ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    ZeroTier and DNS issues

    IT Discussion
    zerotier dns vpn
    10
    176
    102.0k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A
      adam.ierymenko
      last edited by

      We've had the same experience with ZeroTier which does the same thing in this use case minus some of the bundled hacks for things like AD. Greenfield is easy. "Brownfield" as they call it -- namely anywhere other than California -- is a lot harder because you have to still connect to the 1990s Windows NT server that is mission critical or the printers that can't run SDN software or the ancient Solaris box that talks via 1200 baud modem bank to the store PoS systems or the IP over carrier pigeon (RFC1149) deployment.

      Right now we've elected to focus more on other uses of SDN, but yes we do eventually want to go there.

      So... if Pertino is often used all-or-nothing then why is the DNS mangling needed? I understood it with mixed installs but I don't understand it if you're doing greenfield all-in SDN.

      scottalanmillerS 1 Reply Last reply Reply Quote 0
      • scottalanmillerS
        scottalanmiller @Dashrender
        last edited by

        @Dashrender said:

        Heck in that situation, I'd setup DHCP on the local business network from the firewall only so they have a way to have the underlying network (hardware layer) working.

        How does DHCP do that?

        DashrenderD 1 Reply Last reply Reply Quote 0
        • scottalanmillerS
          scottalanmiller @Dashrender
          last edited by

          @Dashrender said:

          I would think that it would be a large flat (say \23 or \22 network) and the DNS servers would only respond on the Pertino network.

          It IS a huge flat network. /22 now, they just updated.

          1 Reply Last reply Reply Quote 0
          • scottalanmillerS
            scottalanmiller @Dashrender
            last edited by

            @Dashrender said:

            Question - how do they get to the internet? Does the local machine send DNS queries to AD's DNS via Pertino, then the local clients use the local hardware network to find a route to the internet?

            Anyway you want, typically direct since the Internet is not part of your LAN. But you could put a proxy on the pLAN somewhere.

            Obviously the route to the Internet is handled normally since that is also how you get the route to your Pertino gear.

            1 Reply Last reply Reply Quote 0
            • A
              adam.ierymenko
              last edited by

              @scottalanmiller ZeroTier just connects directly over LAN if two devices are in the same physical network (if possible). So in-building traffic goes in-building, albeit with the overhead of an extra 28 byte header and encryption/authentication. Overhead is somewhat comparable to IPSec.

              For high performance stuff where you don't want any encapsulation overhead it makes more sense to just physically wire thing together on private special purpose backplane networks. You will never beat that with SDN because... well... it's just a wire.

              scottalanmillerS DashrenderD 2 Replies Last reply Reply Quote 0
              • scottalanmillerS
                scottalanmiller @adam.ierymenko
                last edited by

                @adam.ierymenko said:

                So... if Pertino is often used all-or-nothing then why is the DNS mangling needed? I understood it with mixed installs but I don't understand it if you're doing greenfield all-in SDN.

                If you have 100 machines in a single office, you don't want them talking to each other through an Amazon hosted switch.

                1 Reply Last reply Reply Quote 0
                • A
                  adam.ierymenko
                  last edited by

                  @scottalanmiller Sure, but why wouldn't you handle that a layer down? Are you saying Pertino uses DNS to route traffic?

                  scottalanmillerS 1 Reply Last reply Reply Quote 0
                  • scottalanmillerS
                    scottalanmiller @adam.ierymenko
                    last edited by

                    @adam.ierymenko said:

                    @scottalanmiller ZeroTier just connects directly over LAN if two devices are in the same physical network (if possible). So in-building traffic goes in-building, albeit with the overhead of an extra 28 byte header and encryption/authentication. Overhead is somewhat comparable to IPSec.

                    How is ZeroTier determining how to address a machine in one place or another? Say a laptop is communicating with a server that is remote and then becomes local. How does it know when to switch?

                    1 Reply Last reply Reply Quote 1
                    • H
                      hubtechagain
                      last edited by

                      we use pertino only on our laptops and "out of office" computers. not installed on every workstation, that would be silly. We use pertino essentially as a vpn, a means for those geographically separate devises to still use LAN resources securely and easily (doctors, nurses, etc)

                      1 Reply Last reply Reply Quote 0
                      • scottalanmillerS
                        scottalanmiller @adam.ierymenko
                        last edited by

                        @adam.ierymenko said:

                        @scottalanmiller Sure, but why wouldn't you handle that a layer down? Are you saying Pertino uses DNS to route traffic?

                        Yes. DNS is used to determine where to send traffic. Because it gives different addresses out under different circumstances.

                        1 Reply Last reply Reply Quote 0
                        • DashrenderD
                          Dashrender @scottalanmiller
                          last edited by

                          @scottalanmiller said:

                          @Dashrender said:

                          Heck in that situation, I'd setup DHCP on the local business network from the firewall only so they have a way to have the underlying network (hardware layer) working.

                          How does DHCP do that?

                          What I mean is that I wouldn't bother setting up DHCP on a Windows Server to handle the local network portion... I'd leave that to some unrelated device, and not have the local network be part of the Windows concern.

                          But in reading some of your responses I'm not sure how that would work either.

                          Let's say I'm on a 1 Gb network... the server is on that same network... but we're using Pertino... I have a 5 meg internet connection, how fast are files going to move between me and the server?

                          scottalanmillerS 1 Reply Last reply Reply Quote 0
                          • A
                            adam.ierymenko
                            last edited by

                            @scottalanmiller Every ZT device has a cryptographically-defined identity, so any time it gets a packet it knows who sent it. It can then try various paths for connectivity and use them if a bi-directional link is determined to be present. ZeroTier devices on the same virtual network try each other over their local IPs as well as via NAT-t and other methods and if that works they prefer local to global. But if it stops working they'll fall back to whatever works according to a preference order based on IP scope/class and type (V6 over V4, local over global, direct over indirect).

                            It's open source if you're curious: https://github.com/zerotier/ZeroTierOne

                            1 Reply Last reply Reply Quote 2
                            • DashrenderD
                              Dashrender @adam.ierymenko
                              last edited by Dashrender

                              @adam.ierymenko said:

                              @scottalanmiller ZeroTier just connects directly over LAN if two devices are in the same physical network (if possible). So in-building traffic goes in-building, albeit with the overhead of an extra 28 byte header and encryption/authentication. Overhead is somewhat comparable to IPSec.

                              Good to know - can you tell us how that works? Ok you did the post before mine.

                              1 Reply Last reply Reply Quote 0
                              • scottalanmillerS
                                scottalanmiller @Dashrender
                                last edited by

                                @Dashrender said:

                                Let's say I'm on a 1 Gb network... the server is on that same network... but we're using Pertino... I have a 5 meg internet connection, how fast are files going to move between me and the server?

                                Depends, are you using Pertino free or Pertino with the AD Connector? If using the free it all goes through the hosted switch so over your WAN bidirectionally.

                                If using the AD Connector it is going over the GigE network directly and not over the WAN.

                                1 Reply Last reply Reply Quote 0
                                • H
                                  hubtechagain
                                  last edited by

                                  and that was with design help from pertino. if a device/resource needs to be accessed off lan, stick a client on it. so our app/dc/sql/rds servers all have pertino installed on them. works great. local traffic still uses 10.x.x.x pertino uses 172.x.x.x

                                  DashrenderD 1 Reply Last reply Reply Quote 0
                                  • A
                                    adam.ierymenko
                                    last edited by

                                    Interesting. I haven't looked deeply into Pertino because my business philosophy is to focus on doing what users want and what makes technical design sense and ignore competition. In fact, during ZT initial design I deliberately did not try any alternatives because I didn't want to "pollute" my headspace. 🙂

                                    ZT may not need the DNS hack, since it doesn't use DNS to route traffic. It doesn't need any of that. It does everything a layer down using crypto for authentication and lazy route-learning with automatic switching and preference order. It's like VXLAN over a p2p mesh. It will fall back to WAN-in-WAN-out however if your LAN has rules that prohibit lateral communication... I've seen that in houses that run WiFi switches that do that.

                                    It does seem like the DNS hack would help with the IP ambiguity issue though in mixed deployments, and mixed deployments are what most non-greenfield existing enterprises are going to want because they can't install SDN software on everything... either because they are risk/change averse or because they run a lot of things that are too old/slow/whatever to run it.

                                    1 Reply Last reply Reply Quote 1
                                    • H
                                      hubtechagain
                                      last edited by

                                      adam, want to talk to you about a possible switch to your product sometime?

                                      1 Reply Last reply Reply Quote 0
                                      • DashrenderD
                                        Dashrender
                                        last edited by Dashrender

                                        Sounds like ZT is giving you free what Pertino is charging an arm for.

                                        But yeah, I know Pertino still has a lot of other features as well.

                                        Although - Adam, it sounds like you have the local vs remote problem already solved. You probably wouldn't need to do any of the DNS hacking that Pertino did, you've solved it through the crypto location hash.

                                        Nice!

                                        scottalanmillerS 1 Reply Last reply Reply Quote 1
                                        • scottalanmillerS
                                          scottalanmiller
                                          last edited by

                                          Is ZT's goal to have control of all traffic like a SDN? What is the underlying design goal, just to be the ultimate VPN? That might be a major influencer of design decisions.

                                          1 Reply Last reply Reply Quote 0
                                          • scottalanmillerS
                                            scottalanmiller @Dashrender
                                            last edited by

                                            @Dashrender said:

                                            Sounds like ZT is giving you free what Pertino is charging an arm for.

                                            Like he said... OpenSource. Think Linux and Windows 😉

                                            That's not a 100% true all the time thing, but you know, in general.

                                            1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 4
                                            • 5
                                            • 6
                                            • 7
                                            • 8
                                            • 9
                                            • 6 / 9
                                            • First post
                                              Last post