Replies: 2 comments
-
The end-to-end encryption (E2EE) in Narrowlink differs from WireGuard. Narrowlink follows a distinct approach, as discussed here, and partially described in the End-to-End Encryption guide (However can be improvemented). Narrowlink utilizes a preshared secret derived from the users' defined passphrase, which is not part of the token. Users are required to use a passphrase on both the client and agent sides. Subsequently, this passphrase is hashed using Sha3-256 to generate the encryption key. |
Beta Was this translation helpful? Give feedback.
-
I have added more clarification to the docs narrowlink/homepage@86b2252 |
Beta Was this translation helpful? Give feedback.
-
I double check what generate on Agent and Client side, the agent.yaml is just a JWT token from token-generator.yaml,
I can't find a pair of public/private key been used for mitigate the MitM :
Could you advise on this E2EE concern? thanks
Beta Was this translation helpful? Give feedback.
All reactions