-
Notifications
You must be signed in to change notification settings - Fork 37
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
TLS #63
Comments
if anyone is going to work this bounty, please contact me first to discuss issues with it |
Is anyone currently working on this? |
@kentsommer I have spent a lot of time on this, but I am still learning. If I am in the right direction, you can build on or checkout what I did so far here: https://github.com/csharpee/hush/tree/hush-tls At the moment, the build is not successful and has header.h files needing to be added or updated --I am still not sure. I read through 124 commits and added only tls & openssl related things into the hush codebase from ZcashOfficial TLS_Integration help shared here by @leto This is the error I am getting after building: In file included from main.h:18:0, |
Nice, good work @kentsommer -- you make this look easy =). I didn't want to just copy everything over so I setup a C++ IDE and started reading through the code to make sense of it. I went through each commit and possibly missed something. I started to think maybe zcash disabled this for its earlier version and begun looking through the depends/packages/openssl.mk file to make sure we weren't using old SSL and also made sure we can use Diffie-Hellman key exchanges for our nodes. Everything looked good to my knowledge. I need to go back through the code and see what I did wrong. I do know, I did not setup the CA or TLS for my node to work for I was unable to build. I think its a simple fix, just clueless at the moment. I will dive into more tomorrow after class if I can. Some concerns at the moment are if we want to allow nodes to connect to other nodes without TLS. The setup as is now is setup to allow both non-TLS and TLS nodes. I did not disable public nodes for not sure what Hush wanted. -Should TLS only be allowed or at least (recommended)? Some testing I want to do: |
@csharpee Hopefully I haven't stepped on any toes, just trying to get hush pushed forward 👍 Yes, I agree, allowing the choice to connect to TLS only would be a good thing to add. Notes for you (@csharpee):
|
No not at all man, I am still learning and am happy to help. You are being more than respectful, I am with you - getting hush pushed forward 👍 |
The secure node system in hush might also require something similar to the secure node tracking in zencash (outline is on page 10 and 11 of their whitepaper). Not sure what it would look like, but making that system decentralized seems like a good move. @radix42 Any thoughts on system architecture / do we require this? |
@kentsommer thanks for the tips man. I got the build working. I don't have a CA setup yet though on testing user account.
|
@kentsommer could you join us in our Discord sometime? @radix42 and I would like to group chat you one night. |
I'm in the KST (Korean Standard) time zone, but if you had a time in mind (evening or morning my time would be best - busy during the day) I am happy to chat for a bit. |
Heads up I will be in Korea around mid Feb, for three years. Sounds like a plan I will chat with @radix42 about a time. |
|
@aayanl Payments as in rewards to those running the secure nodes? |
Yes
…On Nov 8, 2017 2:05 AM, "Kent Sommer" ***@***.***> wrote:
@aayanl <https://github.com/aayanl> Payments as in rewards to those
running the secure nodes?
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#63 (comment)>, or mute
the thread
<https://github.com/notifications/unsubscribe-auth/AJmmkdZcH0ycvdpDRN9uoaZ2p4v_zI3xks5s0VK8gaJpZM4QMYMV>
.
|
I can't wait for those doc to contribute to the testing ! |
Re: managing TLS nodes I think we can simply manage this by inserting a new config glad 0: False We can maintain a second DNS seed for TLS nodes. Thoughts @radix42 @kentsommer @madbuda ? |
That sounds reasonable to me if we stick with TLS as the peer-to-peer encryption scheme. However, I'm not super set that TLS is the way to go for this security enhancement. I've been looking at the solution proposed in BIP 151 as well. I floated the idea by @radix42 recently but I think we should get everyone's opinion. |
I'll give it a read. I am ok with whatever the group reaches consenses with. |
👍 on BIP 151 |
@kentsommer I concur and am ok with BIP 151. |
After discussion between myself, @radix42, and @kentsommer, we have decided to PR the TLS branch. BIP 151 might be implemented on a future date/time. |
👍 the ca stuff is only unique to zen securenodes, glad to see more coins implementing encrypted network stacks 😃 |
This is closed out by #68 |
Describe the issue
Hush only supports HTTP and therefore connecting to an RPC backend is only "safe" over localhost, otherwise it would leak lots of metadata and rpc user/pass. Hush should support TLS like Bitcoin and other coins like Zen. Encrypted p2p connections will additionally greatly reduce network metadata available to snoopy people.
Bounty
TBD
Can you reliably reproduce the issue?
Yup
If so, please list the steps to reproduce below:
Expected behaviour
Support TLS connections,
Actual behaviour + errors
No TLS
The version of Hush you were using:
All
Prior Art
See ZEN's TLS_integration branch: https://github.com/zencashio/zen/compare/master...ZencashOfficial:TLS_integration?expand=1
and the corresponding issue: HorizenOfficial/zen#26
The text was updated successfully, but these errors were encountered: