rns


Namerns JSON
Version 0.8.8 PyPI version JSON
download
home_pagehttps://reticulum.network/
SummarySelf-configuring, encrypted and resilient mesh networking stack for LoRa, packet radio, WiFi and everything in between
upload_time2024-12-11 21:29:35
maintainerNone
docs_urlNone
authorMark Qvist
requires_python>=3.7
licenseNone
keywords
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            Reticulum Network Stack β <img align="right" src="https://static.pepy.tech/personalized-badge/rns?period=total&units=international_system&left_color=grey&right_color=blue&left_text=Installs" style="padding-left:10px"/><a href="https://github.com/markqvist/Reticulum/actions/workflows/build.yml"><img align="right" src="https://github.com/markqvist/Reticulum/actions/workflows/build.yml/badge.svg"/></a>
==========

<p align="center"><img width="200" src="https://raw.githubusercontent.com/markqvist/Reticulum/master/docs/source/graphics/rns_logo_512.png"></p>

Reticulum is the cryptography-based networking stack for building local and wide-area
networks with readily available hardware. It can operate even with very high latency
and extremely low bandwidth. Reticulum allows you to build wide-area networks
with off-the-shelf tools, and offers end-to-end encryption and connectivity,
initiator anonymity, autoconfiguring cryptographically backed multi-hop
transport, efficient addressing, unforgeable delivery acknowledgements and
more.

The vision of Reticulum is to allow anyone to be their own network operator,
and to make it cheap and easy to cover vast areas with a myriad of independent,
inter-connectable and autonomous networks. Reticulum **is not** *one* network.
It is **a tool** for building *thousands of networks*. Networks without
kill-switches, surveillance, censorship and control. Networks that can freely
interoperate, associate and disassociate with each other, and require no
central oversight. Networks for human beings. *Networks for the people*.

Reticulum is a complete networking stack, and does not rely on IP or higher
layers, but it is possible to use IP as the underlying carrier for Reticulum.
It is therefore trivial to tunnel Reticulum over the Internet or private IP
networks.

Having no dependencies on traditional networking stacks frees up overhead that
has been used to implement a networking stack built directly on cryptographic
principles, allowing resilience and stable functionality, even in open and
trustless networks.

No kernel modules or drivers are required. Reticulum runs completely in
userland, and can run on practically any system that runs Python 3.

## Read The Manual
The full documentation for Reticulum is available at [markqvist.github.io/Reticulum/manual/](https://markqvist.github.io/Reticulum/manual/).

You can also download the [Reticulum manual as a PDF](https://github.com/markqvist/Reticulum/raw/master/docs/Reticulum%20Manual.pdf) or [as an e-book in EPUB format](https://github.com/markqvist/Reticulum/raw/master/docs/Reticulum%20Manual.epub).

For more info, see [reticulum.network](https://reticulum.network/) and [the FAQ section of the wiki](https://github.com/markqvist/Reticulum/wiki/Frequently-Asked-Questions).

## Notable Features
- Coordination-less globally unique addressing and identification
- Fully self-configuring multi-hop routing over heterogeneous carriers
- Flexible scalability over heterogeneous topologies
  - Reticulum can carry data over any mixture of physical mediums and topologies
  - Low-bandwidth networks can co-exist and interoperate with large, high-bandwidth networks
- Initiator anonymity, communicate without revealing your identity
  - Reticulum does not include source addresses on any packets
- Asymmetric X25519 encryption and Ed25519 signatures as a basis for all communication
  - The foundational Reticulum Identity Keys are 512-bit Elliptic Curve keysets
- Forward Secrecy is available for all communication types, both for single packets and over links
- Reticulum uses the following format for encrypted tokens:
  - Ephemeral per-packet and link keys and derived from an ECDH key exchange on Curve25519
  - AES-128 in CBC mode with PKCS7 padding
  - HMAC using SHA256 for authentication
  - IVs are generated through os.urandom()
- Unforgeable packet delivery confirmations
- Flexible and extensible interface system
  - Reticulum includes a large variety of built-in interface types
  - Ability to load and utilise custom user- or community-supplied interface types
  - Easily create your own custom interfaces for communicating over anything
- Authentication and virtual network segmentation on all supported interface types
- An intuitive and easy-to-use API
  - Simpler and easier to use than sockets APIs and simpler, but more powerful
  - Makes building distributed and decentralised applications much simpler
- Reliable and efficient transfer of arbitrary amounts of data
  - Reticulum can handle a few bytes of data or files of many gigabytes
  - Sequencing, compression, transfer coordination and checksumming are automatic
  - The API is very easy to use, and provides transfer progress
- Lightweight, flexible and expandable Request/Response mechanism
- Efficient link establishment
  - Total cost of setting up an encrypted and verified link is only 3 packets, totalling 297 bytes
  - Low cost of keeping links open at only 0.44 bits per second
- Reliable sequential delivery with Channel and Buffer mechanisms

## Roadmap
While Reticulum is already a fully featured and functional networking stack,
many improvements and additions are actively being worked on, and planned for the future.

To learn more about the direction and future of Reticulum, please see the [Development Roadmap](./Roadmap.md).

## Examples of Reticulum Applications
If you want to quickly get an idea of what Reticulum can do, take a look at the
following resources.

- You can use the [rnsh](https://github.com/acehoss/rnsh) program to establish remote shell sessions over Reticulum.
- [LXMF](https://github.com/markqvist/lxmf) is a distributed, delay and disruption tolerant message transfer protocol built on Reticulum
- For an off-grid, encrypted and resilient mesh communications platform, see [Nomad Network](https://github.com/markqvist/NomadNet)
- The Android, Linux, macOS and Windows app [Sideband](https://github.com/markqvist/Sideband) has a graphical interface and focuses on ease of use.
- [MeshChat](https://github.com/liamcottle/reticulum-meshchat) is a user-friendly LXMF client, that also supports voice calls.

## Where can Reticulum be used?
Over practically any medium that can support at least a half-duplex channel
with greater throughput than 5 bits per second, and an MTU of 500 bytes. Data radios,
modems, LoRa radios, serial lines, AX.25 TNCs, amateur radio digital modes,
WiFi and Ethernet devices, free-space optical links, and similar systems are
all examples of the types of physical devices Reticulum can use.

An open-source LoRa-based interface called
[RNode](https://markqvist.github.io/Reticulum/manual/hardware.html#rnode) has
been designed specifically for use with Reticulum. It is possible to build
yourself, or it can be purchased as a complete transceiver that just needs a
USB connection to the host.

Reticulum can also be encapsulated over existing IP networks, so there's
nothing stopping you from using it over wired Ethernet, your local WiFi network
or the Internet, where it'll work just as well. In fact, one of the strengths
of Reticulum is how easily it allows you to connect different mediums into a
self-configuring, resilient and encrypted mesh, using any available mixture of
available infrastructure.

As an example, it's possible to set up a Raspberry Pi connected to both a LoRa
radio, a packet radio TNC and a WiFi network. Once the interfaces are
configured, Reticulum will take care of the rest, and any device on the WiFi
network can communicate with nodes on the LoRa and packet radio sides of the
network, and vice versa.

## How do I get started?
The best way to get started with the Reticulum Network Stack depends on what
you want to do. For full details and examples, have a look at the 
[Getting Started Fast](https://markqvist.github.io/Reticulum/manual/gettingstartedfast.html) 
section of the [Reticulum Manual](https://markqvist.github.io/Reticulum/manual/).

To simply install Reticulum and related utilities on your system, the easiest way is via `pip`.
You can then start any program that uses Reticulum, or start Reticulum as a system service with
[the rnsd utility](https://markqvist.github.io/Reticulum/manual/using.html#the-rnsd-utility).

```bash
pip install rns
```

If you are using an operating system that blocks normal user package installation via `pip`,
you can return `pip` to normal behaviour by editing the `~/.config/pip/pip.conf` file,
and adding the following directive in the `[global]` section:

```text
[global]
break-system-packages = true
```

Alternatively, you can use the `pipx` tool to install Reticulum in an isolated environment:

```bash
pipx install rns
```

When first started, Reticulum will create a default configuration file,
providing basic connectivity to other Reticulum peers that might be locally
reachable. The default config file contains a few examples, and references for
creating a more complex configuration.

If you have an old version of `pip` on your system, you may need to upgrade it first with `pip install pip --upgrade`. If you no not already have `pip` installed, you can install it using the package manager of your system with `sudo apt install python3-pip` or similar.

For more detailed examples on how to expand communication over many mediums such 
as packet radio or LoRa, serial ports, or over fast IP links and the Internet using 
the UDP and TCP interfaces, take a look at the [Supported Interfaces](https://markqvist.github.io/Reticulum/manual/interfaces.html) 
section of the [Reticulum Manual](https://markqvist.github.io/Reticulum/manual/).

## Included Utilities
Reticulum includes a range of useful utilities for managing your networks, 
viewing status and information, and other tasks. You can read more about these 
programs in the [Included Utility Programs](https://markqvist.github.io/Reticulum/manual/using.html#included-utility-programs) 
section of the [Reticulum Manual](https://markqvist.github.io/Reticulum/manual/).

- The system daemon `rnsd` for running Reticulum as an always-available service
- An interface status utility called `rnstatus`, that displays information about interfaces
- The path lookup and management tool `rnpath` letting you view and modify path tables
- A diagnostics tool called `rnprobe` for checking connectivity to destinations
- A simple file transfer program called `rncp` making it easy to transfer files between systems
- The identity management and encryption utility `rnid` let's you manage Identities and encrypt/decrypt files
- The remote command execution program `rnx` let's you run commands and
  programs and retrieve output from remote systems

All tools, including `rnx` and `rncp`, work reliably and well even over very
low-bandwidth links like LoRa or Packet Radio. For full-featured remote shells
over Reticulum, also have a look at the [rnsh](https://github.com/acehoss/rnsh)
program.

## Supported interface types and devices

Reticulum implements a range of generalised interface types that covers most of
the communications hardware that Reticulum can run over. If your hardware is
not supported, it's [simple to implement a custom interface module](https://markqvist.github.io/Reticulum/manual/interfaces.html#custom-interfaces).

Pull requests for custom interfaces are gratefully accepted, provided they are
generally useful and well-tested in real-world usage.

Currently, the following built-in interfaces are supported:

- Any Ethernet device
- LoRa using [RNode](https://unsigned.io/rnode/)
- Packet Radio TNCs (with or without AX.25)
- KISS-compatible hardware and software modems
- Any device with a serial port
- TCP over IP networks
- UDP over IP networks
- External programs via stdio or pipes
- Custom hardware via stdio or pipes

## Performance
Reticulum targets a *very* wide usable performance envelope, but prioritises
functionality and performance on low-bandwidth mediums. The goal is to
provide a dynamic performance envelope from 250 bits per second, to 1 gigabit
per second on normal hardware.

Currently, the usable performance envelope is approximately 150 bits per second
to 40 megabits per second, with physical mediums faster than that not being
saturated. Performance beyond the current level is intended for future
upgrades, but not highly prioritised at this point in time.

## Current Status
Reticulum should currently be considered beta software. All core protocol
features are implemented and functioning, but additions will probably occur as
real-world use is explored. There will be bugs. The API and wire-format can be
considered relatively stable at the moment, but could change if warranted.

## Dependencies
The installation of the default `rns` package requires the dependencies listed
below. Almost all systems and distributions have readily available packages for
these dependencies, and when the `rns` package is installed with `pip`, they
will be downloaded and installed as well.

- [PyCA/cryptography](https://github.com/pyca/cryptography)
- [pyserial](https://github.com/pyserial/pyserial)

On more unusual systems, and in some rare cases, it might not be possible to
install or even compile one or more of the above modules. In such situations,
you can use the `rnspure` package instead, which require no external
dependencies for installation. Please note that the contents of the `rns` and
`rnspure` packages are *identical*. The only difference is that the `rnspure`
package lists no dependencies required for installation.

No matter how Reticulum is installed and started, it will load external
dependencies only if they are *needed* and *available*. If for example you want
to use Reticulum on a system that cannot support
[pyserial](https://github.com/pyserial/pyserial), it is perfectly possible to
do so using the `rnspure` package, but Reticulum will not be able to use
serial-based interfaces. All other available modules will still be loaded when
needed.

**Please Note!** If you use the `rnspure` package to run Reticulum on systems
that do not support [PyCA/cryptography](https://github.com/pyca/cryptography),
it is important that you read and understand the [Cryptographic
Primitives](#cryptographic-primitives) section of this document.

## Public Testnet
If you just want to get started experimenting without building any physical
networks, you are welcome to join the RNS Development Testnet.

The testnet is just that, an informal network for testing and experimenting.
It will be up most of the time, and anyone can join, but it also means that
there's no guarantees for service availability.

It probably goes without saying, but *don't use the testnet entry-points as 
hardcoded or default interfaces in any applications you ship to users*. When
shipping applications, the best practice is to provide your own default
connectivity solutions, if needed and applicable, or in most cases, simply
leave it up to the user which networks to connect to, and how.

The testnet runs the very latest version of Reticulum (often even a short while
before it is publicly released). Sometimes experimental versions of Reticulum
might be deployed to nodes on the testnet, which means strange behaviour might
occur. If none of that scares you, you can join the testnet via either TCP or
I2P. Just add one of the following interfaces to your Reticulum configuration
file:

```
# TCP/IP interface to the RNS Amsterdam Hub
  [[RNS Testnet Amsterdam]]
    type = TCPClientInterface
    enabled = yes
    target_host = amsterdam.connect.reticulum.network
    target_port = 4965

# TCP/IP interface to the BetweenTheBorders Hub (community-provided)
  [[RNS Testnet BetweenTheBorders]]
    type = TCPClientInterface
    enabled = yes
    target_host = reticulum.betweentheborders.com
    target_port = 4242

# Interface to Testnet I2P Hub
  [[RNS Testnet I2P Hub]]
    type = I2PInterface
    enabled = yes
    peers = g3br23bvx3lq5uddcsjii74xgmn6y5q325ovrkq2zw2wbzbqgbuq.b32.i2p
```

The testnet also contains a number of [Nomad Network](https://github.com/markqvist/nomadnet) nodes, and LXMF propagation nodes.

## Support Reticulum
You can help support the continued development of open, free and private communications systems by donating via one of the following channels:

- Monero:
  ```
  84FpY1QbxHcgdseePYNmhTHcrgMX4nFfBYtz2GKYToqHVVhJp8Eaw1Z1EedRnKD19b3B8NiLCGVxzKV17UMmmeEsCrPyA5w
  ```
- Ethereum
  ```
  0xFDabC71AC4c0C78C95aDDDe3B4FA19d6273c5E73
  ```
- Bitcoin
  ```
  35G9uWVzrpJJibzUwpNUQGQNFzLirhrYAH
  ```
- Ko-Fi: https://ko-fi.com/markqvist

Are certain features in the development roadmap are important to you or your
organisation? Make them a reality quickly by sponsoring their implementation.

## Cryptographic Primitives
Reticulum uses a simple suite of efficient, strong and well-tested cryptographic
primitives, with widely available implementations that can be used both on
general-purpose CPUs and on microcontrollers. The utilised primitives are:

- Reticulum Identity Keys are 512-bit Curve25519 keysets
  - A 256-bit Ed25519 key for signatures
  - A 256-bit X22519 key for ECDH key exchanges
- HKDF for key derivation
- Encrypted tokens are based on the [Fernet spec](https://github.com/fernet/spec/)
  - Ephemeral keys derived from an ECDH key exchange on Curve25519
  - AES-128 in CBC mode with PKCS7 padding
  - HMAC using SHA256 for message authentication
  - IVs are generated through os.urandom()
  - No Fernet version and timestamp metadata fields
- SHA-256
- SHA-512

In the default installation configuration, the `X25519`, `Ed25519` and
`AES-128-CBC` primitives are provided by [OpenSSL](https://www.openssl.org/)
(via the [PyCA/cryptography](https://github.com/pyca/cryptography) package).
The hashing functions `SHA-256` and `SHA-512` are provided by the standard
Python [hashlib](https://docs.python.org/3/library/hashlib.html). The `HKDF`,
`HMAC`, `Token` primitives, and the `PKCS7` padding function are always
provided by the following internal implementations:

- [HKDF.py](RNS/Cryptography/HKDF.py)
- [HMAC.py](RNS/Cryptography/HMAC.py)
- [Token.py](RNS/Cryptography/Token.py)
- [PKCS7.py](RNS/Cryptography/PKCS7.py)


Reticulum also includes a complete implementation of all necessary primitives
in pure Python. If OpenSSL & PyCA are not available on the system when
Reticulum is started, Reticulum will instead use the internal pure-python
primitives. A trivial consequence of this is performance, with the OpenSSL
backend being *much* faster. The most important consequence however, is the
potential loss of security by using primitives that has not seen the same
amount of scrutiny, testing and review as those from OpenSSL.

If you want to use the internal pure-python primitives, it is **highly
advisable** that you have a good understanding of the risks that this pose, and
make an informed decision on whether those risks are acceptable to you.

Reticulum is relatively young software, and should be considered as such. While
it has been built with cryptography best-practices very foremost in mind, it
_has not_ been externally security audited, and there could very well be
privacy or security breaking bugs. If you want to help out, or help sponsor an
audit, please do get in touch.

## Acknowledgements & Credits
Reticulum can only exist because of the mountain of Open Source work it was
built on top of, the contributions of everyone involved, and everyone that has
supported the project through the years. To everyone who has helped, thank you
so much.

A number of other modules and projects are either part of, or used by
Reticulum. Sincere thanks to the authors and contributors of the following
projects:

- [PyCA/cryptography](https://github.com/pyca/cryptography), *BSD License*
- [Pure-25519](https://github.com/warner/python-pure25519) by [Brian Warner](https://github.com/warner), *MIT License*
- [Pysha2](https://github.com/thomdixon/pysha2) by [Thom Dixon](https://github.com/thomdixon), *MIT License*
- [Python-AES](https://github.com/orgurar/python-aes) by [Or Gur Arie](https://github.com/orgurar), *MIT License*
- [Curve25519.py](https://gist.github.com/nickovs/cc3c22d15f239a2640c185035c06f8a3#file-curve25519-py) by [Nicko van Someren](https://gist.github.com/nickovs), *Public Domain*
- [I2Plib](https://github.com/l-n-s/i2plib) by [Viktor Villainov](https://github.com/l-n-s)
- [PySerial](https://github.com/pyserial/pyserial) by Chris Liechti, *BSD License*
- [Configobj](https://github.com/DiffSK/configobj) by Michael Foord, Nicola Larosa, Rob Dennis & Eli Courtwright, *BSD License*
- [Six](https://github.com/benjaminp/six) by [Benjamin Peterson](https://github.com/benjaminp), *MIT License*
- [ifaddr](https://github.com/pydron/ifaddr) by [Pydron](https://github.com/pydron), *MIT License*
- [Umsgpack.py](https://github.com/vsergeev/u-msgpack-python) by [Ivan A. Sergeev](https://github.com/vsergeev)
- [Python](https://www.python.org)

            

Raw data

            {
    "_id": null,
    "home_page": "https://reticulum.network/",
    "name": "rns",
    "maintainer": null,
    "docs_url": null,
    "requires_python": ">=3.7",
    "maintainer_email": null,
    "keywords": null,
    "author": "Mark Qvist",
    "author_email": "mark@unsigned.io",
    "download_url": "https://files.pythonhosted.org/packages/c8/24/4d57627d4988e2299f83a4e267d4d53267c7e933e06945a292507bc59a07/rns-0.8.8.tar.gz",
    "platform": null,
    "description": "Reticulum Network Stack \u03b2 <img align=\"right\" src=\"https://static.pepy.tech/personalized-badge/rns?period=total&units=international_system&left_color=grey&right_color=blue&left_text=Installs\" style=\"padding-left:10px\"/><a href=\"https://github.com/markqvist/Reticulum/actions/workflows/build.yml\"><img align=\"right\" src=\"https://github.com/markqvist/Reticulum/actions/workflows/build.yml/badge.svg\"/></a>\n==========\n\n<p align=\"center\"><img width=\"200\" src=\"https://raw.githubusercontent.com/markqvist/Reticulum/master/docs/source/graphics/rns_logo_512.png\"></p>\n\nReticulum is the cryptography-based networking stack for building local and wide-area\nnetworks with readily available hardware. It can operate even with very high latency\nand extremely low bandwidth. Reticulum allows you to build wide-area networks\nwith off-the-shelf tools, and offers end-to-end encryption and connectivity,\ninitiator anonymity, autoconfiguring cryptographically backed multi-hop\ntransport, efficient addressing, unforgeable delivery acknowledgements and\nmore.\n\nThe vision of Reticulum is to allow anyone to be their own network operator,\nand to make it cheap and easy to cover vast areas with a myriad of independent,\ninter-connectable and autonomous networks. Reticulum **is not** *one* network.\nIt is **a tool** for building *thousands of networks*. Networks without\nkill-switches, surveillance, censorship and control. Networks that can freely\ninteroperate, associate and disassociate with each other, and require no\ncentral oversight. Networks for human beings. *Networks for the people*.\n\nReticulum is a complete networking stack, and does not rely on IP or higher\nlayers, but it is possible to use IP as the underlying carrier for Reticulum.\nIt is therefore trivial to tunnel Reticulum over the Internet or private IP\nnetworks.\n\nHaving no dependencies on traditional networking stacks frees up overhead that\nhas been used to implement a networking stack built directly on cryptographic\nprinciples, allowing resilience and stable functionality, even in open and\ntrustless networks.\n\nNo kernel modules or drivers are required. Reticulum runs completely in\nuserland, and can run on practically any system that runs Python 3.\n\n## Read The Manual\nThe full documentation for Reticulum is available at [markqvist.github.io/Reticulum/manual/](https://markqvist.github.io/Reticulum/manual/).\n\nYou can also download the [Reticulum manual as a PDF](https://github.com/markqvist/Reticulum/raw/master/docs/Reticulum%20Manual.pdf) or [as an e-book in EPUB format](https://github.com/markqvist/Reticulum/raw/master/docs/Reticulum%20Manual.epub).\n\nFor more info, see [reticulum.network](https://reticulum.network/) and [the FAQ section of the wiki](https://github.com/markqvist/Reticulum/wiki/Frequently-Asked-Questions).\n\n## Notable Features\n- Coordination-less globally unique addressing and identification\n- Fully self-configuring multi-hop routing over heterogeneous carriers\n- Flexible scalability over heterogeneous topologies\n  - Reticulum can carry data over any mixture of physical mediums and topologies\n  - Low-bandwidth networks can co-exist and interoperate with large, high-bandwidth networks\n- Initiator anonymity, communicate without revealing your identity\n  - Reticulum does not include source addresses on any packets\n- Asymmetric X25519 encryption and Ed25519 signatures as a basis for all communication\n  - The foundational Reticulum Identity Keys are 512-bit Elliptic Curve keysets\n- Forward Secrecy is available for all communication types, both for single packets and over links\n- Reticulum uses the following format for encrypted tokens:\n  - Ephemeral per-packet and link keys and derived from an ECDH key exchange on Curve25519\n  - AES-128 in CBC mode with PKCS7 padding\n  - HMAC using SHA256 for authentication\n  - IVs are generated through os.urandom()\n- Unforgeable packet delivery confirmations\n- Flexible and extensible interface system\n  - Reticulum includes a large variety of built-in interface types\n  - Ability to load and utilise custom user- or community-supplied interface types\n  - Easily create your own custom interfaces for communicating over anything\n- Authentication and virtual network segmentation on all supported interface types\n- An intuitive and easy-to-use API\n  - Simpler and easier to use than sockets APIs and simpler, but more powerful\n  - Makes building distributed and decentralised applications much simpler\n- Reliable and efficient transfer of arbitrary amounts of data\n  - Reticulum can handle a few bytes of data or files of many gigabytes\n  - Sequencing, compression, transfer coordination and checksumming are automatic\n  - The API is very easy to use, and provides transfer progress\n- Lightweight, flexible and expandable Request/Response mechanism\n- Efficient link establishment\n  - Total cost of setting up an encrypted and verified link is only 3 packets, totalling 297 bytes\n  - Low cost of keeping links open at only 0.44 bits per second\n- Reliable sequential delivery with Channel and Buffer mechanisms\n\n## Roadmap\nWhile Reticulum is already a fully featured and functional networking stack,\nmany improvements and additions are actively being worked on, and planned for the future.\n\nTo learn more about the direction and future of Reticulum, please see the [Development Roadmap](./Roadmap.md).\n\n## Examples of Reticulum Applications\nIf you want to quickly get an idea of what Reticulum can do, take a look at the\nfollowing resources.\n\n- You can use the [rnsh](https://github.com/acehoss/rnsh) program to establish remote shell sessions over Reticulum.\n- [LXMF](https://github.com/markqvist/lxmf) is a distributed, delay and disruption tolerant message transfer protocol built on Reticulum\n- For an off-grid, encrypted and resilient mesh communications platform, see [Nomad Network](https://github.com/markqvist/NomadNet)\n- The Android, Linux, macOS and Windows app [Sideband](https://github.com/markqvist/Sideband) has a graphical interface and focuses on ease of use.\n- [MeshChat](https://github.com/liamcottle/reticulum-meshchat) is a user-friendly LXMF client, that also supports voice calls.\n\n## Where can Reticulum be used?\nOver practically any medium that can support at least a half-duplex channel\nwith greater throughput than 5 bits per second, and an MTU of 500 bytes. Data radios,\nmodems, LoRa radios, serial lines, AX.25 TNCs, amateur radio digital modes,\nWiFi and Ethernet devices, free-space optical links, and similar systems are\nall examples of the types of physical devices Reticulum can use.\n\nAn open-source LoRa-based interface called\n[RNode](https://markqvist.github.io/Reticulum/manual/hardware.html#rnode) has\nbeen designed specifically for use with Reticulum. It is possible to build\nyourself, or it can be purchased as a complete transceiver that just needs a\nUSB connection to the host.\n\nReticulum can also be encapsulated over existing IP networks, so there's\nnothing stopping you from using it over wired Ethernet, your local WiFi network\nor the Internet, where it'll work just as well. In fact, one of the strengths\nof Reticulum is how easily it allows you to connect different mediums into a\nself-configuring, resilient and encrypted mesh, using any available mixture of\navailable infrastructure.\n\nAs an example, it's possible to set up a Raspberry Pi connected to both a LoRa\nradio, a packet radio TNC and a WiFi network. Once the interfaces are\nconfigured, Reticulum will take care of the rest, and any device on the WiFi\nnetwork can communicate with nodes on the LoRa and packet radio sides of the\nnetwork, and vice versa.\n\n## How do I get started?\nThe best way to get started with the Reticulum Network Stack depends on what\nyou want to do. For full details and examples, have a look at the \n[Getting Started Fast](https://markqvist.github.io/Reticulum/manual/gettingstartedfast.html) \nsection of the [Reticulum Manual](https://markqvist.github.io/Reticulum/manual/).\n\nTo simply install Reticulum and related utilities on your system, the easiest way is via `pip`.\nYou can then start any program that uses Reticulum, or start Reticulum as a system service with\n[the rnsd utility](https://markqvist.github.io/Reticulum/manual/using.html#the-rnsd-utility).\n\n```bash\npip install rns\n```\n\nIf you are using an operating system that blocks normal user package installation via `pip`,\nyou can return `pip` to normal behaviour by editing the `~/.config/pip/pip.conf` file,\nand adding the following directive in the `[global]` section:\n\n```text\n[global]\nbreak-system-packages = true\n```\n\nAlternatively, you can use the `pipx` tool to install Reticulum in an isolated environment:\n\n```bash\npipx install rns\n```\n\nWhen first started, Reticulum will create a default configuration file,\nproviding basic connectivity to other Reticulum peers that might be locally\nreachable. The default config file contains a few examples, and references for\ncreating a more complex configuration.\n\nIf you have an old version of `pip` on your system, you may need to upgrade it first with `pip install pip --upgrade`. If you no not already have `pip` installed, you can install it using the package manager of your system with `sudo apt install python3-pip` or similar.\n\nFor more detailed examples on how to expand communication over many mediums such \nas packet radio or LoRa, serial ports, or over fast IP links and the Internet using \nthe UDP and TCP interfaces, take a look at the [Supported Interfaces](https://markqvist.github.io/Reticulum/manual/interfaces.html) \nsection of the [Reticulum Manual](https://markqvist.github.io/Reticulum/manual/).\n\n## Included Utilities\nReticulum includes a range of useful utilities for managing your networks, \nviewing status and information, and other tasks. You can read more about these \nprograms in the [Included Utility Programs](https://markqvist.github.io/Reticulum/manual/using.html#included-utility-programs) \nsection of the [Reticulum Manual](https://markqvist.github.io/Reticulum/manual/).\n\n- The system daemon `rnsd` for running Reticulum as an always-available service\n- An interface status utility called `rnstatus`, that displays information about interfaces\n- The path lookup and management tool `rnpath` letting you view and modify path tables\n- A diagnostics tool called `rnprobe` for checking connectivity to destinations\n- A simple file transfer program called `rncp` making it easy to transfer files between systems\n- The identity management and encryption utility `rnid` let's you manage Identities and encrypt/decrypt files\n- The remote command execution program `rnx` let's you run commands and\n  programs and retrieve output from remote systems\n\nAll tools, including `rnx` and `rncp`, work reliably and well even over very\nlow-bandwidth links like LoRa or Packet Radio. For full-featured remote shells\nover Reticulum, also have a look at the [rnsh](https://github.com/acehoss/rnsh)\nprogram.\n\n## Supported interface types and devices\n\nReticulum implements a range of generalised interface types that covers most of\nthe communications hardware that Reticulum can run over. If your hardware is\nnot supported, it's [simple to implement a custom interface module](https://markqvist.github.io/Reticulum/manual/interfaces.html#custom-interfaces).\n\nPull requests for custom interfaces are gratefully accepted, provided they are\ngenerally useful and well-tested in real-world usage.\n\nCurrently, the following built-in interfaces are supported:\n\n- Any Ethernet device\n- LoRa using [RNode](https://unsigned.io/rnode/)\n- Packet Radio TNCs (with or without AX.25)\n- KISS-compatible hardware and software modems\n- Any device with a serial port\n- TCP over IP networks\n- UDP over IP networks\n- External programs via stdio or pipes\n- Custom hardware via stdio or pipes\n\n## Performance\nReticulum targets a *very* wide usable performance envelope, but prioritises\nfunctionality and performance on low-bandwidth mediums. The goal is to\nprovide a dynamic performance envelope from 250 bits per second, to 1 gigabit\nper second on normal hardware.\n\nCurrently, the usable performance envelope is approximately 150 bits per second\nto 40 megabits per second, with physical mediums faster than that not being\nsaturated. Performance beyond the current level is intended for future\nupgrades, but not highly prioritised at this point in time.\n\n## Current Status\nReticulum should currently be considered beta software. All core protocol\nfeatures are implemented and functioning, but additions will probably occur as\nreal-world use is explored. There will be bugs. The API and wire-format can be\nconsidered relatively stable at the moment, but could change if warranted.\n\n## Dependencies\nThe installation of the default `rns` package requires the dependencies listed\nbelow. Almost all systems and distributions have readily available packages for\nthese dependencies, and when the `rns` package is installed with `pip`, they\nwill be downloaded and installed as well.\n\n- [PyCA/cryptography](https://github.com/pyca/cryptography)\n- [pyserial](https://github.com/pyserial/pyserial)\n\nOn more unusual systems, and in some rare cases, it might not be possible to\ninstall or even compile one or more of the above modules. In such situations,\nyou can use the `rnspure` package instead, which require no external\ndependencies for installation. Please note that the contents of the `rns` and\n`rnspure` packages are *identical*. The only difference is that the `rnspure`\npackage lists no dependencies required for installation.\n\nNo matter how Reticulum is installed and started, it will load external\ndependencies only if they are *needed* and *available*. If for example you want\nto use Reticulum on a system that cannot support\n[pyserial](https://github.com/pyserial/pyserial), it is perfectly possible to\ndo so using the `rnspure` package, but Reticulum will not be able to use\nserial-based interfaces. All other available modules will still be loaded when\nneeded.\n\n**Please Note!** If you use the `rnspure` package to run Reticulum on systems\nthat do not support [PyCA/cryptography](https://github.com/pyca/cryptography),\nit is important that you read and understand the [Cryptographic\nPrimitives](#cryptographic-primitives) section of this document.\n\n## Public Testnet\nIf you just want to get started experimenting without building any physical\nnetworks, you are welcome to join the RNS Development Testnet.\n\nThe testnet is just that, an informal network for testing and experimenting.\nIt will be up most of the time, and anyone can join, but it also means that\nthere's no guarantees for service availability.\n\nIt probably goes without saying, but *don't use the testnet entry-points as \nhardcoded or default interfaces in any applications you ship to users*. When\nshipping applications, the best practice is to provide your own default\nconnectivity solutions, if needed and applicable, or in most cases, simply\nleave it up to the user which networks to connect to, and how.\n\nThe testnet runs the very latest version of Reticulum (often even a short while\nbefore it is publicly released). Sometimes experimental versions of Reticulum\nmight be deployed to nodes on the testnet, which means strange behaviour might\noccur. If none of that scares you, you can join the testnet via either TCP or\nI2P. Just add one of the following interfaces to your Reticulum configuration\nfile:\n\n```\n# TCP/IP interface to the RNS Amsterdam Hub\n  [[RNS Testnet Amsterdam]]\n    type = TCPClientInterface\n    enabled = yes\n    target_host = amsterdam.connect.reticulum.network\n    target_port = 4965\n\n# TCP/IP interface to the BetweenTheBorders Hub (community-provided)\n  [[RNS Testnet BetweenTheBorders]]\n    type = TCPClientInterface\n    enabled = yes\n    target_host = reticulum.betweentheborders.com\n    target_port = 4242\n\n# Interface to Testnet I2P Hub\n  [[RNS Testnet I2P Hub]]\n    type = I2PInterface\n    enabled = yes\n    peers = g3br23bvx3lq5uddcsjii74xgmn6y5q325ovrkq2zw2wbzbqgbuq.b32.i2p\n```\n\nThe testnet also contains a number of [Nomad Network](https://github.com/markqvist/nomadnet) nodes, and LXMF propagation nodes.\n\n## Support Reticulum\nYou can help support the continued development of open, free and private communications systems by donating via one of the following channels:\n\n- Monero:\n  ```\n  84FpY1QbxHcgdseePYNmhTHcrgMX4nFfBYtz2GKYToqHVVhJp8Eaw1Z1EedRnKD19b3B8NiLCGVxzKV17UMmmeEsCrPyA5w\n  ```\n- Ethereum\n  ```\n  0xFDabC71AC4c0C78C95aDDDe3B4FA19d6273c5E73\n  ```\n- Bitcoin\n  ```\n  35G9uWVzrpJJibzUwpNUQGQNFzLirhrYAH\n  ```\n- Ko-Fi: https://ko-fi.com/markqvist\n\nAre certain features in the development roadmap are important to you or your\norganisation? Make them a reality quickly by sponsoring their implementation.\n\n## Cryptographic Primitives\nReticulum uses a simple suite of efficient, strong and well-tested cryptographic\nprimitives, with widely available implementations that can be used both on\ngeneral-purpose CPUs and on microcontrollers. The utilised primitives are:\n\n- Reticulum Identity Keys are 512-bit Curve25519 keysets\n  - A 256-bit Ed25519 key for signatures\n  - A 256-bit X22519 key for ECDH key exchanges\n- HKDF for key derivation\n- Encrypted tokens are based on the [Fernet spec](https://github.com/fernet/spec/)\n  - Ephemeral keys derived from an ECDH key exchange on Curve25519\n  - AES-128 in CBC mode with PKCS7 padding\n  - HMAC using SHA256 for message authentication\n  - IVs are generated through os.urandom()\n  - No Fernet version and timestamp metadata fields\n- SHA-256\n- SHA-512\n\nIn the default installation configuration, the `X25519`, `Ed25519` and\n`AES-128-CBC` primitives are provided by [OpenSSL](https://www.openssl.org/)\n(via the [PyCA/cryptography](https://github.com/pyca/cryptography) package).\nThe hashing functions `SHA-256` and `SHA-512` are provided by the standard\nPython [hashlib](https://docs.python.org/3/library/hashlib.html). The `HKDF`,\n`HMAC`, `Token` primitives, and the `PKCS7` padding function are always\nprovided by the following internal implementations:\n\n- [HKDF.py](RNS/Cryptography/HKDF.py)\n- [HMAC.py](RNS/Cryptography/HMAC.py)\n- [Token.py](RNS/Cryptography/Token.py)\n- [PKCS7.py](RNS/Cryptography/PKCS7.py)\n\n\nReticulum also includes a complete implementation of all necessary primitives\nin pure Python. If OpenSSL & PyCA are not available on the system when\nReticulum is started, Reticulum will instead use the internal pure-python\nprimitives. A trivial consequence of this is performance, with the OpenSSL\nbackend being *much* faster. The most important consequence however, is the\npotential loss of security by using primitives that has not seen the same\namount of scrutiny, testing and review as those from OpenSSL.\n\nIf you want to use the internal pure-python primitives, it is **highly\nadvisable** that you have a good understanding of the risks that this pose, and\nmake an informed decision on whether those risks are acceptable to you.\n\nReticulum is relatively young software, and should be considered as such. While\nit has been built with cryptography best-practices very foremost in mind, it\n_has not_ been externally security audited, and there could very well be\nprivacy or security breaking bugs. If you want to help out, or help sponsor an\naudit, please do get in touch.\n\n## Acknowledgements & Credits\nReticulum can only exist because of the mountain of Open Source work it was\nbuilt on top of, the contributions of everyone involved, and everyone that has\nsupported the project through the years. To everyone who has helped, thank you\nso much.\n\nA number of other modules and projects are either part of, or used by\nReticulum. Sincere thanks to the authors and contributors of the following\nprojects:\n\n- [PyCA/cryptography](https://github.com/pyca/cryptography), *BSD License*\n- [Pure-25519](https://github.com/warner/python-pure25519) by [Brian Warner](https://github.com/warner), *MIT License*\n- [Pysha2](https://github.com/thomdixon/pysha2) by [Thom Dixon](https://github.com/thomdixon), *MIT License*\n- [Python-AES](https://github.com/orgurar/python-aes) by [Or Gur Arie](https://github.com/orgurar), *MIT License*\n- [Curve25519.py](https://gist.github.com/nickovs/cc3c22d15f239a2640c185035c06f8a3#file-curve25519-py) by [Nicko van Someren](https://gist.github.com/nickovs), *Public Domain*\n- [I2Plib](https://github.com/l-n-s/i2plib) by [Viktor Villainov](https://github.com/l-n-s)\n- [PySerial](https://github.com/pyserial/pyserial) by Chris Liechti, *BSD License*\n- [Configobj](https://github.com/DiffSK/configobj) by Michael Foord, Nicola Larosa, Rob Dennis & Eli Courtwright, *BSD License*\n- [Six](https://github.com/benjaminp/six) by [Benjamin Peterson](https://github.com/benjaminp), *MIT License*\n- [ifaddr](https://github.com/pydron/ifaddr) by [Pydron](https://github.com/pydron), *MIT License*\n- [Umsgpack.py](https://github.com/vsergeev/u-msgpack-python) by [Ivan A. Sergeev](https://github.com/vsergeev)\n- [Python](https://www.python.org)\n",
    "bugtrack_url": null,
    "license": null,
    "summary": "Self-configuring, encrypted and resilient mesh networking stack for LoRa, packet radio, WiFi and everything in between",
    "version": "0.8.8",
    "project_urls": {
        "Homepage": "https://reticulum.network/"
    },
    "split_keywords": [],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "960d09bb28f1206b6f5f585799b0c21f6c50457129c35b7cd6ede77b20e3fec6",
                "md5": "eae8b9473ec5d9e5c9b601568c29c6d9",
                "sha256": "9c1755a81049c67b051ecb9fe4b2c5f7d98bf09d20ed52d6ce6a410298b0527b"
            },
            "downloads": -1,
            "filename": "rns-0.8.8-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "eae8b9473ec5d9e5c9b601568c29c6d9",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": ">=3.7",
            "size": 392750,
            "upload_time": "2024-12-11T21:28:59",
            "upload_time_iso_8601": "2024-12-11T21:28:59.839305Z",
            "url": "https://files.pythonhosted.org/packages/96/0d/09bb28f1206b6f5f585799b0c21f6c50457129c35b7cd6ede77b20e3fec6/rns-0.8.8-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "c8244d57627d4988e2299f83a4e267d4d53267c7e933e06945a292507bc59a07",
                "md5": "ac787264d7aa27a95fb770998091edc2",
                "sha256": "6f6a64ce2232c3ecf2e63aba9bb87aa5e14b3ab764e5b4a8aeca62b5357b72c9"
            },
            "downloads": -1,
            "filename": "rns-0.8.8.tar.gz",
            "has_sig": false,
            "md5_digest": "ac787264d7aa27a95fb770998091edc2",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.7",
            "size": 17546195,
            "upload_time": "2024-12-11T21:29:35",
            "upload_time_iso_8601": "2024-12-11T21:29:35.428543Z",
            "url": "https://files.pythonhosted.org/packages/c8/24/4d57627d4988e2299f83a4e267d4d53267c7e933e06945a292507bc59a07/rns-0.8.8.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2024-12-11 21:29:35",
    "github": false,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "lcname": "rns"
}
        
Elapsed time: 0.43558s