… | |
… | |
14 | chunks of binary data. |
14 | chunks of binary data. |
15 | |
15 | |
16 | The connections created by this module use the same security mechanisms |
16 | The connections created by this module use the same security mechanisms |
17 | as normal AEMP connections (secure authentication, optional use of TLS), |
17 | as normal AEMP connections (secure authentication, optional use of TLS), |
18 | and in fact, use the same listening port as AEMP connections, so when two |
18 | and in fact, use the same listening port as AEMP connections, so when two |
19 | nodes can reach each other, they can, with high probability, creare a data |
19 | nodes can reach each other via the normal aemp protocol, they can create |
20 | connection between them. |
20 | data connections as well, no extra ports or firewall rules are required. |
21 | |
21 | |
22 | The protocol is, however, not the AEMP transport protocol, so this will |
22 | The protocol used is, however, not the AEMP transport protocol, so this |
23 | only work between nodes implementing the "aemp-dataconn" protocol. |
23 | will only work between nodes implementing the "aemp-dataconn" protocol extension. |
24 | |
24 | |
25 | =head1 FUNCTIONS |
25 | =head1 FUNCTIONS |
26 | |
26 | |
27 | =over 4 |
27 | =over 4 |
28 | |
28 | |