M
M
min4er2020-06-22 19:20:22
Computer networks
min4er, 2020-06-22 19:20:22

How to organize symmetric TCP/IP encryption?

Greetings!
There is a certain device - the server which listens to TCP port. And there is a certain client that connects to this server. The client and the server exchange information using a certain protocol, like a modem - with ASCII control characters and other charms. The task is set as follows - a 3DES or RSA key is uploaded to the server and the client, and encryption of the network connection is organized. It must be transparent for the client and server software, that is, they must receive already decrypted data, since the process of receiving messages relies on STX, ETX bytes, etc., so receiving garbage and decrypting it using the software itself is not an option. Nothing but a VPN comes to my mind, since I am not familiar with other methods. Perhaps someone will tell how to organize exactly symmetric encryption with pre-issued network connection keys so that it does not affect the operation of the server and client software. Maybe I'm just not familiar with some technology. And yet - it will be cross-platform. The server and client can run on almost any operating system. that is, this encryption should, as it were, supplement the description of the data exchange protocol itself. Something like this. I ask the help of the competent community!

Answer the question

In order to leave comments, you need to log in

3 answer(s)
F
fara_ib, 2020-06-22
@fara_ib

Maybe this will fit? www.tarsnap.com/spiped.html
https://www.hippolab.ru/spiped-sozdaem-encrypted...

K
Karpion, 2020-06-23
@Karpion

The easiest way is "SSh-tunnel". Look for an article about SSh on Habré - it was clearly written there, and over to a fig of everything different. If you don't find it, I'll find it. Once upon a time, I did something like this on it.
For Windows, there is PuTTY.

D
Dmitry, 2020-06-23
@dtmse

The answer clearly suggests IPSec with static keys. If cross-platform is required, then the easiest way is to use additional network equipment to organize tunnels. Or deal with Openswan for Linux and built-in tools for IPSec in Windows.

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question