A library to handle secure TCP connections over a custom protocol.
Warning: This library is not complete and contains unfinished code.
kinetra.de/net uses AES-256 for data encryption, ECDH P521 for key exchange, and ECDSA P521 for signing.
To efficiently encode data, kinetra.de/net utilizes benc as its serializer.
If the private key of the server's certificate is compromised or just expired, simply generate a new one and update the client's root key as well. cosair.gg encodes a version field into the certificate and root key to verify that the client is always in sync with the server. If the versions do not match, a clear error will be returned.
As simple as go run kinetra.de/net/gen -v {VERSION_NUMBER}
, everything is done locally on your machine. To ensure that the root key is in sync with the certificate, it will be generated as well.
- [Client]: I want your certificate to prove your identity as [Server].
- [Server]: Sure, here’s my certificate.
- [Client]: I'll check the signature using my root key, verifying that the public key was not compromised, is not expired, and matches the expected version.
- [Client]: I verified it; it's valid. Here’s my public key. I'll create a shared secret using your public key.
- [Server]: I have the shared secret now too. Let me verify that we have the same and that your public key was not compromised as well. I’ll send you an encrypted message using the shared secret.
- [Client]: I successfully decrypted the message. Our connection is now secure!
Find examples here.