The release of node-to-node copy (NNCP), a set of utility for safe transmission of files, email and commands for execution in the store-and-forward . Work on Posix-compatible operating systems is supported. The utilities are written in GO and spread under the GPLV3 license.
The utilities are focused on the help of building small one-ranking fired-to-fried networks (dozen nodes) Static routing for safe file transfer in Fire-And -forget mode, queries for files, e-mail and requests for commands. All transmitted packages are encrypted (end-to-end) and are clearly authenticated according to the well-known public keys of acquaintances. Onion (as in Tor) encryption is used for all intermediate packages. Each node can act as a client and server and use both Push and Poll model of behavior.
difference nncp from the solutions UCP and ftn (fidonet technology network), except for the aforementioned encryption and authentication, is support from the boxes floppinet and computers physically isolated ( Air-gapped ) from unsafe local and public networks. A feature of NNCP is also easy integration (along with UCP) with current mail servers, such as Postfix and Exim.
of the possible areas of application of nncp notes Organization of sending/receiving mail to the device without constant connection to the Internet, transfer files in the conditions unstable network connection, safe transmission of very large amounts of data on physical media, the creation of insulated data transmission networks, bypassing network censorship and surveillance protected from MITM attacks. Since the key for decryption is only in the recipient, regardless of the ways of delivery of the package on the network or through physical media, the third party cannot read the contents, even intercepting the departure. In turn, authentication by digital signature does not allow to form a fictitious departure under the guise of another sender.
Among the innovations of NNCP 8.8.0, compared with the previous news (version 5.0.0):
- Instead of the Blake2b hash, to check the integrity of files, the so-called MTH: merkle tree-bast hatinging using hash Blake3