QSCSCore — Recorded Daemon Output
A real captured session of QSCSCore performing a fully encrypted, cross-node request cycle now includes:
- PeerListener startup on TCP:4443
- Ephemeral X25519 handshake per connection (fresh keypair, shared secret, HKDF session key)
- AES‑256‑GCM frame decryption of inbound Delta frames
- Delta deserialization including protocol, host, and URI
- State persistence into the local stateRegistry + DeltaRegistry
- Full HTTP request rehydration from Delta metadata
- Upstream fetch via internal DNS resolver + raw HTTP client
- Payload indexing + diffing to detect changes
- ResponseDelta generation (full response or NoChange)
- AES‑256‑GCM encrypted return frame sent back to the initiator
- End‑to‑end deterministic round‑trip completed over the QSCS substrate
QSCSCore — Daemon Output
Test Case Used in This Demo
The runtime sequence above was generated using a multi‑step test script that exercises both GET and POST flows through the QSCSCore UNIX domain socket.
The script issues:
- GET
http://spook.systems/public/demo
(initial full upstream fetch + full ResponseDelta) - POST
http://spook.systems/public/demo
with JSON body modifying colours (bodyColor,h1Color) - GET
http://spook.systems/public/demo
(incremental delta detection after POST) - GET
http://spook.systems/public/demo
(NoChange response from cache) - POST
http://spook.systems/public/demo
reverting colours to defaults - GET
http://spook.systems/public/demo
(final state verification)
Each request triggers:
- URI + Host parsing
- StateID allocation
- Delta creation and persistence
- DNS resolution via internal resolver
- Encrypted TCP:4443 session establishment
- Delta transmission to remote QSCSCore
- Remote rehydration + upstream fetch
- Payload indexing + diffing
- ResponseDelta or NoChange return
- Local HTTP response reconstruction