Rust asynchronous PSEC implementation built with the tokio framework.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
Hardcore Sushi 3e5442cb8e
Update to PSEC v0.4
2 months ago
src Update to PSEC v0.4 2 months ago
tests Use into_split() in test 3 months ago
.gitignore Genesis 4 months ago
Cargo.toml Update to PSEC v0.4 2 months ago
LICENSE Genesis 4 months ago
README.md Update to PSEC v0.4 2 months ago

README.md

PSEC (Peer-to-peer Secure Ephemeral Communications) is a simplification/adaptation of TLS 1.3 for P2P networks which provides an encrypted and authenticated secure transport layer for ephemeral communications. PSEC ensures deniability, forward secrecy, future secrecy, and optional plaintext length obfuscation. This crate is an implementation of this protocol built in rust with the tokio framework.

Disclaimer

Neither the code of this crate or the PSEC protocol received any security audit and therefore shouldn't be considered fully secure. This software is provided "as is", without any warranty of any kind.

Example

use rand::rngs::OsRng;
use tokio::net::TcpStream;
use async_psec::{Session, Identity, PsecReader, PsecWriter, PsecError};

#[tokio::main]
async fn main() -> Result<(), PsecError> {
    let identity = Identity::generate(&mut OsRng); //generate a new PSEC identity

    //connect to another PSEC node listening on 10.152.152.10:7530
    let stream = TcpStream::connect("10.152.152.10:7530").await.unwrap();

    let mut psec_session = Session::from(stream); //wrap the TcpStream into a PSEC session
    psec_session.do_handshake(&identity).await?; //perform the PSEC handshake
    
    //encrypt a message, obfuscate its length with padding then send it
    psec_session.encrypt_and_send(b"Hello I'm Alice", true).await?;
    //receive then decrypt a message
    println!("Received: {:?}", psec_session.receive_and_decrypt().await?);
}

Intstallation

To add this crate to your project, add the following to your project's Cargo.toml:

[dependencies]
async-psec = "0.4"

Documentation

The API documentation can be found here.

Authenticity

If you want to use this crate in a critical project, I don't recommend to use crates.io. Instead, download the code from the repository:

git clone https://forge.chapril.org/hardcoresushi/async-psec

And add this to your Cargo.toml:

[patch.crates-io]
async-psec = { path = "<path to the async-psec folder>" }

All commits should be signed with my PGP key. Don't use this crate if the verification fails !

You can import my key from keyservers with:

gpg --keyserver hkp://pool.sks-keyservers.net --recv-keys 007F84120107191E

Fingerprint: BD56 2147 9E7B 74D3 6A40 5BE8 007F 8412 0107 191E
Email: Hardcore Sushi <hardcore.sushi@disroot.org>

Once imported, verify the latest commit:

cd async-psec
git verify-commit HEAD

This should show you something like:

gpg: Signature made <date>
gpg:                using RSA key BD5621479E7B74D36A405BE8007F84120107191E
gpg: Good signature from "Hardcore Sushi <hardcore.sushi@disroot.org>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: BD56 2147 9E7B 74D3 6A40  5BE8 007F 8412 0107 191E