IDRE Protocol β€” Live Node

HIVE-P2P/1.2 β€’ Two nodes running β€’ Open for testing

What is this?

Two IDRE HIVE nodes (Alice & Bob) running the full protocol stack. Security researchers can interact with the protocol, inspect wire format, and test attack vectors.

57 tests pass Pepper MANDATORY Rate limited HMAC-SHA256

πŸ”¬ Interactive Demo API

GET /api/demo/status
Health check β€” see both nodes' state
POST /api/demo/send
Encrypt a message (Alice→Bob). Body: {"message": "hello"}. Returns wire format.
POST /api/demo/receive
Submit wire message to Bob. Try tampering first! Body: {"wire_message": {...}}
POST /api/demo/handshake
Walk through a full challenge/verify handshake
GET /api/demo/fingerprint
Public fingerprint bits β€” what an attacker observes
GET /api/demo/config
Public config + attacker's challenge

🎯 Raw Protocol Endpoints (Attack Surface)

GET /node-a/health
Node A (Alice) β€” health probe
GET /node-b/health
Node B (Bob) β€” health probe
POST /node-a/hive/v12/challenge
Initiate handshake with Node A (rate limited: 5 req/s)
POST /node-a/hive/v12/verify_req/process
Submit encrypted message to Node A (rate limited: 2 req/s)
⚠️ Rate limiting is active. Burst floods will trigger HTTP 429. This is intentional β€” test it.

πŸ“„ Resources

GitHub Repository β€” Full source, tests, attack suite

MTI-EVO Project β€” Parent project

IDRE v2.4 β€’ Integer-Dependent Receiver Encoding β€’ Β© 2026 Miguel A. Morelo Bustamante