E2EE aware proxy daemon for matrix clients.
Go to file
2019-06-19 11:56:32 +02:00
contrib config: Make the OS keyring optional. 2019-05-23 13:34:59 +02:00
docs config: Make the delay between room history fetching configurable. 2019-06-18 16:30:38 +02:00
pantalaimon daemon: Remove unnecessary pass. 2019-06-19 11:56:32 +02:00
tests tests: Add initial proxy_tests. 2019-06-19 11:22:47 +02:00
.gitignore pantalaimon: Add gitignore. 2019-04-10 12:20:09 +02:00
.travis.yml travis: Remove gobject as a dependency. 2019-05-23 18:18:24 +02:00
LICENSE pantalaimon: Add a license file. 2019-03-25 09:34:31 +01:00
Makefile Makefile: Add isort target. 2019-05-14 21:50:48 +02:00
README.md Merge branch 'matthew/macos' 2019-05-24 22:37:24 +02:00
setup.py README: Update the readme to the current pantalaimon version. 2019-05-24 14:00:33 +02:00
test-requirements.txt pantalaimon: Add tests. 2019-04-10 12:14:00 +02:00
tox.ini tox: Install pytest-cov for the coverage reporting. 2019-04-10 15:08:08 +02:00

pantalaimon

Pantalaimon is an end-to-end encryption aware Matrix reverse proxy daemon. Pantalaimon acts as a good man in the middle that handles the encryption for you.

Messages are transparently encrypted and decrypted for clients inside of pantalaimon.

Pantalaimon in action

Installation

The Olm C library is required to be installed before installing pantalaimon.

If your distribution provides packages for libolm it is best to use those, note that a recent version of libolm is required (3.1+). If your distribution doesn't provide a package building from source is required. Please refer to the Olm readme to see how to build the C library from source.

Installing pantalaimon works like usually with python packages:

python setup.py install

Pantalaimon can also be found on pypi:

pip install pantalaimon

Do note that man pages can't be installed with pip.

macOS installation

For instance, on macOS, this means:

brew install dbus
perl -pi -e's#(<auth>EXTERNAL</auth>)#<!--$1-->#' $(brew --prefix dbus)/share/dbus-1/session.conf
brew services start dbus
# it may be necessary to restart now to get the whole OS to pick up the
# existence of the dbus daemon

git clone https://gitlab.matrix.org/matrix-org/olm
(cd olm; make)
git clone https://github.com/matrix-org/pantalaimon
(cd pantalaimon; CFLAGS=-I../olm/include LDFLAGS=-L../olm/build/ python3 setup.py install)

export DBUS_SESSION_BUS_ADDRESS=unix:path=$(launchctl getenv DBUS_LAUNCHD_SESSION_BUS_SOCKET)
cd pantalaimon
DYLD_LIBRARY_PATH=../olm/build/ pantalaimon -c contrib/pantalaimon.conf

# for notification center:
git clone https://github.com/fakechris/notification-daemon-mac-py
# if you have django's `foundation` library installed and your filesystem
# is case insensitive (the default) then you will need to `pip uninstall foundation`
# or install PyObjC in a venv...
pip install PyObjC daemon glib dbus-python
cd notification-daemon-mac-py
./notify.py

Usage

While pantalaimon is a daemon, it is mean to be run as your own user. It won't verify devices for you automatically, unless configured to do so, and requires user interaction to verify, ignore or blacklist devices.

Pantalaimon requires a configuration file to run. The configuration file specifies one or more homeservers for pantalaimon to connect to.

A minimal pantalaimon configuration looks like this:

[local-matrix]
Homeserver = https://localhost:8448
ListenAddress = localhost
ListenPort = 8009

The configuration file should be placed in ~/.config/pantalaimon/pantalaimon.conf.

The full documentation for the pantalaimons configuration can be found in the man page pantalaimon(5).

Now that pantalaimon is configured it can be run:

pantalaimon --log-level debug

After running the daemon, configure your client to connect to the daemon instead of your homeserver. The daemon listens by default on localhost and port 8009.

Note that logging in to the daemon is required to start a sync loop for a user. After that clients can connect using any valid access token for the user that logged in. Multiple users per homeserver are supported.

For convenience a systemd service file is provided.

To control the daemon an interactive utility is provided in the form of panctl.

panctl can be used to verify, blacklist or ignore devices, import or export session keys, or to introspect devices of users that we share encrypted rooms with.