<feed xmlns='http://www.w3.org/2005/Atom'>
<title>unetd/CMakeLists.txt, branch master</title>
<subtitle>WireGuard based VPN connection manager for OpenWrt</subtitle>
<id>https://git-03.infra.openwrt.org/project/unetd/atom?h=master</id>
<link rel='self' href='https://git-03.infra.openwrt.org/project/unetd/atom?h=master'/>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/unetd/'/>
<updated>2025-10-03T21:38:37Z</updated>
<entry>
<title>CMakeLists: update cmake minimum required version to 3.10</title>
<updated>2025-10-03T21:38:37Z</updated>
<author>
<name>Christian Marangi</name>
</author>
<published>2025-10-03T21:38:37Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/unetd/commit/?id=2f67f6faa08aa4b20663d4cbaf063a79041947c1'/>
<id>urn:sha1:2f67f6faa08aa4b20663d4cbaf063a79041947c1</id>
<content type='text'>
New cmake version 4.0 requires at least 3.5 version as the minimum
required version with it increased to 3.10 in to-be-released cmake
versions.

Set the minimum required version to 3.10 to future-proof for future
cmake version.

Suggested-by: Hannu Nyman &lt;hannu.nyman@iki.fi&gt;
Signed-off-by: Christian Marangi &lt;ansuelsmth@gmail.com&gt;
</content>
</entry>
<entry>
<title>add udebug support</title>
<updated>2025-02-28T13:30:56Z</updated>
<author>
<name>Felix Fietkau</name>
</author>
<published>2025-02-28T13:30:53Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/unetd/commit/?id=3fab99eab4d5fe29280babcfa5d6b86e43b88cad'/>
<id>urn:sha1:3fab99eab4d5fe29280babcfa5d6b86e43b88cad</id>
<content type='text'>
Signed-off-by: Felix Fietkau &lt;nbd@nbd.name&gt;
</content>
</entry>
<entry>
<title>ubus: add api for generating and validating security tokens</title>
<updated>2025-01-31T12:42:05Z</updated>
<author>
<name>Felix Fietkau</name>
</author>
<published>2025-01-31T11:01:17Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/unetd/commit/?id=f5341f3275394504a1d5a86ea3db817029f9e2f2'/>
<id>urn:sha1:f5341f3275394504a1d5a86ea3db817029f9e2f2</id>
<content type='text'>
These tokens can be used to authenticate communication between hosts over
the unet network. Tokens can only be decrypted by unetd on the receiver,
using the private wireguard key.
Since no time based replay checks are performed, the service that validates
the token should first send a challenge to the other side first and verify
its presence in the decrypted token data.

If a service name is passed in the call, validation enforces that both
sides must be a member of that service.

Signed-off-by: Felix Fietkau &lt;nbd@nbd.name&gt;
</content>
</entry>
<entry>
<title>enroll: add PEX sub-protocol to support enrolling new nodes into a network</title>
<updated>2025-01-26T10:14:35Z</updated>
<author>
<name>Felix Fietkau</name>
</author>
<published>2024-12-21T19:54:28Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/unetd/commit/?id=d13752814651c70d2afc71383612fafc835b631b'/>
<id>urn:sha1:d13752814651c70d2afc71383612fafc835b631b</id>
<content type='text'>
This protocol does a full DH exchange and allows both sides to confirm
the result based on a session id hash derived from the DH session key.
It exchanges the public auth_key for a network and a newly generated keypair
for the added node

Signed-off-by: Felix Fietkau &lt;nbd@nbd.name&gt;
</content>
</entry>
<entry>
<title>pex: add support for figuring out the external data port via STUN servers</title>
<updated>2022-09-16T16:56:53Z</updated>
<author>
<name>Felix Fietkau</name>
</author>
<published>2022-09-16T09:00:15Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/unetd/commit/?id=639cdcdf6edacbcd00db746727ea1ae881bef5c6'/>
<id>urn:sha1:639cdcdf6edacbcd00db746727ea1ae881bef5c6</id>
<content type='text'>
When establishing a direct connection on the auth/PEX port via DHT, both sides
need to know the externally mapped data port number in order to establish a
wireguard connection.
If there is an existing data connection, the port can be queried via PEX
over the tunnel. If that is not available, an external public server is needed
in order to poke a hole in the NAT. The easiest way to do this is to use
STUN, since there are a lot of public servers available.

The servers can be configured via the network data, based on the assumption,
that an auth exchange with network data update can be done directly

Signed-off-by: Felix Fietkau &lt;nbd@nbd.name&gt;
</content>
</entry>
<entry>
<title>add DHT discovery service</title>
<updated>2022-09-16T16:55:17Z</updated>
<author>
<name>Felix Fietkau</name>
</author>
<published>2022-09-10T06:43:22Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/unetd/commit/?id=e58a5669713197278e4317a1128b9a7be0818d5a'/>
<id>urn:sha1:e58a5669713197278e4317a1128b9a7be0818d5a</id>
<content type='text'>
This uses the BitTorrent 'Mainline' DHT in order to find peers.
It operates on the global PEX port, in order to allow exchanging network data
through double NAT. Only the IPv4 DHT is used at the moment.

Signed-off-by: Felix Fietkau &lt;nbd@nbd.name&gt;
</content>
</entry>
<entry>
<title>add support for disabling VXLAN/eBPF support</title>
<updated>2022-08-29T18:52:22Z</updated>
<author>
<name>Felix Fietkau</name>
</author>
<published>2022-08-29T18:52:20Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/unetd/commit/?id=0041fcacb62492653a1054098ec7d811d8eaacbf'/>
<id>urn:sha1:0041fcacb62492653a1054098ec7d811d8eaacbf</id>
<content type='text'>
This makes it easier to backport or de-bloat on smaller systems

Signed-off-by: Felix Fietkau &lt;nbd@nbd.name&gt;
</content>
</entry>
<entry>
<title>build: explicitly link in libelf and zlib</title>
<updated>2022-08-25T10:15:40Z</updated>
<author>
<name>Felix Fietkau</name>
</author>
<published>2022-08-25T10:15:40Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/unetd/commit/?id=56c6b83e1885add6ca29219570a5c3387fc978d2'/>
<id>urn:sha1:56c6b83e1885add6ca29219570a5c3387fc978d2</id>
<content type='text'>
Signed-off-by: Felix Fietkau &lt;nbd@nbd.name&gt;
</content>
</entry>
<entry>
<title>add protocol for exchanging signed network data</title>
<updated>2022-08-23T21:20:25Z</updated>
<author>
<name>Felix Fietkau</name>
</author>
<published>2022-08-13T12:57:43Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/unetd/commit/?id=bf43cce3830426f5a4faf78dc38d02cc063e0263'/>
<id>urn:sha1:bf43cce3830426f5a4faf78dc38d02cc063e0263</id>
<content type='text'>
Signed-off-by: Felix Fietkau &lt;nbd@nbd.name&gt;
</content>
</entry>
<entry>
<title>add chacha20 implementation</title>
<updated>2022-08-23T11:48:18Z</updated>
<author>
<name>Felix Fietkau</name>
</author>
<published>2022-08-05T13:32:15Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/project/unetd/commit/?id=6e1898f7de3743e524e10cdf117fe2b2e13de244'/>
<id>urn:sha1:6e1898f7de3743e524e10cdf117fe2b2e13de244</id>
<content type='text'>
Signed-off-by: Felix Fietkau &lt;nbd@nbd.name&gt;
</content>
</entry>
</feed>
