WARNING: The following analysis by Peter Gutmann notes some significant security flaws in the cryptographic mechanisms of tinc. We recommend potential users of tinc read this analysis. http://www.mit.edu:8008/bloom-picayune/crypto/14238