cleaned up demo scripts locations
[urisagit/Stem.git] / Design / security_notes
CommitLineData
4536f655 1Security
2
3A critical aspect of any network application these days is security.
4Stem hubs communicate with each other via standard internet sockets.
5This communication can be made secure by tunneling over existing
6open source products such as SSH and Stunnel. Stem runs the security
7program and has it connect with the remote hub and its stdin/stdout
8is used for the local connection. The Stem::Proc cell is used to
9manage this external security program and it provides all the I/O
10support needed. The Stem::Portal cell is used to connect Stem hubs
11together and it has configuration options to select the desired
12security application and options. A Stem hub can listen for portal
13connections using a Listen socket bound to localhost or an IP
14address. By using localhost and a secure transport, a Stem hub
15cannot be accessed by any unauthorized programs.
16
17
18