transient-universe-tls: transient with secure communications

[ bsd3, library, network ] [ Propose Tags ] [ Report a vulnerability ]

Secure communications for transient


[Skip to Readme]

Modules

  • Transient
    • Transient.TLS

Downloads

Maintainer's Corner

Package maintainers

For package maintainers and hackage trustees

Candidates

  • No Candidates
Versions [RSS] 0.1.0.0, 0.1.1.0
Change log ChangeLog.md
Dependencies base (>=4.8 && <5.9), bytestring, cprng-aes, data-default, network, tls, transient, transient-universe (>=0.4.1), x509-store, x509-system [details]
License BSD-3-Clause
Author Alberto G. Corona
Maintainer agocorona@gmail.com
Category Network
Home page http://github.com/transient-haskell/transient-universe-tls
Source repo head: git clone http://github.com/transient-haskell/transient-universe-tls
Uploaded by AlbertoCorona at 2018-04-15T15:33:24Z
Distributions
Reverse Dependencies 1 direct, 0 indirect [details]
Downloads 1180 total (11 in the last 30 days)
Rating (no votes yet) [estimated by Bayesian average]
Your Rating
  • λ
  • λ
  • λ
Status Docs not available [build log]
All reported builds failed as of 2018-04-15 [all 3 reports]

Readme for transient-universe-tls-0.1.1.0

[back to package description]

transient-universe-tls

Secure communications for transient-universe.

initTLS must be called before using any communication. Then any connection with other nodes is atempted to be secure. It is necessary a certificate and a key for the node at the folder where it is executed. Certificate verification from calling nodes is disabled in this version, so encription of messages among nodes, and not verification is the goal initially.

upon initTLS has been called, any connect will try to establish a secure connection or will fail.

Connection from web nodes accept https requests. If a connection is secure, socket communications are encripted too.

In order to generate a self-signed certificate for testing, try the following:

 openssl genrsa -out key.pem 2048
 openssl req -new -key key.pem -out certificate.csr
 openssl x509 -req -in certificate.csr -signkey key.pem -out certificate.pem