erebos: Decentralized messaging and synchronization

[ bsd3, library, network, program ] [ Propose Tags ] [ Report a vulnerability ]

Library and simple CLI interface implementing the Erebos identity management, decentralized messaging and synchronization protocol, along with local storage.

Erebos identity is based on locally stored cryptographic keys, all communication is end-to-end encrypted. Multiple devices can be attached to the same identity, after which they function interchangeably, without any one being in any way "primary"; messages and other state data are then synchronized automatically whenever the devices are able to connect with one another.

See README for usage of the CLI tool.


[Skip to Readme]

Flags

Manual Flags

NameDescriptionDefault
ci

Options for CI testing

Disabled
Automatic Flags
NameDescriptionDefault
ice

Enable peer discovery with ICE support using pjproject

Enabled

Use -f <flag> to enable a flag, or -f -<flag> to disable that flag. More info

Downloads

Maintainer's Corner

Package maintainers

For package maintainers and hackage trustees

Candidates

  • No Candidates
Versions [RSS] 0.1.0, 0.1.1, 0.1.2, 0.1.3, 0.1.4, 0.1.5, 0.1.6, 0.1.7
Change log CHANGELOG.md
Dependencies async (>=2.2 && <2.3), base (>=4.13 && <4.20), binary (>=0.8 && <0.11), bytestring (>=0.10 && <0.13), clock (>=0.8 && <0.9), containers (>=0.6 && <0.8), cryptonite (>=0.25 && <0.31), deepseq (>=1.4 && <1.6), directory (>=1.3 && <1.4), erebos, filepath (>=1.4 && <1.6), hashable (>=1.3 && <1.5), hashtables (>=1.2 && <1.4), haskeline (>=0.7 && <0.9), hinotify (>=0.4 && <0.5), iproute (>=1.7.12 && <1.8), memory (>=0.14 && <0.19), mtl (>=2.2 && <2.4), network (>=3.1 && <3.2), process (>=1.6 && <1.7), stm (>=2.5 && <2.6), template-haskell (>=2.17 && <2.22), text (>=1.2 && <2.2), time (>=1.8 && <1.14), transformers (>=0.5 && <0.7), unix (>=2.7 && <2.9), uuid (>=1.3 && <1.4), zlib (>=0.6 && <0.8) [details]
License BSD-3-Clause
Author Roman Smrž <roman.smrz@seznam.cz>
Maintainer roman.smrz@seznam.cz
Category Network
Home page https://erebosprotocol.net/erebos
Source repo head: git clone git://erebosprotocol.net/erebos
Uploaded by RomanSmrz at 2024-06-11T19:46:17Z
Distributions
Executables erebos
Downloads 225 total (34 in the last 30 days)
Rating (no votes yet) [estimated by Bayesian average]
Your Rating
  • λ
  • λ
  • λ
Status Docs available [build log]
Last success reported on 2024-06-11 [all 1 reports]

Readme for erebos-0.1.4

[back to package description]

Erebos

The erebos binary provides simple CLI interface to the decentralized Erebos messaging service. Local identity is created on the first run. Protocol and services specification is being written at:

[https://erebosprotocol.net/spec](https://erebosprotocol.net/spec)

Erebos identity is based on locally stored cryptographic keys, all communication is end-to-end encrypted. Multiple devices can be attached to the same identity, after which they function interchangeably, without any one being in any way "primary"; messages and other state data are then synchronized automatically whenever the devices are able to connect with one another.

Status

This is experimental implementation of yet unfinished specification, so changes, especially in the library API, are expected. Storage format and network protocol should generally remain backward compatible, with their respective versions to be increased in case of incompatible changes, to allow for interoperability even in that case.

Usage

On the first run, local identity will be created for this device based on interactive prompts for:

Name: name of the user/owner, which will be shared among all devices belonging to the same user; keep empty when initializing device that is going to be attached to already existing identity on other device.

Device: name describing current device, can be empty.

After the initial setup, the erebos tool presents interactive prompt for messages and commands. All commands start with the slash (/) character, followed by command name and parameters (if any) separated by spaces. When a conversation is selected, message to send there is entered directly on the command prompt.

The session can be terminated either by end-of-input (typically Ctrl-d) or using the /quit command.

Example

Start erebos CLI and create new identity:

Name: Some Name
Device: First device
Some Name / First device
> 

Add public peer:

> /peer-add-public
[1] PEER NEW <unnamed> [37.221.243.57 29665]
[1] PEER UPD discovery1.erebosprotocol.net [37.221.243.57 29665]

Select the peer and send it a message, the public server just responds with automatic echo message:

> /1
discovery1.erebosprotocol.net> hello
[18:55] Some Name: hello
[18:55] discovery1.erebosprotocol.net: Echo: hello

Messaging

/peers
List peers with direct network connection. Peers are discovered automatically on local network or can be manually added.

/contacts
List known contacts (see below).

/conversations
List started conversations with contacts or other peers.

/<number>
Select conversation, contact or peer <number> based on the last /conversations, /contacts or /peers output list.

<message>
Send <message> to selected conversation.

/history
Show message history of the selected conversation.

/details
Show information about the selected conversations, contact or peer.

Add contacts

To ensure the identity of the contact and prevent man-in-the-middle attack, generated verification code needs to be confirmed on both devices to add contacts to contact list (similar to bluetooth device pairing). Before adding new contact, list peers using /peers command and select one with /<number>.

/contacts
List already added contacts.

/contact-add
Add selected peer as contact. Six-digit verification code will be computed based on peer keys, which will be displayed on both devices and needs to be checked that both numbers are same. After that it needs to be confirmed using /contact-accept to finish the process.

/contact-accept
Confirm that displayed verification codes are same on both devices and add the selected peer as contact. The side, which did not initiate the contact adding process, needs to select the corresponding peer with /<number> command first.

/contact-reject
Reject contact request or verification code of selected peer.

Attach other devices

Multiple devices can be attached to single identity to be used by the same user. After the attachment process completes the roles of the devices are equivalent, both can send and receive messages independently and those messages, along with any other sate data, are synchronized automatically whenever the devices can connect to each other.

The attachment process and underlying protocol is very similar to the contact adding described above, so also generates verification code based on peer keys that needs to be checked and confirmed on both devices to avoid potential man-in-the-middle attack.

Before attaching device, list peers using /peers command and select the target device with /<number>.

/attach
Attach current device to the selected peer. After the process completes the owner of the selected peer will become owner of this device as well. Six-digit verification code will be displayed on both devices and the user needs to check that both are the same before confirmation using the /attach-accept command.

/attach-accept
Confirm that displayed verification codes are same on both devices and complete the attachment process (or wait for the confirmation on the peer device). The side, which did not initiate the attachment process, needs to select the corresponding peer with /<number> command first.

/attach-reject
Reject device attachment request or verification code of selected peer.

Other

/peer-add <host> [<port>]
Manually add network peer with given hostname or IP address.

/peer-add-public
Add known public network peer(s).

/peer-drop
Drop the currently selected peer. Afterwards, the connection can be re-established by either side.

/update-identity
Interactively update current identity information

/quit
Quit the erebos tool.

Storage

Data are by default stored within .erebos subdirectory of the current working directory. This can be overriden by EREBOS_DIR environment variable.

Private keys are currently stored in plaintext under the keys subdirectory of the erebos directory.