

Resilio Connect is a superior Linux file synchronization solution because it:

4 Reasons to Use Resilio Connect for Real-Time Linux Sync To learn more about using Resilio Connect to sync files between your Linux servers, schedule a demo. Leading organizations in tech (, Kaspersky), gaming (Larian Studios, Blizzard), media (Turner Sports, Skywalker Sound) and more use Resilio Connect to synchronize data. It utilizes P2P file transfer and WAN acceleration technology to deliver the fastest replication speeds in the industry (10+ Gbps per server) over any network. All the peers with the old Key will continue syncing with each other, but will no longer sync with the peer who changed the Key.Resilio Connect is an enterprise-ready solution that can be used for Linux distribution, synchronization, and consolidation. When a user changes the Key on one peer, the change will not be distributed automatically. If a remote peer is acquiring a peer's ShareID, it initiates the connection(s) and calculates the session key(s) Sync will connect to the predefined hosts, sending information about ShareIDs and its IP. Once a peer receives a multicast packet with the ShareID it is looking for, it connects to the sender, and traffic will be encrypted once the session key is negotiated. These packets contain information about the associated ShareIDs and the IP:port. Every Sync instance sends multicast packets for revealing its presence when it starts or when network changes are detected. Having this information, the peer can attempt to connect to other peers directly (if internal IP subnet matches, the peer will attempt to connect in LAN first) and a new session key is calculated based on a RO Key.Įvery Sync instance subscribes to multicast packets, using port 3838. The tracker responds with the information about other peers that are connected with the same Share ID and their IP:ports (both internal and external). Sync connects to the tracker server and supplies it with the ShareID to look for, as well as the associated internal IP:port (while the tracker determines the external IP:port automatically).
Resilio sync pieces full#
Once a full set of Keys is ready, Sync attempts to find peers in the following ways (all of them can be disabled in the folder preferences): Sync uses ED25519 and SHA3 cryptographic algorithms for Key generation. The traffic encryption key that is generated separately for every session based on RO key. a Read-Only (RO) Key based on a public key a pair of asymmetric keys based on RW Key - used to sign and verify file hashes When a Read-Write (RW) Key is created, Sync automatically generates: M Identity key, used when linking devices with one identity. Calculated automatically from “D” or “E” type Key. Only capable to receive, store and seed data. Calculated automatically from “D” type Key.į Encrypted Key. Can be generated by Sync API.Į Read-only Key with capability to get and decrypt data from encrypted nodes (nodes with “D” and “F” types of Key). Calculated automatically from an “A”-type secret.ĭ Standard Key with read-write permissions and capability to seed data to encrypted nodes. The first letter of a standard Key determines the Key type:Ī Standard Key with read-write permissions.ī Read-only Key. Note that there is one exception: an encrypted-read-only secret is nearly twice as long (65 symbols), its body consisting of 2 keys - Data access key and Data encryption / decryption key, each of 20 bytes Base32 encoded value. The rest of a Key (usually 32 symbols) is a 20-byte sequence encoded in Base32 format. The first symbol of a Key indicates its type.Ģ. Key generated by Resilio Sync consists of capital letters from A to Z and numbers from 2 to 7.
