4C Network Security - Overview

4C Network Security - Overview

The 4.4 version of 4C is the first release of Secure4C. All future versions will also be secure. Secure4C allows you to:
Some issues that have not been addressed yet, but may be in the future if there is enough interest are:
Before going into too much detail, here are a few definitions that are important:


4C Services

4C implements the following services:


4C Authentication

All 4C authentication is handled by the 4csrvrd process which normally runs with root privileges on Unix systems or LocalSystem privileges on NT systems. The methods that 4C currently allows a client to use for authentication are: Authentication via PublicKey may be implemented in the future. Currently, I think very few clients would choose to use this method. Let me know if you think otherwise.


4C Encryption

4C Encryption makes use of the crypto library that is part of OpenSSL. The encryption algorithms used are called ciphers and they can be used in more than one mode and in multiple keysizes. You can read about them in many different Cryptograaphy books. The symetric ciphers, modes, and keysizes that 4C supports are:
As a default, 4C does not allow symetric encryption keylens > 64 unless strong encryption has been enabled through serialization. Servers residing in the US or Canada serialized with the new serialization program, 4csp, can have strong encryption enabled. To enable strong encryption on a server outside of those locales your application needs an export license from the Bureau of Industry and Security, US Department of Commerce. For more information regarding export of strong encryption software, please see docs at: The Bureau of Industry and Security.
If you have questions on this, please consult an export lawyer. I cannot help with obtaining an export license.

Even when strong encryption is not enabled, user authentication can and does use strong encryption.

If you need to understand more about encryption ciphers and modes you should look them up in the Bruce Schneier book, Applied Cryptography. If you just want a recomendation on what to use, my suggestion is to use one of the following:

Back to Top