applications for ndn
play

Applications for NDN James Kasten University of Michigan Network - PowerPoint PPT Presentation

Applications for NDN James Kasten University of Michigan Network Authentication Public Key Infrastructure Pairing Keys with Identity or Authority Major Challenges Management Distribution Revocation Renewal Lets


  1. Applications for NDN James Kasten University of Michigan

  2. Network Authentication  Public Key Infrastructure  Pairing Keys with Identity or Authority  Major Challenges  Management  Distribution  Revocation  Renewal

  3. Let’s Encrypt  New Certificate Authority  Open source  Simple  Automated  ACME (new protocol)  Verification  Issuance  Renewal  Revocation  One command to enable TLS  sudo letsencrypt

  4. Let’s Encrypt Trust Model  Domain validation (DV)  Similar to trust on first use example.com challenge chal allen lenge example.com Let’sEncrypt

  5. Quick Demo

  6. Benefits for NDN  Authority instantiated out of the box  A framework to receive automated authorizations  Open mHealth  Individual service CAs can grant various authorizations  Automatically place authorizations in local IdentityManager  EBAMS  Large computing base with few resources  ACME is lightweight  Local CAs/controllers can propagate trust downwards automatically

  7. High-level ACME Overview Client Server Identifier Challenges Account Public Key Responses Verify Responses Authorization Certificate Request Certificate

  8. High-level ACME Overview Client Server Identifier Challenges Account Public Key Responses Verify Responses Authorization Certificate Request Certificate

  9. Potential NDN Challenge Types  Prove ownership  resource being verified  Can be flexible to the organization/application  Organization or university  Demonstrate control of associated email address  Localized CAs - EBAMS  Simple publishing/receiving content on a particular interface at a particular time  previous account or “authorized key”  Publish content under known existing key  Provide proof of ownership of a trusted account or authorization  Recovery Contact (email address)  Bearer Token

  10. Integrating ACME into NDN  Define a suitable set of challenges for NDN  Define trust models/verification requirements for authorization in applications  Implementation  Code in progress  Battle-tested CA source code  Extensible client written in Python  Necessary Changes  Redefine CSR/Signing procedure (different format)  Redefine networking code  Define NDN specific challenges

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend