World: r4wp
[!REBOL3] General discussion about REBOL 3
older newer | first last |
Maxim 17-Jan-2013 [628] | would 17 digits be a minimum which we can extend using SYSTEM/OPTIONS/DECIMAL-DIGITS ? |
Robert 18-Jan-2013 [629] | Graham, you can use HTTPS now. We don't support all cipher algos yet but it should work with most HTTPS connections. We are currently looking into geting more cipher algos implemented. Than all HTTPS things should work. |
GrahamC 18-Jan-2013 [630x3] | Interesting .. didn't obviously realise that. |
Are the proper source files available? | |
I can probe system/schemes/tls and /https | |
Cyphre 18-Jan-2013 [633] | Graham, the TLS protocol scheme works transparently on tcp ports. So you just need to change the port/scheme from 'tcp to 'tls and you have the tcp connection secured. Then you can build any higher-level protocol over it. Having made the TLS scheme transparent I needed to make only few minor changes to the Gabriele's HTTP scheme to be able support HTTPS as well. |
GrahamC 18-Jan-2013 [634x2] | How did you manage this? |
And are you going to implement SHA256 ? | |
Cyphre 18-Jan-2013 [636x2] | I simply wrote the TLS scheme :-) I've also added the neccessary crypto algorithms at the native level (only RSA with ARC4 cipher suite is supported at the moment). IMO this solution gives us much better flexibility: the encryption code is native(fast) and the TLS protocol logic is in REBOL so it is possibel to enhance it much more easily. |
(so for example we can later implement also the certificate handling and TLS server mode) | |
GrahamC 18-Jan-2013 [638] | Sure. not needing large libraries is a plus |
Cyphre 18-Jan-2013 [639x2] | SHA256: yes I'd love to add it. The only problem is to get efficient free C implementation. |
this applies also for other algorithms so any good links are welcome | |
GrahamC 18-Jan-2013 [641x2] | so has to be compatible license and in plain C ? |
I thought I found some before | |
Cyphre 18-Jan-2013 [643x2] | I have AES algo prepared for integration. Currently we are looking for good implementations of: SHA256, DH and 3DES |
(I guess these pieces are missing to cover TLS 1.0 cipher suite set) | |
GrahamC 18-Jan-2013 [645] | Which copyrights are incompatible? |
Robert 18-Jan-2013 [646x4] | GPL |
MIT or Apache | |
or compatible to these. | |
I thin BSD can fit too. | |
Cyphre 18-Jan-2013 [650] | Once we manage to integrate the algorithms in form of natives it's just matter of adding the other cipher suites handling into the current TLS scheme. |
GrahamC 18-Jan-2013 [651] | compatible are GPL, MIT and Apache? |
Cyphre 18-Jan-2013 [652] | GPL? really? |
GrahamC 18-Jan-2013 [653] | that's what I was asking .. robert seems to say yes |
Cyphre 18-Jan-2013 [654x2] | I prefer BSD or public domain or suctom 'free' licenses as there I'm sure noone will complain I've stolen the code. In other lic cases I have no experience. |
If GLP is acceptable then things would be easier. (I've seen some nice GPL implementations) But I'm not sure GPL code can be used for encapping?? But as I said I'm usually lost in the licensing stuff ;) | |
GrahamC 18-Jan-2013 [656x2] | I'd think GPL is out |
Even Apple has a sha256 open source version out there | |
Cyphre 18-Jan-2013 [658x2] | BTW getting the TLS/HTTPS to run on Android proves that our solution is good and can be easily used in crossplatform way. No need for any OpenSSL-like bloat anymore in R3 ;) |
I haven't searched for SHA256 yet so that is possible. I'm now looking more for the DH and 3DES... | |
Robert 18-Jan-2013 [660] | GPL not |
Cyphre 18-Jan-2013 [661] | One more note: AFAIK the current version of TLS + the encryption support increased the binary only by ~10KB which is also cool. I have no clue how much could take adding the rest of missing algorithms though. |
GrahamC 18-Jan-2013 [662] | http://www.codeguru.com/cpp/misc/misc/cryptoapi/article.php/c8195/Portable-Cryptography-API-for-Triple-DES.htm C and C++ implementations |
Cyphre 18-Jan-2013 [663] | thanks, have that one in the candidates list as well |
BrianH 18-Jan-2013 [664] | The time protocol mentioned in Vanity seems to need a change in design. There should never be a need for READ to have an /args option - that is what the path and query stuff are for. Instead of this: read/args time://time.nist.gov [ GMT ] it should be this: read time://time.nist.gov/gmt |
Andreas 18-Jan-2013 [665] | `There should never be a need for READ to have an /args option - that is what the path and query stuff are for` That's obviously problematic for systems which already make use of URLs including path and query components. |
BrianH 18-Jan-2013 [666] | Are you talking about HTTP, the only scheme that has query and paths built into the URL spec standard? Because we have WRITE for that situation. For other schemes, we can define our own meaning of the query (and in some cases path) so we don't break the model. |
GrahamC 18-Jan-2013 [667x3] | read time://time.nist.gov/gmt implies to me that there is such a url when there isn't |
or that they have such a REST service when they don't | |
write http://www.rebol.com[ HEAD ] is not a write but a read | |
BrianH 18-Jan-2013 [670] | Actually, it's sending a message to that server to which it is replying, but let's not quibble. We have other functions to get the head if you prefer. |
GrahamC 18-Jan-2013 [671] | I think you mentioned above that write should be used for non idempotent actions and read for the idempotent ones. |
BrianH 18-Jan-2013 [672x2] | There are more port actions than just WRITE and READ. Don't limit yourself to just those two. Most of the metadata operations for HTTP-like schemes are handled by QUERY. |
Or they would be if the scheme were fully implemented, as the http scheme in R3 is not. | |
GrahamC 18-Jan-2013 [674] | Query doesn't take arguments except the port |
BrianH 18-Jan-2013 [675] | And the mode, and it can take a url! or block spec. But there are other url! and port! actions than just those 3. |
GrahamC 18-Jan-2013 [676x2] | So, what should query do in the prot-http? |
It's hard to know how things are supposed to be written when the only example we have is apparently incomplete | |
older newer | first last |