SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Downloaden Sie, um offline zu lesen
Signposts
Taking back the dark edges of the internet




Open Hardware, Software, Internet & Jobs
          Monday 11 March

                Heidi Howard
              hh360@cam.ac.uk
The good old days ...
                      45.204.13.2

                                                 53.128.123.27




53.123.123.2




                                                             53.123.193.87




 53.137.123.29




                           79.183.123.82   103.193.123.234
Today's reality...

                                  Firewall

                                                    Box
      Box                                     NAT
NAT




                                                          Box
             Firewall                               NAT
                                   Firewall

                            Box
                        NAT
       Box
 NAT
my iPhone
The Problem

Device-device connectivity is
pretty broken right now due to
middleboxes at the edges of
the internet




                                             my machine here at
                                             the lab
Existing Solutions
Technical                                 Centralised & 3rd Party
- Dynamic DNS                             - Skype & Google talk
- Port Forwarding                         - Dropbox, Google Drive,
- uPnP                                    Ubuntu One
- STUN                                    - iCloud
- VPN                                     - Remote Desktop
- Iodine                                  Software e.g. LogMeIn
- NAT Punching                            - Email
- Rendezvous                              - Facebook, Twitter
- HTTP/SMTP proxy

Although you can fix this with a range of tools, it's very fiddly and
complex to do so or the solutions are platform specific
... and the Signpost Solution
                 Signposts turn these technical
                 solutions into tactics, it
                 automates and manages the
                 range of tactics to bring back
                 this end-to-end dream

                 It's a framework to manage the
                 maze of tactics so it's highly
                 extensible

                  Signposts point devices in
                  the right direction to find
                  each other
Signposts' View of the World
desktop.heidi.signpost.io
                                   Heidi's Signpost Server         workmachine.heidi.signpost.io




                    dark edge of                             dark edge of
                    internet                                 internet
                                           Internet



                    dark edge of
                    internet
                                                  Now my devices all have
                                                  their own domain names
                                                  which they can use to refer
                                                  to each other
  iphone.heidi.signpost.io
Signposts' View of the World
                                                       Heidi's Signpost
                                                       Server           workmachine.heidi.signpost.io
   desktop.heidi.signpost.io   Anil's Signpost
                               Server




                                                                                                  tablet.anil.signpost.io
                        dark edge                                      dark edge
                        of internet                                    of internet
                                                      Internet

mac.anil.signpost.io
                                                                                    dark edge
                        dark edge
                                                                                    of internet
                        of internet




 iphone.heidi.signpost.io                                desktop.anil.signpost.io
                                                                                         laptop.heidi.signpost.io
                            iphone.anil.signpost.io
Abstract away the internet edge

                                                              laptop

laptop

                                jon.signpost.io
                                                                   iphone
          heidi.signpost.io

 iphone
desktop


                                       anil.signpost.io

                                                                  mac



 Empower individuals to create their
 “own personal cloud” and regain
                                                    desktop
 control of their digital footprint                                    iphone
Your Personal Signpost Server
● Each virtual personal cloud has a Signpost server,
  this has a public IP address
● It maintains up-to date information on the
  whereabouts of all the devices in the user's personal
  cloud
● It has a set of policies which control sharing with other
  Signposts' users
● There is a persistent connection between the
  Signpost server and all devices in the user's cloud
● Whenever a device in the user's cloud moves location
  or network, the Signpost server is notified
Making connections
                            Heidi's Signpost Server
desktop.heidi.signpost.io
                                                      workmachine.heidi.signpost.io




    ● The device that wants to initiate the connection
      performs an "effectful" DNS lookup of the domain name
      of the other device
    ● This DNS lookup is destined for the Signpost server of
      the other device's owner
    ● When the Signpost server receives this query, it creates
      a path between the devices and returns an IP address
    ● The two devices are now happily connected
Goal Of Tactics
To create a satisfactory connection between two end nodes
that meets the user's requirements.
Possible requirements include:
 ● Authentication
 ● Encryption
 ● Bi-directionality
 ● Anonymity
 ● Bypassing firewalls

Signposts can also allow for constraints, such as battery
life, and price of network connections
Example - Syncing Directories
My work machine




                                  My home machine
                          Box
                      NAT

           Firewall
Example - Video Streaming




My home machine
Example - Photo Sharing
The Project Home
Signposts is part of the OCaml Labs Project
www.cl.cam.ac.uk/projects/ocamllabs/

Signposts is Open Source & hosted on GitHub
www.github.com/crotsos/signpostd




Some of the Signposts' team that I would like to thank and probably embarrass
More information...

Signposts
www.signpost.io
chat to me or some of the other guys on the
signposts' team

Weitere ähnliche Inhalte

Ähnlich wie Taking back connectivity with Signposts

Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Zoltan Balazs
 
Risk Factory: Let's Get Physical
Risk Factory: Let's Get PhysicalRisk Factory: Let's Get Physical
Risk Factory: Let's Get PhysicalRisk Crew
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?Zoltan Balazs
 
Android fragmentation, a valid concern?
Android fragmentation, a valid concern?Android fragmentation, a valid concern?
Android fragmentation, a valid concern?androidaalto
 
HTML5 and the Future of Apps
HTML5 and the Future of AppsHTML5 and the Future of Apps
HTML5 and the Future of AppsTom Croucher
 
Keynote fx try harder 2 be yourself
Keynote fx   try harder 2 be yourselfKeynote fx   try harder 2 be yourself
Keynote fx try harder 2 be yourselfDefconRussia
 
2011 VMI DEMO Conference Highlights
2011 VMI DEMO Conference Highlights2011 VMI DEMO Conference Highlights
2011 VMI DEMO Conference HighlightsJulie_Vasquez
 
Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron? Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron? Risk Crew
 
Soft not slow: Defining a design process for the internet of things
Soft not slow: Defining a design process for the internet of thingsSoft not slow: Defining a design process for the internet of things
Soft not slow: Defining a design process for the internet of thingsAlexandra Deschamps-Sonsino
 
When where why cloud
When where why cloudWhen where why cloud
When where why cloudsallysogeti
 
20130226 How Personal Is Your Cloud?
20130226 How Personal Is Your Cloud?20130226 How Personal Is Your Cloud?
20130226 How Personal Is Your Cloud?T.Rob Wyatt
 
Champ Pitch Celtic-Plus Event 2011
Champ Pitch Celtic-Plus Event 2011Champ Pitch Celtic-Plus Event 2011
Champ Pitch Celtic-Plus Event 2011vrt-medialab
 
Taller IoT en la Actualidad
Taller IoT en la ActualidadTaller IoT en la Actualidad
Taller IoT en la ActualidadLaurence HR
 
Fun and Games with Mac OS X and iPhone Payloads, Black Hat Europe 2009
Fun and Games with Mac OS X and iPhone Payloads, Black Hat Europe 2009Fun and Games with Mac OS X and iPhone Payloads, Black Hat Europe 2009
Fun and Games with Mac OS X and iPhone Payloads, Black Hat Europe 2009Vincenzo Iozzo
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
 
Harvesting The Web With Cloud Computing
Harvesting The Web With Cloud ComputingHarvesting The Web With Cloud Computing
Harvesting The Web With Cloud ComputingKing Huang
 
Vwbpe collaboration on virtual harmony to moses
Vwbpe collaboration on virtual harmony to moses Vwbpe collaboration on virtual harmony to moses
Vwbpe collaboration on virtual harmony to moses Cynthia Calongne
 

Ähnlich wie Taking back connectivity with Signposts (20)

Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
 
Risk Factory: Let's Get Physical
Risk Factory: Let's Get PhysicalRisk Factory: Let's Get Physical
Risk Factory: Let's Get Physical
 
Mobility Strategy - IBM
Mobility Strategy - IBMMobility Strategy - IBM
Mobility Strategy - IBM
 
Whymca 2009
Whymca 2009Whymca 2009
Whymca 2009
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?
 
Android fragmentation, a valid concern?
Android fragmentation, a valid concern?Android fragmentation, a valid concern?
Android fragmentation, a valid concern?
 
HTML5 and the Future of Apps
HTML5 and the Future of AppsHTML5 and the Future of Apps
HTML5 and the Future of Apps
 
Keynote fx try harder 2 be yourself
Keynote fx   try harder 2 be yourselfKeynote fx   try harder 2 be yourself
Keynote fx try harder 2 be yourself
 
2011 VMI DEMO Conference Highlights
2011 VMI DEMO Conference Highlights2011 VMI DEMO Conference Highlights
2011 VMI DEMO Conference Highlights
 
Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron? Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron?
 
Soft not slow: Defining a design process for the internet of things
Soft not slow: Defining a design process for the internet of thingsSoft not slow: Defining a design process for the internet of things
Soft not slow: Defining a design process for the internet of things
 
When where why cloud
When where why cloudWhen where why cloud
When where why cloud
 
20130226 How Personal Is Your Cloud?
20130226 How Personal Is Your Cloud?20130226 How Personal Is Your Cloud?
20130226 How Personal Is Your Cloud?
 
Champ Pitch Celtic-Plus Event 2011
Champ Pitch Celtic-Plus Event 2011Champ Pitch Celtic-Plus Event 2011
Champ Pitch Celtic-Plus Event 2011
 
Taller IoT en la Actualidad
Taller IoT en la ActualidadTaller IoT en la Actualidad
Taller IoT en la Actualidad
 
SIP and IPv6 - Can They Get Along?
SIP and IPv6 - Can They Get Along?SIP and IPv6 - Can They Get Along?
SIP and IPv6 - Can They Get Along?
 
Fun and Games with Mac OS X and iPhone Payloads, Black Hat Europe 2009
Fun and Games with Mac OS X and iPhone Payloads, Black Hat Europe 2009Fun and Games with Mac OS X and iPhone Payloads, Black Hat Europe 2009
Fun and Games with Mac OS X and iPhone Payloads, Black Hat Europe 2009
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Harvesting The Web With Cloud Computing
Harvesting The Web With Cloud ComputingHarvesting The Web With Cloud Computing
Harvesting The Web With Cloud Computing
 
Vwbpe collaboration on virtual harmony to moses
Vwbpe collaboration on virtual harmony to moses Vwbpe collaboration on virtual harmony to moses
Vwbpe collaboration on virtual harmony to moses
 

Mehr von Heidi Howard

Flexible Paxos: Reaching agreement without majorities
Flexible Paxos: Reaching agreement without majorities Flexible Paxos: Reaching agreement without majorities
Flexible Paxos: Reaching agreement without majorities Heidi Howard
 
Distributed Consensus: Making Impossible Possible [Revised]
Distributed Consensus: Making Impossible Possible [Revised]Distributed Consensus: Making Impossible Possible [Revised]
Distributed Consensus: Making Impossible Possible [Revised]Heidi Howard
 
Distributed Consensus: Making Impossible Possible
Distributed Consensus: Making Impossible PossibleDistributed Consensus: Making Impossible Possible
Distributed Consensus: Making Impossible PossibleHeidi Howard
 
Reaching reliable agreement in an unreliable world
Reaching reliable agreement in an unreliable worldReaching reliable agreement in an unreliable world
Reaching reliable agreement in an unreliable worldHeidi Howard
 
Pyland - 3 minute intro
Pyland - 3 minute intro Pyland - 3 minute intro
Pyland - 3 minute intro Heidi Howard
 
Introducing Project Zygote
Introducing Project ZygoteIntroducing Project Zygote
Introducing Project ZygoteHeidi Howard
 
Providing Security for Wireless Community Networks (PAWS)
Providing Security for Wireless Community Networks (PAWS)Providing Security for Wireless Community Networks (PAWS)
Providing Security for Wireless Community Networks (PAWS)Heidi Howard
 

Mehr von Heidi Howard (8)

Flexible Paxos: Reaching agreement without majorities
Flexible Paxos: Reaching agreement without majorities Flexible Paxos: Reaching agreement without majorities
Flexible Paxos: Reaching agreement without majorities
 
Distributed Consensus: Making Impossible Possible [Revised]
Distributed Consensus: Making Impossible Possible [Revised]Distributed Consensus: Making Impossible Possible [Revised]
Distributed Consensus: Making Impossible Possible [Revised]
 
Distributed Consensus: Making Impossible Possible
Distributed Consensus: Making Impossible PossibleDistributed Consensus: Making Impossible Possible
Distributed Consensus: Making Impossible Possible
 
Reaching reliable agreement in an unreliable world
Reaching reliable agreement in an unreliable worldReaching reliable agreement in an unreliable world
Reaching reliable agreement in an unreliable world
 
Pyland - 3 minute intro
Pyland - 3 minute intro Pyland - 3 minute intro
Pyland - 3 minute intro
 
Introducing Project Zygote
Introducing Project ZygoteIntroducing Project Zygote
Introducing Project Zygote
 
Providing Security for Wireless Community Networks (PAWS)
Providing Security for Wireless Community Networks (PAWS)Providing Security for Wireless Community Networks (PAWS)
Providing Security for Wireless Community Networks (PAWS)
 
PAWS Architecture
PAWS ArchitecturePAWS Architecture
PAWS Architecture
 

Taking back connectivity with Signposts

  • 1. Signposts Taking back the dark edges of the internet Open Hardware, Software, Internet & Jobs Monday 11 March Heidi Howard hh360@cam.ac.uk
  • 2. The good old days ... 45.204.13.2 53.128.123.27 53.123.123.2 53.123.193.87 53.137.123.29 79.183.123.82 103.193.123.234
  • 3. Today's reality... Firewall Box Box NAT NAT Box Firewall NAT Firewall Box NAT Box NAT
  • 4. my iPhone The Problem Device-device connectivity is pretty broken right now due to middleboxes at the edges of the internet my machine here at the lab
  • 5. Existing Solutions Technical Centralised & 3rd Party - Dynamic DNS - Skype & Google talk - Port Forwarding - Dropbox, Google Drive, - uPnP Ubuntu One - STUN - iCloud - VPN - Remote Desktop - Iodine Software e.g. LogMeIn - NAT Punching - Email - Rendezvous - Facebook, Twitter - HTTP/SMTP proxy Although you can fix this with a range of tools, it's very fiddly and complex to do so or the solutions are platform specific
  • 6. ... and the Signpost Solution Signposts turn these technical solutions into tactics, it automates and manages the range of tactics to bring back this end-to-end dream It's a framework to manage the maze of tactics so it's highly extensible Signposts point devices in the right direction to find each other
  • 7. Signposts' View of the World desktop.heidi.signpost.io Heidi's Signpost Server workmachine.heidi.signpost.io dark edge of dark edge of internet internet Internet dark edge of internet Now my devices all have their own domain names which they can use to refer to each other iphone.heidi.signpost.io
  • 8. Signposts' View of the World Heidi's Signpost Server workmachine.heidi.signpost.io desktop.heidi.signpost.io Anil's Signpost Server tablet.anil.signpost.io dark edge dark edge of internet of internet Internet mac.anil.signpost.io dark edge dark edge of internet of internet iphone.heidi.signpost.io desktop.anil.signpost.io laptop.heidi.signpost.io iphone.anil.signpost.io
  • 9. Abstract away the internet edge laptop laptop jon.signpost.io iphone heidi.signpost.io iphone desktop anil.signpost.io mac Empower individuals to create their “own personal cloud” and regain desktop control of their digital footprint iphone
  • 10. Your Personal Signpost Server ● Each virtual personal cloud has a Signpost server, this has a public IP address ● It maintains up-to date information on the whereabouts of all the devices in the user's personal cloud ● It has a set of policies which control sharing with other Signposts' users ● There is a persistent connection between the Signpost server and all devices in the user's cloud ● Whenever a device in the user's cloud moves location or network, the Signpost server is notified
  • 11. Making connections Heidi's Signpost Server desktop.heidi.signpost.io workmachine.heidi.signpost.io ● The device that wants to initiate the connection performs an "effectful" DNS lookup of the domain name of the other device ● This DNS lookup is destined for the Signpost server of the other device's owner ● When the Signpost server receives this query, it creates a path between the devices and returns an IP address ● The two devices are now happily connected
  • 12. Goal Of Tactics To create a satisfactory connection between two end nodes that meets the user's requirements. Possible requirements include: ● Authentication ● Encryption ● Bi-directionality ● Anonymity ● Bypassing firewalls Signposts can also allow for constraints, such as battery life, and price of network connections
  • 13. Example - Syncing Directories My work machine My home machine Box NAT Firewall
  • 14. Example - Video Streaming My home machine
  • 15. Example - Photo Sharing
  • 16. The Project Home Signposts is part of the OCaml Labs Project www.cl.cam.ac.uk/projects/ocamllabs/ Signposts is Open Source & hosted on GitHub www.github.com/crotsos/signpostd Some of the Signposts' team that I would like to thank and probably embarrass
  • 17. More information... Signposts www.signpost.io chat to me or some of the other guys on the signposts' team