Slide 1

Slide 1 text

End-to-End Encryption in Elixir with Ockam Mrinal Wadhwa CTO, Ockam mrinal

Slide 2

Slide 2 text

Verb Subject Object Allow / Deny

Slide 3

Slide 3 text

Action Subject Resource Allow / Deny

Slide 4

Slide 4 text

No content

Slide 5

Slide 5 text

The operating environment of a typical application looks like this. Internet Infra Network Machine Application

Slide 6

Slide 6 text

The operating environment of a typical application looks like this. Internet Application Cloud / Data Center / Home / Hospital / Factory … VPC / Kubernetes / NAT / Edge / No-IP wireless / Industrial VM / Container / K8s Pod / Rack Server / IoT 
 Industrial / Embedded / Edge Device

Slide 7

Slide 7 text

Distributed applications work by sending each other messages across networks, over the Internet. Internet Infra Network Machine Application Internet Infra Network Machine Application Data, Commands, Acknowledgments, Configuration & Software Updates

Slide 8

Slide 8 text

To be secure both sides must check incoming messages for integrity and authenticity. Internet Infra Network Machine Application Internet Infra Network Machine Application Message Integrity & Authenticity Sender Identi fi cation & Authentication Authorization There is a complex set of cryptographic protocol guarantees that go into delivering those checkmarks.

Slide 9

Slide 9 text

To ensure user privacy and to protect business data both sides must have control of data con fi dentiality and access. Internet Infra Network Machine Application Internet Infra Network Machine Application Message Integrity & Authenticity Sender Identi fi cation & Authentication Authorization Con fi dentiality There is a complex set of cryptographic protocol guarantees that go into delivering those checkmarks.

Slide 10

Slide 10 text

Internet Infra Firewalls / VPN / TLS termination Machine Application Internet Infra Machine Application Traditional approach is to check our message guarantees at network boundaries. Firewalls / VPN / TLS termination

Slide 11

Slide 11 text

Internet Infra VPN Internet Infra VPN But network boundaries typically have hundreds of machines and thousands of applications within them.

Slide 12

Slide 12 text

Internet Infra VPN Internet Infra VPN All code in both networks must have no weaknesses for an application developer’s work to be secure.

Slide 13

Slide 13 text

Lab 1 Lab 2 Lab 500 Cloud AZ 1 Cloud AZ 2 Data Center 1 Data Center 2 All code in all deployment networks must have no weaknesses for an application developer’s work to be secure.

Slide 14

Slide 14 text

Lab 1 Lab 2 Lab 500 Cloud AZ 1 Cloud AZ 2 Data Center 1 Data Center 2 Gateways Event Streams Pub/Sub Queues All code in all deployment networks and all service provider networks must have no weaknesses for an application developer’s work to be secure. This also violates the principle of least privilege

Slide 15

Slide 15 text

Goal: Dependable, Trustworthy, Reliable applications To build a secure and private application that can be trusted by users and customers - we need to minimize the chances (vulnerability surface) of someone tricking our application into doing something undesirable. Big vulnerability surface is bad. Tiny vulnerability surface is good.

Slide 16

Slide 16 text

End-to-End Encrypted, Mutually Authenticated, Secure Channels enable granular authorization decisions at the application layer.

Slide 17

Slide 17 text

No content

Slide 18

Slide 18 text

No content

Slide 19

Slide 19 text

No content

Slide 20

Slide 20 text

Sender: • Needs to know the route to a destination, makes that route the onward_route of a new message • Makes its own address the the return_route of the new message Replier: • Makes return_route of incoming message, onward_route of outgoing message • Makes its own address the the return_route of the new message

Slide 21

Slide 21 text

No content

Slide 22

Slide 22 text

No content

Slide 23

Slide 23 text

No content

Slide 24

Slide 24 text

No content

Slide 25

Slide 25 text

No content

Slide 26

Slide 26 text

Sender: • Needs to know the route to a destination, makes that route the onward_route of a new message • Makes its own address the the return_route of the new message Hop: • Removes its own address from beginning of onward_route • Adds its own address to beginning of return_route Replier: • Makes return_route of incoming message, onward_route of outgoing message • Makes its own address the the return_route of the new message

Slide 27

Slide 27 text

No content

Slide 28

Slide 28 text

No content

Slide 29

Slide 29 text

No content

Slide 30

Slide 30 text

No content

Slide 31

Slide 31 text

No content

Slide 32

Slide 32 text

No content

Slide 33

Slide 33 text

No content

Slide 34

Slide 34 text

No content

Slide 35

Slide 35 text

Initiator Responder app echoer 4000

Slide 36

Slide 36 text

No content

Slide 37

Slide 37 text

No content

Slide 38

Slide 38 text

No content

Slide 39

Slide 39 text

Initiator Responder app echoer 4000

Slide 40

Slide 40 text

Middle Responder h1 echoer 4000 Initiator app 3000

Slide 41

Slide 41 text

No content

Slide 42

Slide 42 text

No content

Slide 43

Slide 43 text

No content

Slide 44

Slide 44 text

No content

Slide 45

Slide 45 text

Middle Responder h1 echoer 4000 Initiator app 3000

Slide 46

Slide 46 text

Initiator Responder Shared Secret Shared Secret M1 M2 M3 M4 M5 The shared secret is then used as a key in Symmetric Key Cryptography to maintain con fi dentiality and integrity of application data. Application Data - Authenticated Encryption The entities involved use Public Key Cryptography to authenticate each other and agree on a shared secret. Authenticated Key Exchange

Slide 47

Slide 47 text

Middle Responder h1 echoer 4000 Initiator app 3000

Slide 48

Slide 48 text

No content

Slide 49

Slide 49 text

No content

Slide 50

Slide 50 text

No content

Slide 51

Slide 51 text

No content

Slide 52

Slide 52 text

Middle Responder h1 echoer 4000 Initiator app 3000

Slide 53

Slide 53 text

Middle Responder h1 echoer 4000 Initiator app 3000

Slide 54

Slide 54 text

Middle Responder Forwarder echoer 4000 Initiator app 3000

Slide 55

Slide 55 text

No content

Slide 56

Slide 56 text

No content

Slide 57

Slide 57 text

No content

Slide 58

Slide 58 text

No content

Slide 59

Slide 59 text

Middle Responder Forwarder echoer 4000 Initiator app 3000

Slide 60

Slide 60 text

No content

Slide 61

Slide 61 text

No content

Slide 62

Slide 62 text

No content

Slide 63

Slide 63 text

No content

Slide 64

Slide 64 text

No content

Slide 65

Slide 65 text

Mrinal Wadhwa CTO, Ockam mrinal github.com/ockam-network/ockam github.com/ockam-network/ockam/tree/develop/examples/elixir/get_started All code examples from this talk: