The open source
Network Interceptor demo
What does the sample do?
This sample demonstrates the use of a Network interceptor in a very simple authentication scheme.
The authentication consists in the client side of each connection sending a user name that must match the user name on the server side. The server then sends a response, either "OK" or an error message. If the repsonse is "OK" then client will proceed with the conenction, otherwise it will exit.
The user name is set as a system property -Djppf.user.name=<user_name> on all JPPF processes (client, server, nodes), and the interceptor encrypts it before send it over the network. As in the Network Data Encryption demo, the network data is encrypted using a DES cipher with a 56 bits symetric secret key. This secret key is kept in a keystore included in the resulting jar file deployed to the nodes, servers and clients. Therefore, the jar file is the weakest point in the security chain. This design should not be used in production, but it is sufficient for the needs of this demo.
How do I run it?To build and run the demo, please follow these steps:
I have additional questions and comments, where can I go?
If you need more insight into the code of this demo, you can consult the Java source files located in the NetworkInterceptor/src folder.
In addition, There are 2 privileged places you can go to:
|Copyright © 2005-2016 JPPF.org||Tweet|