All Projects → openspace42 → Aenigma

openspace42 / Aenigma

Licence: other
The | state-of-the-art | secure-by-default | one-touch-deployed | XMPP server for everyone.

Programming Languages

shell
77523 projects

Projects that are alternatives of or similar to Aenigma

Acme Client
Let's Encrypt / ACME client written in PHP for the CLI.
Stars: ✭ 337 (+110.63%)
Mutual labels:  automation, tls, letsencrypt
Twisted
Event-driven networking engine written in Python.
Stars: ✭ 4,442 (+2676.25%)
Mutual labels:  xmpp, tls
Tlsfuzzer
SSL and TLS protocol test suite and fuzzer
Stars: ✭ 335 (+109.38%)
Mutual labels:  automation, tls
Nginx Le
Nginx with automatic let's encrypt (docker image)
Stars: ✭ 475 (+196.88%)
Mutual labels:  automation, letsencrypt
letsencrypt-www
Probably the easiest way to create | renew | deploy certificate
Stars: ✭ 27 (-83.12%)
Mutual labels:  letsencrypt, tls
Certmagic
Automatic HTTPS for any Go program: fully-managed TLS certificate issuance and renewal
Stars: ✭ 3,864 (+2315%)
Mutual labels:  tls, letsencrypt
Ssl Proxy
🔒 Simple zero-config SSL reverse proxy with real autogenerated certificates (LetsEncrypt, self-signed, provided)
Stars: ✭ 427 (+166.88%)
Mutual labels:  tls, letsencrypt
Greenlock
Automatic SSL renewal for NodeJS
Stars: ✭ 30 (-81.25%)
Mutual labels:  tls, letsencrypt
Gocertcenter
CertCenter API Go Implementation
Stars: ✭ 21 (-86.87%)
Mutual labels:  automation, tls
Kube Cert Manager
Manage Lets Encrypt certificates for a Kubernetes cluster.
Stars: ✭ 518 (+223.75%)
Mutual labels:  tls, letsencrypt
freshcerts
ACME certificate protocol (Let's Encrypt) proxy client with a dashboard and monitoring
Stars: ✭ 59 (-63.12%)
Mutual labels:  letsencrypt, tls
Acme client
Java ACME Client application
Stars: ✭ 77 (-51.87%)
Mutual labels:  tls, letsencrypt
cert-manager
Automatically provision and manage TLS certificates in Kubernetes
Stars: ✭ 8,781 (+5388.13%)
Mutual labels:  letsencrypt, tls
Acmetool
🔒 acmetool, an automatic certificate acquisition tool for ACME (Let's Encrypt)
Stars: ✭ 1,882 (+1076.25%)
Mutual labels:  tls, letsencrypt
ssltun
simple secure http proxy server with automic https
Stars: ✭ 33 (-79.37%)
Mutual labels:  letsencrypt, tls
httpsbook
《深入浅出HTTPS:从原理到实战》代码示例、勘误、反馈、讨论
Stars: ✭ 77 (-51.87%)
Mutual labels:  letsencrypt, tls
docker-ssl-reverse-proxy
Easy-to-use auto-SSL reverse proxy as a Docker container based on Caddy and Let’s Encrypt
Stars: ✭ 22 (-86.25%)
Mutual labels:  letsencrypt, tls
contruno
A TLS termination proxy as a MirageOS
Stars: ✭ 13 (-91.87%)
Mutual labels:  letsencrypt, tls
Lego
Let's Encrypt client and ACME library written in Go
Stars: ✭ 4,978 (+3011.25%)
Mutual labels:  tls, letsencrypt
Netcore Postgres Oauth Boiler
A basic .NET Core website boilerplate using PostgreSQL for storage, Adminer for db management, Let's Encrypt for SSL certificates and NGINX for routing.
Stars: ✭ 57 (-64.37%)
Mutual labels:  tls, letsencrypt

aenigma

aenigma is shutting down

Three years ago when I started writing the initial code for aenigma, back when the logo - turns out! - really did look like a swastika [although backwards, which surprisingly means quite the opposite], the world was a really different place. Matrix / [then] Riot.IM was still in very early stages, and the desperate necessity was a decentralized version of signal.

Today things have changed, for the good: Matrix is a very mature platform, they have announced P2P and plans to shutdown the matrix.org homeserver once we won't need homeservers any longer if not for specific organization setups, status.im is progressing, and exciting projects like Berty are on the rise.

aenigma set out to solve the problem in a world where servers were necessary and hard to set up. Now both of those limitations have been figured out, no matter how much the great [but often short-sided in my opinion] people in the ejabberd chatrooms make fun of the matrix-synapse memory usage on a raspberrypi or how much progress we've still got to do to make these projects fully functional for everyone.

I'm especially grateful to all those who believed in the project and - separate category but still - the ejabberd devs who've been extremely helpful and nice over the years helping me figuring things out. The very nice folks who hosted my at CCC 2018 also really helped and made for a very nice experience.

aenigma ultimately was most lilkely used by a dozen people at its peak, and never really became the widespread project I had hoped for, but I really hope it helped those 12 individuals bridge the gap in the wait for the new, more thriving projects listed above. Their vision, architecture, and community are everything I've hoped for the future.

aenigma development will continue almost exclusively in its respect to the underlying synthia+dna framework, for which instead I have big plans for the future, and maybe some bugfixing here and there. Improvements specific to aenigma such as secure tinc-vpn clustering and stuff like that will not be further developed. I hope to see you all around at our future hackerspace[s]!

Thanks again to all

Nicolas

aenigma logo full

aenigma provisions a fully functional and secure-out-of-the-box XMPP server you can get running today.

It does for XMPP what Mail-in-a-Box has done for email, Streisand for VPNs, and Easyengine for wordpress / nginx sites hosting.

The installation takes you on a 15 minute, clearly worded, step-by-step setup and takes care of everything automagically.

All of the features offered by our project and the related installation instructions are detailed below.

The official instance of aenigma

Take a look at our actual running instance of aenigma - a fully functional XMPP server cluster operated by our hackerspace openspace - by registering a forever free account @aenigma.xyz.

You can register your account right now by specifying a [email protected] JID [jabber user ID] during the new account creation phase [offered by virtually all XMPP apps] and dive right into this amazing world!

If you're finding XMPP to your liking, then deploy your own server following the very simple instructions below! As soon as you're up and running join our group chat at [email protected] !

Features

  • state of the art configuration always updated with the latest functionalities and best practices for every ejabberd version
  • latest and most robust security by default in addition to a built-in first-boot system-wide hardening script
  • one touch deployment: just clone and run the setup script on one or multiple freshly installed machines
  • features a simple, clear, step-by-step installer that makes sure you get everything perfect on the first run
  • always based on the latest version of ejabberd, a modern, scalable, and robust XMPP server
  • provisions 100% compliant servers by passing all of the 2018 XEP-0387 compliance checks and therefore those performed by the Conversations client
  • natively supports [almost] signal-level encrypted conversations with all the required modules for OMEMO E2EE
  • allows you to and guides you through using your top level domain as the xmpp domain [@domain.xyz] while hosting the server on a subdomain [xmpp.domain.xyz] as its hostname by using SRV records [without any XMPP client UI/UX complications or TLS conflicts]
  • easily handles multiple XMPP domains on the same server / cluster with automatic ejabberd, LetsEncrypt, and SSLH provisioning + DNS tests
  • fully supports IPv6 out of the box, meaning your client applications could hypothetically work on IPv6-only networks
  • listens for all of the required XMPP c2s [client to server], HTTP_uploads, and SSH connections also on port 443 [thanks to SSLH] to allow XMPP clients and administrative workstations behind restrictive firewalls to connect without the need to circumvent the firewall with VPNs or Tor [and sets SRV records for XMPP over TLS (XEP-0368) so that clients can find this server capability autonomously and automatically]
  • validates all required IPv4 and IPv6 DNS settings including SRV records [even those for specific modules such as pubsub] and tells you exactly the correct values for each record [work in progress: automatic DNS provisioning via API]
  • sets up the system firewall and UFW rules for all configured services
  • installs nginx and makes the ejabberd web admin interface securely available at https://[hostname]
  • provisions and automatically renews free and fully valid LetsEncrypt wildcard TLS [SSL] certificates and correctly configures all deployed services [ejabberd, nginx, etc...] accordingly
  • provisions a PostgreSQL database instance [and clusters it if necessary with etcd, Patroni, and HAProxy] to provide a robust and high performance backend to ejabberd and movim
  • creates ejabberd Shared Roster Groups to easily allow admins to see all users registered on their own rosters and all users online at any given time
  • uses nginx-based XMPP uploads rather than ejabberd's built-in module for higher robustness.
  • automatically backups up all configuration, the ejabberd database, and XMPP data storage locally and [optionally] to S3 with strong encryption via duplicity and includes a script for a guided, consistent, and complete restore
  • allows you to easily run your aenigma instance on multiple servers [a cluster] for robustness, load distribution / balancing, and failover
  • is idempotent and self-versioning to allow for easy re-installs, re-configurations, and upgrades
  • also provisions a Tor hidden service [optional] to make your server [or cluster] reachable entirely inside the Tor network via a .onion address for all services [XMPP, web, SSH, etc...].
  • also provisions an instance of the Converse.js XMPP web client [optional] to give you a fast and easy way to access your client account from anywhere!
  • also provisions an instance of a Movim pod [optional] to turn your XMPP experience into a social one! [work in progress]
  • has a logelevel zero mode where no user connection / disconnection traffic data are logged in order to limit the amount of information left over should the server be compromised or seized in the future

Non-features

  • Keeps backwards compatibility with other, older, not 100% compliant, XMPP servers out there by using a not very restrictive ciphersuite for s2s [aka server to server] connections, but you can break all bridges with the rest of the world and enable the latest ciphers suggested by cipherli.st [although really not recommended] by changing two lines in the config file

Support the project

You can now become a Patreon supporter of the project starting at only $1/month, and access our priority support, custom features rapid development requests [then made available for eveyone of course], and help ensure that aenigma is always on the bleeding edge of features offered by ejabberd and the XMPP world. Help us out and join our Patreon community here. Thank you in advance!

News and official chatroom

Follow our development updates together with the aenigma community on our chatroom at [email protected].

If you have an operational aenigma server, definitely subscribe for new release notifications and other important heads-up alerts.

Latest post: 2019-07-30 | v0.7.2-beta.1 release

Hi all, aenigma with working backups is almost out, and will ship with what is now synthia v4, with an entirely re-curated codebase

Making every function faster and easier to read, and standardized spacing and commenting. Some DNA functions have been improved, and, most importantly for you guys, every action previously performed by a script like a aenigma-clusterize has now been made into a function of itself that can be ran standalone from aenigma-env

The installer will now handle user denial conditions more gracefully asking them to re-specify parameters rather then exit the script entirely.

Also, side note, a new project was born called nimbo, it will completely automate the installation of a nextcloud server, with dedicated database, redis caching, and one day even clustering capabilities, of course with our stable and now super stable S3 backup/restore capabilities.

A nice addition to your project team, school, or workplace, if you like aenigma and are looking to host your own cloud. If you like the idea, give it a test when the first beta is out.

As always, you can test out this specific beta with:

aenigma-upgrade -dt -pt

or try out the latest bleeding_edge version up to HEAD with:

aenigma-upgrade -db -pb

or simply wait for this stable release to be published - after which you'll be able to upgrade normally with:

aenigma-upgrade

Thanks for following our project and please consider becoming a supporter if you're finding it interesting, useful, or both!

Nz

you can find older news items on our archive page here

Future features

  • New and improved backup / restore logic that is cluster-aware and more robust when handling unusual user-level situations [Patreon $16/month goal]

  • Automated DNS record provisioning on any nameserver backend that has an API access [CloudFlare, mail-in-a-box, etc...] [Patreon $24/month goal]

  • Complete and total re-write of our synthia+dna framework [currently entirely in bash] into a fully modern and professional codebase designed with a modular and innovative approach and consisting of a nodejs core with an extensible and cross-language package and automation platform [Patreon $48/month goal]

Add your feature requests in the issues section and consider becoming a Patreon supporter for access to rapid development and fast-tracking of your feature requests!

Donate to keep the project running

aenigma takes a bunch of time to research, develop, maintain, and keep up to date with the latest features offered by everything in the XMPP world [ejabberd, OMEMO, and so on].

Let's not make this project fall into deprecation-land like so many other great ones out there!

Help make aenigma always stable and state-of-the-art by donating a small amount towards its development.

You can become a Patreon supporter right now starting at only $1/month and help us make a difference!

Otherwise you can also make a one-time donation via the following channels:

BTC: 3L6rgbypntMxpbz2Yrzf6iZsFWvE1AgMSU | PayPal: []

Thank you very much in advance and don't forget to spread the word with your fellow friends, family, activists, and geeks!

Install

The only supported distros are Ubuntu 18 [bionic beaver] and Debian 9 [stretch].

Any distro NOT based on Debian / Ubuntu will NOT currently work because - at the moment - our framework is entirely and fundamentally designed to work with these distros only. In the future this will change with the new nodejs core.

aenigma is only intended to be installed on brand new fresh machines with absolutely no previously installed services, as it makes changes to system and widely used package / services settings [such as SSH, UFW, NGINX, Postfix, etc...] which are absolutely aenigma-specific and could render either the existing services or the aenigma installation itself non-functional.

Therefore only install aenigma on fresh servers [physical or virtual] with only the base operating system installed and nothing else! During install it will automatically take care of running you through a first-boot machine-hardening script called inception - without ever leaving the aenigma installer itself - that will guide you through all of the security and basic setup operations that every new server should have performed onto it before going ahead and doing anything else.

That said, let's get started!

[log in as root on your target machine]
apt update
apt install git
git clone https://github.com/openspace42/aenigma
bash aenigma/setup

Restore a previous install on a fresh new machine:

[either from S3 or another standalone backup from your old instance]

[log in as root on your target machine]
apt update
apt install git
git clone https://github.com/openspace42/aenigma
bash aenigma/tools/aenigma-restore

Recommended clients:

For Android:

Conversations [github] [f-droid] [website]

For iOS:

ChatSecure [github] [app store] [website]

For Linux:

Dino [still in beta | OMEMO only partially working] [github]

For web

Converse.JS [website] [also automatically provisioned by your aenigma instance if you choose to do so]

Talks and keynotes

Credits

Very special thankyous to:

The ProcessOne team [and the community] for ejabberd

The Tor project team [and the community] for Tor

JC Brand [and the community] for Converse.js

Torn [autistici.org] for inspiring in me the idea of a federated messaging network.

Gio [eigenlab / LibreMesh] for leading me towards XMPP instead after talking about related projects.

Palinuro + MiBoFra [frozenbox.org / parrotsec.org] for actually getting me started on XMPP.

Daniel Gultsch + Holger Weiß for their excellent work and for their very precious advice and opinions about XMPP at large and its future.

The LUG unixMIB [Milano Bicocca university] for hosting my presentation on Linux Day 2018.

The hackerspace assembly ChaosZone for hosting my presentation at 35C3.

Also, anyone involved in the XMPP community, plus aenigma supporters, users, beta testers, and contributors of course!

Thanks to all of you. Let's make this happen. It's about time [finally].

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].