How to debug ----------------------------------------- monitor the events socket: sudo ngrep -W byline -d any port 9000 launch the server: python server.py launch the client: python client.py if zmq is available and enabled, you should see encrypted messages passing by the socket. You should see something like the following: #### T 127.0.0.1:9000 -> 127.0.0.1:33122 [AP] .......... ## T 127.0.0.1:33122 -> 127.0.0.1:9000 [AP] ........... ## T 127.0.0.1:9000 -> 127.0.0.1:33122 [AP] ..CURVE............................................... # T 127.0.0.1:33122 -> 127.0.0.1:9000 [AP] .CURVE............................................... # T 127.0.0.1:33122 -> 127.0.0.1:9000 [AP] ...HELLO.............................................................................:....^...".....'.S...n......Y...................O.7.+.D.q".*..R...j.....8..qu..~......Ck.G\....:...m....Tg.s..M..x<.. ## T 127.0.0.1:9000 -> 127.0.0.1:33122 [AP] ...WELCOME..%.'.,Td... I..}...........`..Nm......./_.Je...4.....-.....f 127.0.0.1:9000 [AP] ..........INITIATE......!.*.=0.-......D..]{...A\.tz...!2.....A./ 6.......Y.h.N....cb.U.|..f..)....W..3..X.2U.3PGl.........m..95.(......NJ....5.'..W.GQ..B/.....\%.,Q..r.'L5.......{.W<=._.$.(6j.G... ...37.H..Th...'.........0 ........,..q....U..G..M.`!_..w....f.".......... .d.K.Y.>f.n.kV. # T 127.0.0.1:9000 -> 127.0.0.1:33122 [AP] .2.READY............A...e.)......*.8y....k.<.N1Z.4.. # T 127.0.0.1:33122 -> 127.0.0.1:9000 [AP] .+.MESSAGE........o...*M..,.... .r..w..[.GwcU ###