PublicKey Info Base » History » Version 32
Yingdi Yu, 07/15/2014 09:21 AM
1 | 1 | Yingdi Yu | Public key Info Base (PIB) Service |
---|---|---|---|
2 | ================================== |
||
3 | |||
4 | ## Public Key Info Management |
||
5 | |||
6 | NDN data packets are secured through digital signatures. |
||
7 | 2 | Yingdi Yu | In order to generate a valid signature, an NDN application needs to know not only the correct key to use but also the correct public key information that should be put into the `KeyLocator` of a data packet. |
8 | The information needs to be managed locally on the system where the application is running. |
||
9 | |||
10 | The information related to keys is managed at three granularities: identities, keys, and certificates. |
||
11 | A key is always associated with a namespace, called "identity". |
||
12 | 4 | Yingdi Yu | An identity however may have more than one keys. |
13 | Each key is named as `/<Identity>/[KeyId]`. |
||
14 | The `KeyId` uniquely identifies a key which belongs to the `Identity`. |
||
15 | 2 | Yingdi Yu | Among these keys, only one is the default key of the identity. |
16 | If only identity is provided when signing a packet, the default key of the identity will be used to sign the packet. |
||
17 | |||
18 | A certificate is always associated with the key in the certificate |
||
19 | If a certificate is provided when signing a packet, the corresponding private key should be used to sign the packet |
||
20 | and the name of the certificate name may be put into the `KeyLocator` of the packet. |
||
21 | |||
22 | A key may have more than one certificates (e.g., certificates may be issued by different parties). |
||
23 | Among these certificates, only one is the default certificate of the key. |
||
24 | The default certificate of the default key of an identity is the default certificate of the identity. |
||
25 | If only identity is provided when signing a packet, the name of the default certificate of the identity may be put into the `KeyLocator` of the packet. |
||
26 | |||
27 | 3 | Yingdi Yu | All the information above may be accessed by different APIs and applications on the same system, |
28 | therefore it is desirable to make the information provisioning as a system service. |
||
29 | 1 | Yingdi Yu | |
30 | 3 | Yingdi Yu | Since public keys and certificates are supposed to be publicly available, |
31 | the service also serves as a local storage of certificate and public keys, |
||
32 | besides providing the public key related information. |
||
33 | 1 | Yingdi Yu | |
34 | 3 | Yingdi Yu | ## PIB management model |
35 | 1 | Yingdi Yu | |
36 | 3 | Yingdi Yu | The public key information of each system user is managed separately in PIB. |
37 | For now, PIB service is a system service (i.e., run by root). |
||
38 | PIB service may be separated into several user services (i.e., run by each user) in the future. |
||
39 | 1 | Yingdi Yu | |
40 | 3 | Yingdi Yu | Each user has three tables in PIB: identity table, key table, and certificate table. |
41 | 1 | Yingdi Yu | The public key information of a user is managed in these tables. |
42 | 4 | Yingdi Yu | Identity table consists of two columns: `identity` (primary key) and `default_key_id`. |
43 | 16 | Yingdi Yu | Identity table schema: |
44 | |||
45 | 17 | Yingdi Yu | User_[UserName]_ID( |
46 | 16 | Yingdi Yu | identity BLOB NOT NULL, |
47 | default_key_id BLOB, |
||
48 | |||
49 | PRIMARY KEY (identity) |
||
50 | ); |
||
51 | |||
52 | 4 | Yingdi Yu | Key Table consists of five columns: `identity`, `key_id`, `key_type`, `key_bits`, and `default_cert_name`. |
53 | The combination of `identity` and `key_id` is the primary key of key table. |
||
54 | 18 | Yingdi Yu | Key table schema: |
55 | |||
56 | User_[UserName]_KEY( |
||
57 | identity BLOB NOT NULL, |
||
58 | key_id BLOB NOT NULL, |
||
59 | key_type INTEGER NOT NULL, |
||
60 | key_bits BLOB NOT NULL, |
||
61 | default_cert_name BLOB, |
||
62 | PRIMARY KEY (identity, key_id) |
||
63 | ); |
||
64 | |||
65 | 4 | Yingdi Yu | Certificate table consists of four columns: `certificate_name` (primary key), `identity`, `key_id`, and `certificate_data`. |
66 | 18 | Yingdi Yu | Certificate table schema: |
67 | |||
68 | User_[UserName]_CERT( |
||
69 | certificate_name BLOB NOT NULL, |
||
70 | identity BLOB NOT NULL, |
||
71 | key_id BLOB NOT NULL, |
||
72 | certificate_data BLOB NOT NULL, |
||
73 | PRIMARY KEY (certificate_name) |
||
74 | ); |
||
75 | 4 | Yingdi Yu | |
76 | Besides the tables for each user, PIB has two more management tables: user table and certificate_publishing table. |
||
77 | User table stores user's local management key (we will discuss it later) and user's default identity |
||
78 | 3 | Yingdi Yu | Each user has its own default identity. |
79 | From the default identity, the default key and certificate of the user can be derived. |
||
80 | 1 | Yingdi Yu | |
81 | 14 | Yingdi Yu | User table schema: |
82 | |||
83 | User( |
||
84 | user_name BLOB NOT NULL, |
||
85 | has_default_identity INTEGER DEFAULT 0, |
||
86 | default_identity BLOB, |
||
87 | local_management_cert BLOB NOT NULL, |
||
88 | |||
89 | PRIMARY KEY (user_name) |
||
90 | ); |
||
91 | |||
92 | 19 | Yingdi Yu | Certificate_Publishing table schema: |
93 | |||
94 | Certificate_Publishing( |
||
95 | user_name BLOB NOT NULL, |
||
96 | publish_namespace BLOB NOT NULL, |
||
97 | |||
98 | PRIMARY KEY (user_name, publish_namespace) |
||
99 | ); |
||
100 | |||
101 | 1 | Yingdi Yu | The read access to a user's public key information is not restricted, |
102 | while the write access to a user's public key information requires authentication. |
||
103 | The write access is expressed as signed commands. |
||
104 | 5 | Yingdi Yu | The signing key can be authenticated only if the key already exists in the corresponding user's PIB tables. |
105 | 4 | Yingdi Yu | Each key has its own write access privilege which is defined as: |
106 | 3 | Yingdi Yu | |
107 | 4 | Yingdi Yu | * The root user has the **root key** of the local system. The root key has the highest privilege, i.e., its owner is allowed to change anything in PIB. The identity of the root key is `/localhost`, and the name of the root key should be `/localhost/[KeyId]`. |
108 | * Each user has its own **local management key**. The local management key is allowed to change anything in the user's PIB info including the three tables and user's own entry in the user table. The identity of the user local management key is `/localhost/user/[UserName]`, and the name of the key should be `/localhost/user/[UserName]/[KeyId]`. Note that the local management key of the root user is the root key. |
||
109 | 6 | Yingdi Yu | * All the other keys are called **regular keys**. A regular key is allowed to change keys/certificates with identities under the key's own namespace, e.g., a key with the identity `/ndn/ucla/alice` is allowed to change a key with the identity `/ndn/ucla/alice/chat` but is not allowed to change a key with the identity `/ndn/ucla/bob`. |
110 | 3 | Yingdi Yu | |
111 | ## PIB Service Protocol |
||
112 | |||
113 | PIB service provides an interface to NDN applications for public key info lookup. |
||
114 | 1 | Yingdi Yu | The interface is defined in terms of NDN packets (interest/data). |
115 | 32 | Yingdi Yu | Depending on the query type, a query to PIB is expressed as a **[signed interest](http://redmine.named-data.net/projects/ndn-cxx/wiki/SignedInterest)** (for Write operation) or normal interest (for Read operation). |
116 | 5 | Yingdi Yu | The query interest is defined as: |
117 | |||
118 | /localhost/pib/[UserName]/[Verb]/[Param]/<signed_interest_security_components> |
||
119 | |||
120 | `UserName` indicates the tables in which the query should apply. |
||
121 | `Verb` indicates the access operation. |
||
122 | 8 | Yingdi Yu | Four types of operations are defined: `get` (Read), `search` (Read), `update` (Write), and `delete` (Write). |
123 | 5 | Yingdi Yu | The operation `get` and `search` are quite similar to each other. |
124 | The only difference is that the response to `get` is the queried entity per se while the response to `search` operation is the existence (a boolean value) of the queried entity. |
||
125 | `Param` is a TLV block containing parameters of the query. |
||
126 | Different types of operations have their own parameters. |
||
127 | |||
128 | ### `Get` Parameters |
||
129 | For `get` operation, `Param` is defined as: |
||
130 | |||
131 | 23 | Yingdi Yu | GetParam := Type |
132 | Filter |
||
133 | Filter := NameFilter | DefaultOfFilter | ListOfFilter |
||
134 | 25 | Yingdi Yu | NameFilter := Name |
135 | 26 | Yingdi Yu | DefaultOfFilter := Type |
136 | Name |
||
137 | ListOfFilter := Type |
||
138 | 23 | Yingdi Yu | Name |
139 | Type := ID | KEY | CERT |
||
140 | 5 | Yingdi Yu | |
141 | `Type` indicates which table the query will be applied eventually. |
||
142 | `Filter` indicates how to apply the query. |
||
143 | When `Name` is specified in `Filter`, PIB will directly lookup the entry with the same name in the table indicated by `Type`. |
||
144 | When `DefaultOf` is specified in `Filter`, PIB will first derive the name of the target through the default information and lookup the entry in the table indicated by `Type`. |
||
145 | When `ListOf` is specified in `Filter`, PIB will collect all the entries that satisfy the condition specified in `ListOf`. |
||
146 | Here are some examples of `GetParam`: |
||
147 | |||
148 | GetParam |
||
149 | { |
||
150 | Type: KEY |
||
151 | Filter |
||
152 | { |
||
153 | Name: /ndn/edu/ucla/ksk-1234 |
||
154 | } |
||
155 | } |
||
156 | |||
157 | The example above is a query to get a key with the name `/ndn/edu/ucla/ksk-1234`. |
||
158 | |||
159 | GetParam |
||
160 | { |
||
161 | Type: CERT |
||
162 | Filter |
||
163 | { |
||
164 | DefautOf |
||
165 | { |
||
166 | Type: ID |
||
167 | Name: /ndn/edu/ucla/alice |
||
168 | } |
||
169 | } |
||
170 | } |
||
171 | |||
172 | The example above is a query to get the default certificate of an identity `/ndn/edu/ucla/alice`. |
||
173 | |||
174 | GetParam |
||
175 | { |
||
176 | Type: CERT |
||
177 | Filter |
||
178 | { |
||
179 | ListOf |
||
180 | { |
||
181 | Type: KEY |
||
182 | Name: /ndn/edu/ucla/ksk-1234 |
||
183 | } |
||
184 | } |
||
185 | } |
||
186 | |||
187 | 10 | Yingdi Yu | The example above is a query to get a list of certificates of a key `/ndn/edu/ucla/alice`. |
188 | 5 | Yingdi Yu | |
189 | ### `Search` Parameters |
||
190 | |||
191 | The parameters of `search` operation is quite similar to `get` operation except that there is no `ListOf` filter. |
||
192 | |||
193 | 24 | Yingdi Yu | SearchParam := Type |
194 | Filter |
||
195 | Filter := NameFilter | DefaultOfFilter |
||
196 | NameFilter := Name |
||
197 | 27 | Yingdi Yu | DefaultOfFilter := Type |
198 | 24 | Yingdi Yu | Name |
199 | Type := ID | KEY | CERT |
||
200 | 10 | Yingdi Yu | |
201 | 24 | Yingdi Yu | The response to `search` operation is a boolean value to indicate the existence of the searched entity |
202 | 5 | Yingdi Yu | |
203 | ### `Update` Parameters |
||
204 | |||
205 | The parameters of `update` operation are defined as: |
||
206 | |||
207 | UpdateParam := Entity |
||
208 | DefaultOpt |
||
209 | Entity := Identity | PublicKey | Certificate |
||
210 | Identity := Name |
||
211 | PublicKey := Name |
||
212 | Bytes |
||
213 | 31 | Yingdi Yu | Certificate := Data |
214 | 5 | Yingdi Yu | DefaultOpt := USER_DEFAULT | ID_DEFAULT | KEY_DEFAULT | NO_DEFAULT |
215 | |||
216 | 7 | Yingdi Yu | The operation, once validated, will add a new entry in the corresponding table if no such an entry exists or update the existing entry, |
217 | 1 | Yingdi Yu | and change the default setting according to `DefaultOpt`. |
218 | |||
219 | 8 | Yingdi Yu | ### `Delete` Parameters |
220 | 1 | Yingdi Yu | |
221 | 8 | Yingdi Yu | The parameters of `delete` operation are defined as: |
222 | |||
223 | 28 | Yingdi Yu | DeleteParam := Type |
224 | 8 | Yingdi Yu | Name |
225 | Type := ID | KEY | CERT |
||
226 | |||
227 | 11 | Yingdi Yu | The entity and its belonging entities will be deleted once the operation is validated. |
228 | 8 | Yingdi Yu | |
229 | 1 | Yingdi Yu | ### TLV-TYPE assignments |
230 | |||
231 | Type | Assigned value | Assigned value (hex) |
||
232 | ------------------------------------------- | ----------------- | -------------------- |
||
233 | GetParam | 128 | 0x80 |
||
234 | SearchParam | 129 | 0x81 |
||
235 | UpdateParam | 130 | 0x82 |
||
236 | 8 | Yingdi Yu | DeleteParam | 131 | 0x83 |
237 | Type | 132 | 0x84 |
||
238 | 22 | Yingdi Yu | NameFilter | 133 | 0x85 |
239 | DefaultOfFilter | 134 | 0x86 |
||
240 | ListOfFilter | 135 | 0x87 |
||
241 | 30 | Yingdi Yu | Identity | 136 | 0x88 |
242 | PublicKey | 137 | 0x89 |
||
243 | Certificate | 138 | 0x8a |
||
244 | Bytes | 139 | 0x8b |
||
245 | DefaultOpt | 140 | 0x8c |
||
246 | 5 | Yingdi Yu | |
247 | ### Constant value assignments |
||
248 | |||
249 | For type `Type`: |
||
250 | |||
251 | Constant | Assigned value | Assigned value (hex) |
||
252 | ------------------------------------------- | ----------------- | -------------------- |
||
253 | ID | 0 | 0x00 |
||
254 | KEY | 1 | 0x01 |
||
255 | CERT | 2 | 0x02 |
||
256 | |||
257 | For type `DefaultOpt`: |
||
258 | |||
259 | Constant | Assigned value | Assigned value (hex) |
||
260 | ------------------------------------------- | ----------------- | -------------------- |
||
261 | 1 | Yingdi Yu | NO_DEFAULT | 0 | 0x00 |
262 | USER_DEFAULT | 1 | 0x01 |
||
263 | ID_DEFAULT | 2 | 0x02 |
||
264 | KEY_DEFAULT | 3 | 0x03 |
||
265 | 12 | Yingdi Yu | |
266 | ### Query Responses |
||
267 | |||
268 | The response to a query interest is a data packet signed by PIB. |
||
269 | The public key certificate of PIB is stored in a read-only file and is accessible to all users on the system. |
||
270 | |||
271 | The content of the response to `get` operation could be one of the three TLV defined above: `Identity` (0x8b), `PublicKey` (0x8c), and `Certificate` (0x8d), or a list of these TLVs. |
||
272 | The content of the response to `search` operation is a byte. Non-zero byte stands for true while 0x00 stands for false. |
||
273 | 20 | Yingdi Yu | The content of the response to `update` or `delete` operation is an uint32_t which serves as an error code. |
274 | 21 | Yingdi Yu | 0 stands for success while non-zero byte stands for failure. |
275 | 13 | Yingdi Yu | |
276 | Error code for `update`: |
||
277 | |||
278 | Error code | Value | Description |
||
279 | ----------------------- | ----------------- | -------------------- |
||
280 | ERR_SUCCESS | 0 | No error |
||
281 | |||
282 | Error code for `delete`: |
||
283 | |||
284 | Error code | Value | Description |
||
285 | ----------------------- | ----------------- | -------------------- |
||
286 | ERR_SUCCESS | 0 | No error |