Tutorial 2009-12-31

This is rather a use case than a tutorial because it has been realized for the first time on my LAN ;-)
We can see that the configuration is really easy. Thanks to the SPADE framework we just need the address of the MAS platform (here 192.168.1.4). Of course the authentication agent could run on an other host than the SPADE platform; I have not enough computers :-(

Requirements

Required modules

  • SPADE (included);
  • Tkinter;
  • python-dns.

Screen shots

Launch of the SPADE platform on 192.168.1.4

usecase20091231-1.png

Launch of the authentication agent

The authenticator will provide the RSA public key of Alice (and ontology) to Bob and vice versa for Alice.

usecase20091231-2.png

Launch of the two clients on differents hosts

Alice is on 192.168.1.4

usecase20091231-3.png

Bob is on 192.168.1.5

usecase20091231-4.png

But thanks to SPADE we don't need these addresses.

Registration of Bob

usecase20091231-5.png

Bob is now registered by the authenticator

usecase20091231-6.png

Registration of Alice

usecase20091231-7.png

Alice is now registered by the authenticator

usecase20091231-8.png

All needed informations are now available to the authenticator:

<?xml version="1.0" ?>
<clients>
    <client>
        <name>bob</name>
        <password>92ef57ba40706594b46425705e989cbc256d9724</password>
        <ontology>ontoBob</ontology>
        <pubkey>74372791235489243261961285276328185445253960573969452903681861186809086717-7455358065738738343466940011117767953323183770769218289527103752164989259467</pubkey>
    </client>
    <client>
        <name>alice</name>
        <password>a4c7f167498cb7509519c18a2c3ef3eb0c986d29</password>
        <ontology>ontoAlice</ontology>
        <pubkey>4026949425820330810403016523245896074548111029568927525842529602169283358537-4598376098219136048676625373233308452856316386194027570329313561064838993869</pubkey>
    </client>
</clients>

Alice adds Bob to her list of interlocutors

By doing this she automatically retrieve the RSA public key of Bob.

usecase20091231-9.png

Alice can send message to Bob

Messages are encrypted with the public key of Bob.

usecase20091231-10.png

Bob receives the message

He has the possibility to add Alice to his list of interlocutors. Similarly by doing this, Bob will automatically retrieve the RSA public key of Alice.
Bob accepts the message. So he will use his RSA private key to decrypt the message from Alice.

usecase20091231-11.png

Bob and Alice can discuss in peace…

usecase20091231-12.png
usecase20091231-13.png
usecase20091231-14.png

The content of the directory facilitator

usecase20091231-15.png
Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-NonCommercial-ShareAlike 3.0 License