lnd/brontide
Eugene Siegel bdcdecbe1d server.go+accessman.go: introduce caches for access permissions
Here we introduce the access manager which has caches that will
determine the access control status of our peers. Peers that have
had their funding transaction confirm with us are protected. Peers
that only have pending-open channels with us are temporary access
and can have their access revoked. The rest of the peers are granted
restricted access.
2025-02-28 14:00:21 -05:00
..
bench_test.go brontide: replace defer cleanup with t.Cleanup 2022-10-13 17:01:35 +08:00
conn.go multi: use btcd's btcec/v2 and btcutil modules 2022-03-09 19:02:37 +01:00
fuzz_test.go brontide: derandomize fuzz tests 2023-05-23 08:32:13 -05:00
listener.go server.go+accessman.go: introduce caches for access permissions 2025-02-28 14:00:21 -05:00
noise.go chore: fix some comments for struct field 2024-07-16 11:44:35 +08:00
noise_test.go server.go+accessman.go: introduce caches for access permissions 2025-02-28 14:00:21 -05:00
README.md scripted-diff: replace ⛰ emoji with $ [skip ci] 2022-10-28 12:06:49 -04:00

brontide

Build Status MIT licensed GoDoc

The brontide package implements a secure crypto messaging protocol based off of the Noise Protocol Framework. The package exposes the raw state machine that handles the handshake and subsequent message encryption/decryption scheme. Additionally, the package exposes a net.Conn and a net.Listener interface implementation which allows the encrypted transport to be seamlessly integrated into a codebase.

The secure messaging scheme implemented within this package is described in detail in BOLT #8 of the Lightning Network specifications.

This package has intentionally been designed so it can be used as a standalone package for any projects needing secure encrypted+authenticated communications between network enabled programs.

Installation and Updating

$  go get -u github.com/lightningnetwork/lnd/brontide