|
1 year ago | |
---|---|---|
doc | 1 year ago | |
ipv8 | 6 years ago | |
twisted/plugins | 6 years ago | |
.gitignore | 6 years ago | |
.gitmodules | 6 years ago | |
.pylintrc | 6 years ago | |
LICENSE | 7 years ago | |
README.md | 1 year ago | |
__init__.py | 7 years ago | |
create_test_coverage_report.py | 6 years ago | |
ipv8_service.py | 6 years ago | |
requirements.txt | 6 years ago | |
run_all_tests_unix.sh | 1 year ago | |
setup.py | 6 years ago | |
test_classes_list.txt | 6 years ago |
README.md
What is IPv8 ?
IPv8 aims to provide authenticated communication with privacy.
This project has been evacuated from NSA/Microsoft Github.
(I know the name is kinda crazy but that's what they called it)
IPv8 Objectives
- Authentication. We offer mutual authentication using strong cryptography. During an IPv8 communication session, both parties can be sure of the other party’s identity. IPv8 users are identified by their public key. The initial key exchange is designed so that secrets are never transmitted across the Internet, not even in encrypted form. We use a standard challenge/response protocol with protection against spoofing, man-in-the-middle, and replay attacks.
- Privacy. IPv8 is specifically designed for strong privacy protection and end-to-end encryption with perfect forward secrecy. We enhanced the industry standard onion routing protocol, Tor, for usage in a trustless environment (e.g. no trusted central directory servers).
- No infrastructure dependency. Everybody is equal in the world of IPv8. No central web server, discovery server, or support foundation is needed.
- NAT traversal. IPv8 can establish direct communication in difficult network situations. This includes connecting people behind a NAT or firewall. IPv8 includes a single simple and effective NAT traversal technique: UDP hole-punching. This is essential when offering privacy without infrastructure and consumer-grade donated resources.
- Trust. You can enhance your security if you tell IPv8 which people you know and trust. It tries to build a web-of-trust automatically.
This package contains IPv8: an amalgamation of peer-to-peer communication functionality from Dispersy and Tribler, developed over the last 10+ years by students and employees of the Delft University of Technology.
The IPv8 library allows you to interface with the existing Dispersy network to build your own applications.
Functionality included by IPv8 at this point is:
- Cryptographically signed messaging
- Tor-like anonymous messaging
- Public service discovery
- Hidden service discovery
- TrustChain self-sovereign blockchain
- Peer discovery using random walks and (sybil resistant) edge walks
- Peer keep-alive mechanisms
- Hidden attribute attestation
Implementations on the horizon of this library are stream-based messaging (instead of packet-based), scalable TrustChain concensus and mixnet functionality.
Dependencies
The dependencies for IPv8 are collected in the requirements.txt
file
At one point they could be installed using pip
:
pip install --upgrade -r requirements.txt
The libsodium library will have to be installed manually. Please follow the instructions for your platform below:
Devuan/Debian/Ubuntu:
sudo apt-get install libsodium18
Tests
The test suite can run without any external packages, but the nosetests
package is recommended (pip install nose
).
The test suite will automatically detect your back-end when running the tests.
Running tests can be done (on UNIX) by running:
bash run_all_tests_unix.sh
Getting started
IPv8 can be used as a library or as a service. It is easiest to start off with the service, which has been provided here (see the configuration file for invocation options). This file will load the IPv8 stack for signed messaging, anonymous messaging, attribute attestation, public service discovery, peer discovery and peer keep-alive. You can start creating your first network overlay by following the overlay creation tutorial.
Additional documentation is also available for the TrustChain and anonymization provided in IPv8.