status-go/vendor/github.com/pion/dtls/v2
Siddarth Kumar 926f6a3c72 Revert "test: bump go-libp2p"
This reverts commit d0ca4447c6.
2024-01-18 20:29:33 +00:00
..
internal Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
pkg Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
.editorconfig Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
.gitignore Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
.golangci.yml Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
AUTHORS.txt Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
LICENSE Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
Makefile Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
README.md Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
certificate.go Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
cipher_suite.go Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
cipher_suite_go114.go Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
codecov.yml Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
compression_method.go Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
config.go Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
conn.go Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
crypto.go Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
dtls.go Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
errors.go Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
errors_errno.go Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
errors_noerrno.go Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
flight.go Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
flight0handler.go Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
flight1handler.go Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
flight2handler.go Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
flight3handler.go Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
flight4bhandler.go Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
flight4handler.go Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
flight5bhandler.go Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
flight5handler.go Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
flight6handler.go Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
flighthandler.go Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
fragment_buffer.go Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
fuzz.go Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
handshake_cache.go Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
handshaker.go Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
listener.go Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
packet.go Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
renovate.json Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
resume.go Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
session.go Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
srtp_protection_profile.go Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
state.go Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00
util.go Revert "test: bump go-libp2p" 2024-01-18 20:29:33 +00:00

README.md


Pion DTLS

A Go implementation of DTLS

Pion DTLS Sourcegraph Widget Slack Widget
Build Status GoDoc Coverage Status Go Report Card Codacy Badge License: MIT


Native DTLS 1.2 implementation in the Go programming language.

A long term goal is a professional security review, and maybe an inclusion in stdlib.

Goals/Progress

This will only be targeting DTLS 1.2, and the most modern/common cipher suites. We would love contributions that fall under the 'Planned Features' and any bug fixes!

Current features

  • DTLS 1.2 Client/Server
  • Key Exchange via ECDHE(curve25519, nistp256, nistp384) and PSK
  • Packet loss and re-ordering is handled during handshaking
  • Key export (RFC 5705)
  • Serialization and Resumption of sessions
  • Extended Master Secret extension (RFC 7627)
  • ALPN extension (RFC 7301)

Supported ciphers

ECDHE
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM (RFC 6655)
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (RFC 6655)
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (RFC 5289)
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (RFC 5289)
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (RFC 5289)
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (RFC 5289)
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (RFC 8422)
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (RFC 8422)
PSK
  • TLS_PSK_WITH_AES_128_CCM (RFC 6655)
  • TLS_PSK_WITH_AES_128_CCM_8 (RFC 6655)
  • TLS_PSK_WITH_AES_128_GCM_SHA256 (RFC 5487)
  • TLS_PSK_WITH_AES_128_CBC_SHA256 (RFC 5487)

Planned Features

  • Chacha20Poly1305

Excluded Features

  • DTLS 1.0
  • Renegotiation
  • Compression

Using

This library needs at least Go 1.13, and you should have Go modules enabled.

Pion DTLS

For a DTLS 1.2 Server that listens on 127.0.0.1:4444

go run examples/listen/selfsign/main.go

For a DTLS 1.2 Client that connects to 127.0.0.1:4444

go run examples/dial/selfsign/main.go

OpenSSL

Pion DTLS can connect to itself and OpenSSL.

  // Generate a certificate
  openssl ecparam -out key.pem -name prime256v1 -genkey
  openssl req -new -sha256 -key key.pem -out server.csr
  openssl x509 -req -sha256 -days 365 -in server.csr -signkey key.pem -out cert.pem

  // Use with examples/dial/selfsign/main.go
  openssl s_server -dtls1_2 -cert cert.pem -key key.pem -accept 4444

  // Use with examples/listen/selfsign/main.go
  openssl s_client -dtls1_2 -connect 127.0.0.1:4444 -debug -cert cert.pem -key key.pem

Using with PSK

Pion DTLS also comes with examples that do key exchange via PSK

Pion DTLS

go run examples/listen/psk/main.go
go run examples/dial/psk/main.go

OpenSSL

  // Use with examples/dial/psk/main.go
  openssl s_server -dtls1_2 -accept 4444 -nocert -psk abc123 -cipher PSK-AES128-CCM8

  // Use with examples/listen/psk/main.go
  openssl s_client -dtls1_2 -connect 127.0.0.1:4444 -psk abc123 -cipher PSK-AES128-CCM8

Contributing

Check out the contributing wiki to join the group of amazing people making this project possible:

License

MIT License - see LICENSE for full text