transient-universe-tls: transient with secure communications

[ bsd3, library, network ] [ Propose Tags ]

Secure communications for transient


[Skip to Readme]
Versions 0.1.0.0, 0.1.1.0
Change log ChangeLog.md
Dependencies base (>=4.8 && <5.9), bytestring, cprng-aes, data-default, network, tls, transient, transient-universe (>=0.4.1), x509-store, x509-system [details]
License BSD-3-Clause
Author Alberto G. Corona
Maintainer agocorona@gmail.com
Category Network
Home page http://github.com/transient-haskell/transient-universe-tls
Source repo head: git clone http://github.com/transient-haskell/transient-universe-tls
Uploaded by AlbertoCorona at Sun Apr 15 15:33:24 UTC 2018
Distributions NixOS:0.1.1.0
Downloads 216 total (11 in the last 30 days)
Rating (no votes yet) [estimated by rule of succession]
Your Rating
  • λ
  • λ
  • λ
Status Docs not available [build log]
All reported builds failed as of 2018-04-15 [all 3 reports]
Hackage Matrix CI

Modules

  • Transient
    • Transient.TLS

Downloads

Maintainer's Corner

For package maintainers and hackage trustees


Readme for transient-universe-tls-0.1.1.0

[back to package description]

transient-universe-tls

Secure communications for transient-universe. initTLS must be called before using any communication. Then any connection with other nodes is atempted to be secure. It is necessary a certificate and a key for the node at the folder where it is executed. Certificate verification from calling nodes is disabled in this version, so encription of messages among nodes, and not verification is the goal initially. upon initTLS has been called, any connect will try to establish a secure connection or will fail. Connection from web nodes accept https requests. If a connection is secure, socket communications are encripted too. In order to generate a self-signed certificate for testing, try the following: openssl genrsa -out key.pem 2048 openssl req -new -key key.pem -out certificate.csr openssl x509 -req -in certificate.csr -signkey key.pem -out certificate.pem