This package is part of NDNts, Named Data Networking libraries for the modern web.
This package implements trust schemas.
import { TrustSchemaPolicy, pattern as P, TrustSchema, TrustSchemaSigner, TrustSchemaVerifier } from "@ndn/trust-schema";
// other imports for examples
import { Certificate, KeyChain, generateSigningKey } from "@ndn/keychain";
import { Component, Data, ValidityPeriod } from "@ndn/packet";
import assert from "node:assert/strict";
Yingdi Yu proposed trust schema in Schematizing Trust in Named Data Networking. According to his definition:
Pollere LLC released Versatile Security Toolkit (VerSec) as part of Defined-trust Communications Toolkit (DCT). It has a schema description language that describes constraints on:
The language specification is fairly complex and contains certain ambiguity. The compiler implementation is found to have several limitations.
python-ndn library authors defined Light VerSec (LVS), a lightweight modification of VerSec that focuses on signing key validation.
Its syntax and semantics are similar to VerSec.
For ease of processing, LVS introduced some restrictions on identifier names and token ordering.
NDNts @ndn/lvs
package can import LVS trust schema via its binary format.
The trust schema implementation in this package is inspired by the above documents and projects. The overall structure is:
TrustSchema
+-TrustSchemaPolicy
| +-patterns = set of
| | id => Pattern
| | +-ConstPattern
| | +-VariablePattern
| | +-CertNamePattern
| | +-ConcatPattern
| | +-AlternatePattern
| | \-OverlapPattern
| |
| \-rules = set of
| packet name pattern id <= signer name pattern id
|
\-trust anchors = array of Certificate
TrustSchema
type represents a trust schema.
It contains a TrustSchemaPolicy
and an array of trust anchor certificates.
TrustSchemaPolicy
type represents the policy portion of a trust schema.
It contains a set of patterns, each has a unique id
string.
It also contains a set of rules, which indicates a packet matching the first pattern should be signed by a key matching the second pattern.
Pattern
type represents a pattern in the trust schema policy.
It must be one of these sub-types:
ConstPattern
matches one or more name components specified as a constant in the policy.VariablePattern
matches one or more name components (specified as a range), optionally overlapped with an inner pattern and filtered by a JavaScript function.
It can save matched components to a variable.
When the same variable appears in both packet name pattern and signer name pattern, the matched name component(s) must be the same.CertNamePattern
matches either KEY/key-id
or KEY/key-id/issuer-id/version
suffix in NDN Certificate Format.ConcatPattern
concatenates two or more other patterns.AlternatePattern
accepts any match among two or more possible patterns.OverlapPattern
accepts one or more name components that satisfy two or more overlapped patterns.The following code defines a trust schema policy of the blog website in Schematizing Trust paper figure 3:
export const policy = new TrustSchemaPolicy();
policy.addPattern("root", new P.ConcatPattern([
new P.ConstPattern("/a/blog"),
new P.CertNamePattern(),
]));
policy.addPattern("#article", new P.ConcatPattern([
new P.ConstPattern("/a/blog/article"),
new P.VariablePattern("category"), new P.VariablePattern("year"), new P.VariablePattern("month"),
]));
policy.addPattern("admin", new P.ConcatPattern([
new P.ConstPattern("/a/blog/admin"),
new P.VariablePattern("admin"), new P.CertNamePattern(),
]));
policy.addPattern("author", new P.ConcatPattern([
new P.ConstPattern("/a/blog/author"),
new P.VariablePattern("author"), new P.CertNamePattern(),
]));
policy.addRule("#article", "author");
policy.addRule("admin", "root");
policy.addRule("author", "admin");
With the policy in place, we can generate a root key and make the trust schema object.
const keyChain = KeyChain.createTemp();
const [rootPvt, rootPub] = await generateSigningKey(keyChain, "/a/blog");
const rootCert = await Certificate.selfSign({ publicKey: rootPub, privateKey: rootPvt });
await keyChain.insertCert(rootCert);
const schema = new TrustSchema(policy, [rootCert]);
TrustSchemaSigner
type can automatically select a signer among available certificates in the KeyChain.
const schemaSigner = new TrustSchemaSigner({ keyChain, schema });
const [adminPvt, adminPub] = await generateSigningKey(keyChain, "/a/blog/admin/Lixia");
const adminCert = await Certificate.issue({
publicKey: adminPub,
validity: ValidityPeriod.daysFromNow(30),
issuerId: Component.from("blog"),
issuerPrivateKey: schemaSigner,
});
await keyChain.insertCert(adminCert);
// admin certificate should be signed by root key
assert.equal(adminCert.issuer?.toString(), rootCert.name.toString());
const [authorPvt, authorPub] = await generateSigningKey(keyChain, "/a/blog/author/Yingdi");
const authorCert = await Certificate.issue({
publicKey: authorPub,
validity: ValidityPeriod.daysFromNow(30),
issuerId: Component.from("blog"),
issuerPrivateKey: schemaSigner,
});
await keyChain.insertCert(authorCert);
// author certificate should be signed by admin key
assert.equal(authorCert.issuer?.toString(), adminCert.name.toString());
const articleData = new Data("/a/blog/article/food/2015/1");
await schemaSigner.sign(articleData);
// article should be signed by author key
assert.equal(articleData.sigInfo.keyLocator?.name?.toString(), authorCert.name.toString());
// Data that does not match the policy cannot be signed.
const otherData = new Data("/a/blog/not-article/poison/2015/13");
await assert.rejects(schemaSigner.sign(otherData));
TrustSchemaVerifier
type can verify packets according to the trust schema.
It can collect intermediate certificates from a local KeyChain and from the network.
const schemaVerifier = new TrustSchemaVerifier({
schema: new TrustSchema(policy, [rootCert]),
offline: true,
keyChain,
});
// The article is trusted.
await schemaVerifier.verify(articleData);
// Although an author could sign the other Data manually, it is not trusted by schema.
await authorPvt.sign(otherData);
await assert.rejects(schemaVerifier.verify(otherData));