From 9c50e96e7b20805443efa2254a3583f23cdfcb41 Mon Sep 17 00:00:00 2001 From: Logan oos Even <46396513+Logan007@users.noreply.github.com> Date: Tue, 26 Oct 2021 03:31:01 +0545 Subject: [PATCH] updated Authentication.md --- doc/Authentication.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/doc/Authentication.md b/doc/Authentication.md index 397335f..fc14ebd 100644 --- a/doc/Authentication.md +++ b/doc/Authentication.md @@ -74,7 +74,7 @@ The edge takes the username with the already present, identifying command line p Note that header encryption already is enabled automatically as this authentication scheme heavily relies on it. Also, currently only the stream ciphers work with this authentication scheme reliably in terms of security. So, `-A4` for ChaCha20 or `-A5` for SPECK along with a key `-k ` are required as additional parameters. -The edges need to know the public key of the supernode. By default, the edges assume the default federation name, or more specific, the corresponding public key. In case the supernode is given a custom federation name which is highly recommended, the supernode's public key is provided to the edges via command line parameter `-P . It can be generated from the federation name by using the `tools/n2n-keygen` utility as well: +The edges need to know the public key of the supernode. By default, the edges assume the default federation name, or more specific, the corresponding public key. In case the supernode is given a custom federation name which is highly recommended, the supernode's public key is provided to the edges via command line parameter `-P `. It can be generated from the federation name by using the `tools/n2n-keygen` utility as well: ```bash [user@host n2n]$ tools/n2n-keygen -F secretFed