Addressing Innovation in Textual Communication. We believe the primary reason email client innovation has stagnated is the overwhelming complexity of the underlying infrastructure and protocols. Building new clients has become exceptionally time-consuming. That's why email clients from 2000 look remarkably similar to those in 2024. Nela is here to change that. By streamlining the development process, Nela paves the way for faster, more secure advancements in text-based communication.
To send and receive messages with Nela, all you need to do is implement two API endpoints — Nela handles message reception, while the rest is up to you. The protocol stays out of your way:
POST /nela/messages
– for receiving messagesPUT /nela/messages/<message_ref>/handshakes/<handshake_ref>
– to confirm the existence of the sender and message
The Nela protocol facilitates secure communication between systems by leveraging digital signatures and certificates to verify message authenticity. It is specifically designed to handle message delivery in environments where ensuring message integrity, sender authenticity, and message routing between multiple parties are crucial. Nela aims to provide an easy-to-use API structure for interacting systems while maintaining high security standards.
Messages sent through the Nela protocol are digitally signed to ensure authenticity and integrity. The sender signs the message with a private key, and the recipient verifies it using the corresponding public key. This mechanism ensures that:
- The message has not been altered during transit.
- The message genuinely comes from the claimed sender.
Certificates are used to verify the sender's identity. Each sender provides a certificate in PEM format along with each message, which allows the recipient to validate the authenticity of the message.
Messages follow a JSON-based structure that includes information about the sender, receiver, content, and reference details for context.
{
"message": {
"title": "Hello World",
"body": "Nice to meet you",
"sender": "[email protected]",
"direct_receiver": "[email protected]",
"all_receivers": ["[email protected]", "[email protected]"],
"conversation_ref": "b3222267-5e86-4a05-9f07-ead7c85bc580",
"message_ref": "cb97a34f-dadf-4579-9a55-485f1cc2c68c",
"handshake_ref": "851a8754-6887-4b3f-8553-fdd779d8baa4"
}
}
The handshake mechanism guarantees that a message was deliberately transmitted by the sender and is genuinely present within their infrastructure. This process enables the receiver to authenticate the sender's identity and confirm that the message has not been fabricated or impersonated.
- Sender: Send the message with a
handshake_ref
. - Receiver: Send a handshake request to the sender including the
handshake_ref
. - Receiver: Flag the message as valid (or drop otherwise) if it exists on the sender's infrastructure, ensuring that the sender address has not been manipulated.
Signature Verification: Each message includes a digital signature (signature_base64
) that is verified by the receiver using the public certificate.
Expected Domain Matching: The sender
field is validated against the domain presented in the certificate to ensure consistency and guard against impersonation attacks.
The /nela/messages
endpoint allows authorized systems to send messages to the Nela protocol server.
- URL:
/nela/messages
- Method:
POST
- Parameters:
signature
(required): The base64-encoded digital signature of the message.certificate
(required): The PEM-encoded certificate of the sender.message
(all attributes required): The message body (please find example below).
201 Created
: Message received successfully.422 Unprocessable Entity
: Missing or invalid signature/certificate.401 Unauthorized
: Signature verification failed.
curl -X POST "https://nela.example.com/nela/messages" \
-H "Content-Type: application/json" \
-d '{
"message": {
"title": "Hello World",
"body": "Nice to meet you",
"sender": "[email protected]",
"direct_receiver": "[email protected]",
"all_receivers": ["[email protected]", "[email protected]"],
"conversation_ref": "b3222267-5e86-4a05-9f07-ead7c85bc580",
"message_ref": "cb97a34f-dadf-4579-9a55-485f1cc2c68c",
"handshake_ref": "851a8754-6887-4b3f-8553-fdd779d8baa4"
},
"signature": "(Base64-encoded signature)",
"certificate": "(PEM-encoded certificate)"
}'
The /nela/messages/<message_ref>/handshakes/<handshake_ref>
endpoint allows the receiver to confirm that the message has not been fabricated or impersonated.
- URL:
/nela/messages/<message_ref>/handshakes/<handshake_ref>
- Method:
PUT
- Parameters:
signature
(required): The base64-encoded digital signature of the message.certificate
(required): The PEM-encoded certificate of the sender.message
(all attributes required): The message body (please find example below).
200 Ok
: Message successfully handshaked.404 Not Found
: Invalid message401 Unauthorized
: Signature verification failed.
curl -X PUT "https://nela.example.com/nela/messages/<message_ref>/handshakes/<handshake_ref>" \
-H "Content-Type: application/json" \
-d '{
"message": {
"sender": "[email protected]",
"direct_receiver": "[email protected]",
"conversation_ref": "b3222267-5e86-4a05-9f07-ead7c85bc580",
"message_ref": "cb97a34f-dadf-4579-9a55-485f1cc2c68c",
"handshake_ref": "851a8754-6887-4b3f-8553-fdd779d8baa4"
},
"signature": "(Base64-encoded signature)",
"certificate": "(PEM-encoded certificate)"
}'
- Extract Signature and Certificate: The
signature
andcertificate
parameters are extracted from the incoming request. - Validate Certificate: Ensure that the provided certificate is valid and that the domain matches the expected sender.
- Verify Digital Signature: Use the extracted certificate to verify that the digital signature matches the message data.
- Accept or Reject the Message: If verification succeeds, the message is accepted and processed. Otherwise, an error response is returned.
- Invalid Signature or Certificate: If the signature or certificate is invalid, an HTTP status of
401 Unauthorized
will be returned. - Missing Parameters: If either the signature or certificate is missing, an HTTP status of
422 Unprocessable Entity
will be returned.
- The client must sign the message payload and attach the base64-encoded signature.
- The client attaches the certificate in PEM format to allow the recipient to verify authenticity.
- The server verifies the signature using the provided certificate.
- If verification passes, the message is processed and saved in the database; otherwise, an appropriate error code is returned.
- Ensure that the private keys are securely stored and never exposed.
- The signature verification should use the appropriate cryptographic library to prevent any vulnerability exploitation.
- Certificates should be periodically rotated, and the public key should be verified against trusted authorities when possible.
- Navigate to a Secure Directory:
cd /path/to/your/project/config/ssl
- Generate a Private Key:
openssl genrsa -out dev_privkey.pem 2048
- Create a Self-Signed Certificate:
openssl req -new -x509 -key dev_privkey.pem -out dev_cert.pem -days 365 -subj "/CN=neladev.com"
- Verify the Certificate and Key:
openssl x509 -in dev_cert.pem -text -noout
The Nela protocol is built to ensure secure communication between different systems by leveraging digital signatures and certificates for verification. With robust authentication and validation mechanisms in place, it prevents data tampering and ensures sender authenticity. The handshake mechanism adds an additional layer of security by establishing a trusted session before message exchange.