280 likes | 307 Views
T-110.5140 Network Application Frameworks and XML Summary and Conclusions 22.04.2008 Sasu Tarkoma. Topics Covered. Distributed systems security Multi-addressing: Mobility and multi-homing Building applications Distributed objects Role of directory services Mobile and wireless applications
E N D
T-110.5140 Network Application Frameworks and XML Summary and Conclusions22.04.2008Sasu Tarkoma
Topics Covered • Distributed systems security • Multi-addressing: Mobility and multi-homing • Building applications • Distributed objects • Role of directory services • Mobile and wireless applications • XML-based presentation and RPC • Scalability and performance issues
Objects Interconnections • Interconnections applicable on many levels • Network-level operation • DNS, overlay lookup, IPsec • Application-level operation • DHTs, SSL, SOAP, WS-Security Network Security Directories
Process Transport IP Layer Link Layer Identity/Locator split • New name space for IDs • Maybe based on DNS • Maybe a separate namespace • Maybe IP addresses are used for location • Good for hiding IP versions • Communication end-points (sockets) bound to identifiers identifier ID Layer locator
Upper layer view • IP connectivity problematic today • Broken by firewalls, NATs, mobility • Two versions of IP: IPv4 and IPv6 • HIP has a potential remedy • Restores end-to-end connectivity (NAT traversal possible but may require changes / tunnelling) • Adds opportunistic security • Handles mobility and multi-homing • Requires DHT based overlay (currently missing) • Where is the network state? • Routers know addresses • Like today • DHT knows HITs / SIDs • Lease based storage • Middleboxes know SPIs • Soft state
Lessons to learn • Hierarchical routing likely to stay • Addresses carry topological information • Efficient and well established • Applications face changing connectivity • QoS varies • periods of non-connectivity • Identifiers and locators likely to split • Mobility management is needed • Probably changes in directory services • Overlays have been proposed
Summary • Topology based routing is necessary • Mobility causes address changes • Address changes must be signalled end-to-end • Mobility management needed • Initial rendezvous: maybe a directory service • Double jump problem: rendezvous needed • Many engineering trade-offs
Overlay Networks • Origin in Peer-to-Peer (P2P) • Builds upon Distributed Hash Tables (DHTs) • Easy to deploy • No changes to routers or TCP/IP stack • Typically on application layer • Overlay properties • Resilience • Fault-tolerance • Scalability
Some DHT applications • File sharing • Web caching • Censor-resistant data storage • Event notification • Naming systems • Query and indexing • Communication primitives • Backup storage • Web archive
Examples • Middleware • CORBA • Message-oriented Middleware • Event Systems & tuple spaces • Java Message Service • Java 2 Enterprise Edition (J2EE) • .NET • Mobile middleware • WAE • J2ME • Wireless CORBA • FUEGO
Summary • Middleware • for application development and deployment • for supporting heterogeneous environments • Main communication paradigms: RPC/RMI, asynchronous events (publish/subscribe) • J2EE, CORBA, .. • Mobile middleware • Desktop middleware not usable on small, mobile devices • Special solutions are needed • J2ME, Wireless CORBA, ..
Standardization • W3C Web Services • XML Protocol Working Group • SOAP • Web Services Addressing Working Group • Web Services Choreography Working Group • Web Services Description Working Group • WSDL • OASIS • E-business standards, UDDI • WS-I (Web Service Interoperability Org.) • Binding profiles,..
Web Service Architecture • The three major roles in web services • Service provider • Provider of the WS • Service Requestor • Any consumer / client • Service Registry • logically centralized directory of services • A protocol stack is needed to support these roles
Web Services Protocol Stack • Message Transport • Responsible for transporting messages • HTTP, BEEP • XML Messaging • Responsible for encoding messages in common XML format • XML-RPC, SOAP • Service Description • Responsible for describing an interface to a specific web service • WSDL • Service discovery • Responsible for service discovery and search • UDDI
Need for XML security • XML document can be encrypted using SSL or IPSec • this cannot handle the different parts of the document • documents may be routed hop-by-hop • different entities must process different parts of the document • SSL/TLS/IPSec provide message integrity and privacy only when the message is in transit • We also need to encrypt and authenticate the document in arbitrary sequences and to involve multiple parties
Application-layer Security • Identity-based security • Authentication and authorization information shared across security domains • Content-based security • Protecting against buffer overflow and CGI-like attacks • Must have knowledge about the applications to which these messages are directed • Accountability or non-repudation • Need message level security • Maintain integrity, archived audit trails • The standards and specifications mentioned earlier address these issues
Basic XML Security • XML Digital Signatures (XMLDSIG) • XML Encryption • XML Canonicalization • XML Key Management
Summary • Security contexts • Security needed within and between contexts • XML validation, encryption, and authentication needed between security contexts! • WS security standard revisited • SOAP header carries security information (and other info as well) • Selective processing • SAML • Statements about authorization, authentication, attributes • SAML & WS-Security & XACML • Implementations available
With identity/locator split + overlays? CONTROL Upper layers DNS names, custom identifiers Overlay Overlay addresses Host Identities Congestion ID Layer IP addresses IP addresses End-to-end DATA Routing Routing paths Routing paths
”Theory” ”Practice” ”Future?” WS Security WS Security WS Security SOAP H I P C TRL SOAP SOAP HTTP?/sockets HTTP/TLS/sockets TCP TCP TCP4 TCP6 HIPsec IP IPv4 IPv6 IPv4 IPv6
Discussion • Interesting things are happening on L7 • Ajax, content delivery, BitTorrent, DHTs, OpenID, mashups, REST, .. • Web services have enabled significant business • Google, Amazon, .. • Based on custom software • Network layer support for applications is not perfect • Channel binding, end-host reachability, trust, DoS • Incremental network evolution vs. clean slate developments • Control points • Interdomain policies and peering
Important Dates • Exam on 9.5. 9-12 in T1. • Deadline for the second assignment 12.5. • Remember course feedback • http://www.cs.hut.fi/Opinnot/Palaute/kurssipalaute.html