We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
I would like for the platypus listener to support encryption such as AES or SSL. Describe your problem here
The Platypus server currently does not support encryption which means the commands are send in cleartext over the network.
go run platypus.go
Run 0.0.0.0 8080
Encrypt [hash of listener] /path/to/ssl.crt /path/to/ssl.key
The entire connection has end to end encryption
The connection can be eavesdropped by anyone using a wire sniffer.
The text was updated successfully, but these errors were encountered:
Got it, nice idea, I will add this idea into TODO list. thank you so much!
Sorry, something went wrong.
This feature was supported in the latest version, namely v1.4.1. Now, Platypus will start two different listeners by default,
13338
Upgrade
13337
As you can see, the data is encrypted via TLS3.
Thank you for requesting this feature, feel free to try it and leave some feedback. @ghost
WangYihang
No branches or pull requests
Description
The Platypus server currently does not support encryption which means the commands are send in cleartext over the network.
Reproduce
go run platypus.go
Run 0.0.0.0 8080
...
Encrypt [hash of listener] /path/to/ssl.crt /path/to/ssl.key
Expected behavior
The entire connection has end to end encryption
Current behavior
The connection can be eavesdropped by anyone using a wire sniffer.
Screenshots/Terminal log
Environments
The text was updated successfully, but these errors were encountered: