transient-universe-tls: transient with secure communications

[ bsd3, library, network ] [ Propose Tags ]

Secure communications for transient

[Skip to Readme]


  • Transient
    • Transient.TLS


Maintainer's Corner

Package maintainers

For package maintainers and hackage trustees


  • No Candidates
Versions [RSS],
Change log
Dependencies base (>=4.8 && <5.9), bytestring, cprng-aes, data-default, network, tls, transient, transient-universe (>=0.4.1), x509-store, x509-system [details]
License BSD-3-Clause
Author Alberto G. Corona
Category Network
Home page
Source repo head: git clone
Uploaded by AlbertoCorona at 2018-04-15T15:33:24Z
Distributions NixOS:
Reverse Dependencies 1 direct, 0 indirect [details]
Downloads 1081 total (5 in the last 30 days)
Rating (no votes yet) [estimated by Bayesian average]
Your Rating
  • λ
  • λ
  • λ
Status Docs not available [build log]
All reported builds failed as of 2018-04-15 [all 3 reports]

Readme for transient-universe-tls-

[back to package description]


Secure communications for transient-universe.

initTLS must be called before using any communication. Then any connection with other nodes is atempted to be secure. It is necessary a certificate and a key for the node at the folder where it is executed. Certificate verification from calling nodes is disabled in this version, so encription of messages among nodes, and not verification is the goal initially.

upon initTLS has been called, any connect will try to establish a secure connection or will fail.

Connection from web nodes accept https requests. If a connection is secure, socket communications are encripted too.

In order to generate a self-signed certificate for testing, try the following:

 openssl genrsa -out key.pem 2048
 openssl req -new -key key.pem -out certificate.csr
 openssl x509 -req -in certificate.csr -signkey key.pem -out certificate.pem