol abilities of the
79two hosts allow it.
78 80
81If the two hosts should be able to reach each other (common protocol, ip
82and port all known), but cannot (network down), then there will be no
83connection, point.
84
85A host can usually declare itself unreachable directly by setting it's
86port number(s) to zero. It can declare other hosts as unreachable by using
87a config-file that disables all protocols for these other hosts.
88
89If two hosts cannot connect to each other because their IP address(es)
90are not known (such as dialup hosts), one side will send a connection
91request to a router (routers must be configured to act as routers!), which
92will send both the originating and the destination host a connection info
93request with protocol information and IP address of the other host (if
94known). Both hosts will then try to establish a connection to the other
95peer, which is usually possible even when both hosts are behind a NAT
96gateway.
97
98If the hosts cannot reach each other because they have no common protocol,
99the originator instead use the router with highest priority and matching
100protocol as peer. Since the SRCDST field is not encrypted, the router host
101can just forward the packet to the destination host. Since each host uses
102it's own private key, the router will not be able to decrypt or encrypt
103packets, it will just act as a simple router and protocol translator.
104
105When no router is connected, the host will aggressively try to connect to
106all routers, and if a router is asked for an unconnected host it will try
107to ask another router to establish the connection.
108
109... more not yet written about the details of the routing, please bug me
110...
111

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines