Skip to content

Cryptographic Security

InTunnel implements enterprise-grade cryptographic security to protect your tunnels and ensure audit log integrity.

Overview

Our security system consists of three core components working together to provide comprehensive protection:

Three Pillars of SecurityEnterprise-grade cryptographic protection for your tunnelsEd25519 SignaturesDigital Authentication128-bit security levelUnforgeable tokensMicrosecond verificationACTIVEMerkle Tree Audit LogsTamper-Evident LoggingO(log n) verificationCryptographic proofsComplete audit trailVERIFIEDHash Chain IntegritySequential VerificationSHA-256 hashingTamper detectionChain of custodyLINKED

Fig. 1 – The three pillars of InTunnel's cryptographic security

Ed25519 Digital Signatures

Fast, secure authentication using modern elliptic curve cryptography.

  • 128-bit security level
  • Microsecond signature verification
  • 32-byte public keys, 64-byte signatures

Learn more →

Merkle Tree Audit Logs

Efficient integrity verification for audit events using cryptographic hash trees.

  • O(log n) proof verification
  • Snapshot-based integrity checks
  • Tamper-evident by design

Learn more →

Hash Chain Integrity

Every audit event is cryptographically linked to its predecessor.

  • Sequential event verification
  • Immediate tampering detection
  • Unbreakable chain of custody

Learn more →

Security API

InTunnel exposes public endpoints for security verification:

EndpointDescription
GET /api/security/statusGet security system status
GET /api/security/public-keyGet Ed25519 public key for verification

Admin Endpoints

Administrators can access additional verification tools:

EndpointDescription
GET /api/security/auditQuery audit logs
POST /api/security/verify-chainVerify hash chain integrity
POST /api/security/merkle-snapshotCreate Merkle tree snapshot

Quick Verification

Check if security is enabled:

bash
curl https://intunnel.cloud/api/security/status

Response:

json
{
  "security_enabled": true,
  "features": {
    "ed25519_signatures": true,
    "merkle_audit_logs": true,
    "hash_chain_integrity": true
  },
  "key_id": "0fe1d58d053ee6dc...",
  "key_algorithm": "Ed25519"
}

Get the public key:

bash
curl https://intunnel.cloud/api/security/public-key

TIP

The public key can be used to independently verify any token issued by InTunnel.

Audit Events

The following events are logged with cryptographic signatures:

Event TypeDescription
USER_LOGINSuccessful user authentication
LOGIN_FAILEDFailed login attempt
ACCOUNT_LOCKEDAccount locked after multiple failures
USER_REGISTEREDNew user registration
USER_LOGOUTUser session ended
TUNNEL_CREATEDNew tunnel created
TUNNEL_DELETEDTunnel removed
CHAIN_VERIFIEDHash chain verification performed
MERKLE_SNAPSHOTMerkle tree snapshot created

Security Dashboard

Administrators can access the security dashboard at:

https://intunnel.cloud/admin/security

Features:

  • Real-time key status
  • Chain integrity verification
  • Audit log statistics
  • Recent security events
  • One-click Merkle snapshots

Released under the MIT License.