Crates.io | networking |
lib.rs | networking |
version | 0.1.9 |
source | src |
created_at | 2020-07-15 02:17:36.690912 |
updated_at | 2020-08-13 01:32:45.282414 |
description | secure RSA + AES network implementations in a peer to peer enabled manner |
homepage | |
repository | https://github.com/artifice-network/networking |
max_upload_size | |
id | 265276 |
size | 162,723 |
The purpose of this network is to provide secured AES asymmetric implementation that uses RSA. it is being designed as the network layer for a distributed artificial inteligence training platform known as Artifice. currently this crate is the furthest along in the Artifice Project by far.
This crate aims to prevent man in the middle attacks by encrypting pre-shared keys that are sent in each packet. By doing this, even if a hacker has a public key, they will be unable to feed false information that could cause a crash to either of the peers. in this way each peer can maintain knowledge of the other in both directions, which allows for a more decentralized approach than traditional TLS.
This version is a patch for previous version, it fixes the issue of packets being joined in tcp with respect to packet decryption. it also provides a more efficient means of using aes, in which instead of using a new aes key per packet, one is held for the entires session, increase the encryption speed at least 4x. This version also provides a patch for data being fragmented according to the MTU of the NIC.
This crate is the base for a much larger project, as such submitting it to crates.io is simply done in order to test it, as such please don't hesitate to file bug reports, or use the below email.
email: artificenetwork@gmail.com
The SLLP implementation in this project ensures a pseudo connection that is private between two peers, by authenticating encrypted pre-shared keys. it is done for the sake of transfering large amounts of data quickly when precision is not needed.
use networking::database::HashDatabase;
use networking::ArtificePeer;
use networking::{random_string, test_config};
fn main(){
// generate aes encryption key
let key = random_string(16).into_bytes();
let (peer, _config) = test_config();
let mut database: HashDatabase<ArtificePeer> = HashDatabase::new("./test_db", key.clone()).unwrap();
database.insert(peer.global_peer_hash().to_string(), peer.clone()).unwrap();
let mut second_database: HashDatabase<ArtificePeer> = HashDatabase::new("./test_db", key).unwrap();
second_database.load(&peer.global_peer_hash().to_string()).unwrap();
let newpeer = second_database.get(&peer.global_peer_hash().to_string()).unwrap();
}
tokio = {version = "0.2.21", features = ["full"]}
use networking::{asyncronous::{AsyncHost, AsyncRecv}, test_config};
#[tokio::main]
async fn main() -> Result<(), Box<dyn std::error::Error>> {
let (peer, config) = test_config();
let host = AsyncHost::client_only(&config).await.unwrap();
let mut stream = host.connect(peer).await.unwrap();
let mut buffer = Vec::new();
println!(
"got {} bytes from server",
stream.recv(&mut buffer).await.unwrap()
);
let string = String::from_utf8(buffer).unwrap();
println!("got message: {} from server", string);
Ok(())
}
use networking::{asyncronous::{AsyncHost, AsyncSend, AsyncNetworkHost}, test_config};
#[tokio::main]
async fn main() -> Result<(), Box<dyn std::error::Error>> {
let (peer, config) = test_config();
let mut host = AsyncHost::from_host_config(&config).await.unwrap();
while let Some(Ok(strm)) = host.incoming()?.await {
let mut stream = strm.verify(&peer)?;
// make sure you got a connection from the correct peer
println!("sending message hello world");
stream.send(b"hello world").await.unwrap();
}
Ok(())
}
for sync examples and sllp examples see docs the camera example is to show a practical application, and test the network by supplying high load