Sepp Configuration Manual

  • Uploaded by: Stefan Kraxberger
  • 0
  • 0
  • April 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Sepp Configuration Manual as PDF for free.

More details

  • Words: 356
  • Pages: 4
Institute for Applied Information Processing and Communications

C fi Configuration ti 1/4 Files in the folder „res“ with ending „.config“ are the configuration files for the specific peers. E.g.: peer1.config, peer2.config These files must be specified as command line parameter if starting a peer (or at least the chat client)

<UseSecurity>true <UseDatabase>false jdbc:mysql://localhost:3306/ j y q sepp sepp

Stefan Kraxberger

… Should security be used in SePP … Should the message be stored in a database …JDBC URI for the database …Use for the databse …Password for the database

Secure P2P Framework 1

Institute for Applied Information Processing and Communications

C fi Configuration ti 2/4 org.sepp.routing.algorithms.DynamicSourceRouting org.sepp.routing.caches.PathCache <UseReversePath>True <UseSourceRoutes>True <UseLinkCache>False

Stefan Kraxberger

… Implementation class of the routing algorithm to use

… Implementation class of the route cache to use … If links are bidirectional reverse path can be used … Should source route be used … Should a link cache instead of a path cache be used

Secure P2P Framework 2

Institute for Applied Information Processing and Communications

C fi Configuration ti 3/4 True <StandardPort>12001 12000 <MessageTimeout>10000 peer1 127.0.0.1:12002 127.0.0.1:12003

Stefan Kraxberger

true“ if the peers are started locally … „true … Port on which this peer listens … Port on which this peer is expecting broadcasts … Time after messages are removed from the queue … Id of this peer … Specification of the neighbors of this peer including the IP and port information where they can be contacted

Secure P2P Framework 3

Institute for Applied Information Processing and Communications

C fi Configuration ti 4/4 <Security> SharedSecretAuthentication IAIKKeyStore key/iaik-private.keystore smepppass <UseSecretKeystore>false <SecretKeystore>key/iaik-secret.keystore <SecretKeystorePassword>smepppass RSA/ECB/PKCS1Padding smepppeer smepppeer id= peer1 >smepppeer

Stefan Kraxberger

… Authentication method used … Type of used keystore … Location of public key keystore … Password of the public key keystore … Should a secret keystore be used … Location of secret key keystore … Password of the secret key keystore … Default public key algorithm … Password of the stored shared secret … Password of the stored private key

Secure P2P Framework 4

Related Documents


More Documents from "Matteo Martinoglio"

Chat Client Example
April 2020 10
Lege Nr18.doc
December 2019 54
Management Public - Curs.pdf
December 2019 38
Maths
June 2020 31