A secure P2P file transfer library with optional encryption and NAT traversal support
Project description
Nectar2P
Nectar2P — A secure and fast open-source Python library for P2P file transfers, featuring optional encryption and NAT traversal support. With nectar2p, you can easily transfer files between devices on the same network or across different networks.
Features
- Secure File Transfer: Provides RSA and AES-GCM encryption for confidentiality and integrity.
- Optional Encryption: Enable or disable encryption for file transfer as per requirement.
- NAT Traversal: Supports connections between devices behind NATs.
- Peer Authentication: Allows verification of the remote party's RSA public key to prevent MITM attacks.
- Security Hardened: Protection against path traversal, DoS attacks, replay attacks, and other common vulnerabilities.
- Modular Design: Easily integrable and customizable for various use cases.
- Format Support: Nectar2P supports all file formats.
- Command Line Interface:
python -m nectar2pprovides simplesend,receive, andexport-keycommands with progress display. - Integrity & Resume: Transfers include SHA-256 verification and can resume from partial files.
Installation
nectar2p requires Python 3.6+ and depends on the cryptography library. Follow these steps to install the project:
# Install Nectar2P
pip install nectar2p
Usage
Overview
nectar2p provides two main classes for P2P file transfer:
- NectarSender: Used for sending files.
- NectarReceiver: Used for receiving files.
These classes support secure file transfer with optional encryption and NAT traversal.
Command Line Usage
After installing the package you can use a simple CLI:
Basic Transfer
# Start receiver
python -m nectar2p receive 0.0.0.0 5000 received.bin --resume
In another terminal:
# Send file
python -m nectar2p send receiver_ip 5000 file.bin
Secure Transfer with Public Key Verification
To prevent Man-in-the-Middle (MITM) attacks, you can verify the identity of the remote party using their public key:
# Step 1: Both parties export their public keys
python -m nectar2p export-key sender_public.pem
python -m nectar2p export-key receiver_public.pem
# Step 2: Exchange public keys through a secure channel (e.g., in person, encrypted email)
# Step 3: Receiver starts with sender's public key verification
python -m nectar2p receive 0.0.0.0 5000 received.bin --verify-key sender_public.pem
# Step 4: Sender connects with receiver's public key verification
python -m nectar2p send receiver_ip 5000 file.bin --verify-key receiver_public.pem
Additional Options
# Disable encryption (not recommended for sensitive data)
python -m nectar2p send receiver_ip 5000 file.bin --no-encryption
# Use custom STUN server for NAT traversal
python -m nectar2p send receiver_ip 5000 file.bin --stun-host stun.example.com --stun-port 3478
# Resume interrupted transfer
python -m nectar2p receive 0.0.0.0 5000 received.bin --resume
Basic Usage
File Sending (Sender)
from nectar2p.nectar_sender import NectarSender
def main():
receiver_host = "public.receiver.ip"
receiver_port = 5000
# optionally verify the receiver's public key
expected_receiver_key = b"-----BEGIN PUBLIC KEY-----..."
sender = NectarSender(receiver_host, receiver_port, enable_encryption=True,
expected_receiver_public_key=expected_receiver_key)
try:
sender.initiate_secure_connection()
sender.send_file("path/to/your/file.txt")
finally:
sender.close_connection()
if __name__ == "__main__":
main()
File Receiving (Receiver)
from nectar2p.nectar_receiver import NectarReceiver
def main():
host = "0.0.0.0" # Allows connection from any IP
port = 5000
# optionally verify the sender's public key
expected_sender_key = b"-----BEGIN PUBLIC KEY-----..."
receiver = NectarReceiver(host, port, enable_encryption=True,
expected_sender_public_key=expected_sender_key)
try:
receiver.wait_for_sender()
receiver.receive_file("path/to/save/file.txt")
finally:
receiver.close_connection()
if __name__ == "__main__":
main()
Using NAT Traversal for Cross-Network Transfers
The NectarSender and NectarReceiver classes use a STUN server for NAT traversal, allowing direct connections between devices on different networks. Public IP addresses are automatically retrieved through the STUN server.
The STUN server address can be customized when creating NATTraversal. Be aware that the server can observe your public IP address.
Enabling/Disabling Encryption
Encryption can be optionally enabled or disabled during file transfer. When enable_encryption is set to True, RSA and AES-GCM encryption are used. When set to False, files are transferred without encryption. Files are transferred in 64 KiB chunks and each chunk is authenticated. Connection.receive_data enforces a maximum message size of 100 MiB by default.
Security Note: Encryption is strongly recommended for sensitive data. When encryption is enabled, the library uses:
- RSA-2048 for key exchange
- AES-256-GCM for data encryption
- Cryptographically secure random number generation
- Nonce reuse detection to prevent replay attacks
# Encryption enabled
sender = NectarSender("receiver_ip", 5000, enable_encryption=True)
# Encryption disabled
receiver = NectarReceiver("0.0.0.0", 5000, enable_encryption=False)
Security Features
Nectar2P includes multiple security layers to protect your file transfers:
- MITM Protection: Public key verification prevents man-in-the-middle attacks
- Path Traversal Protection: Files can only be saved within the working directory
- DoS Protection: Connection timeouts (30s), buffer limits (1MB), and file size limits (10GB)
- Replay Attack Protection: Nonce reuse detection prevents message replay attacks
- Input Validation: Port numbers, file sizes, and offsets are validated
- Secure Randomness: Uses
secretsmodule for cryptographic operations - Error Message Security: Generic error messages prevent information leakage
Project Structure
Explanation of main files and folders used in the project:
nectar2p/
├── nectar2p/
│ ├── __init__.py # Main package file
│ ├── nectar_sender.py # Class managing file sending operations
│ ├── nectar_receiver.py # Class managing file receiving operations
│ ├── encryption/
│ │ ├── __init__.py # Encryption module
│ │ ├── rsa_handler.py # RSA operations
│ │ └── aes_handler.py # AES operations
│ ├── networking/
│ │ ├── __init__.py # Networking module
│ │ ├── connection.py # Connection operations
│ │ └── nat_traversal.py # NAT traversal operations
├── setup.py # Setup file
└── README.md # Project overview and instructions
License
This project is licensed under the MIT License. See the LICENSE file for more details.
Contributing
Contributions are welcome! Feel free to submit pull requests or open issues on GitHub for any bugs, suggestions, or improvements.
Contact
For any questions or suggestions, please feel free to reach out: glimor@proton.me
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file nectar2p-1.2.0.tar.gz.
File metadata
- Download URL: nectar2p-1.2.0.tar.gz
- Upload date:
- Size: 10.4 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.6
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
1ee455f904903dbd76d4c551f43687f133dce7896a8c193e9778ad0d0888bfcb
|
|
| MD5 |
909efb0b7fb3fb8aed512e2f744a779b
|
|
| BLAKE2b-256 |
3a92cdf8b5d2b907f29dcb20f5a65f4b435ba436de0c57e7b088bd7028f35893
|
File details
Details for the file nectar2p-1.2.0-py3-none-any.whl.
File metadata
- Download URL: nectar2p-1.2.0-py3-none-any.whl
- Upload date:
- Size: 13.0 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.6
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
0aa5b6226c03fd3fadb13e4eacad649ca352aebb5957f42058770e6a90c0fec4
|
|
| MD5 |
d96828466fa5ee343c6223b6f05def9e
|
|
| BLAKE2b-256 |
530ca7a89eee9773769198e778d6a2093101429a6907f631bc2f23f10692022f
|