-
Notifications
You must be signed in to change notification settings - Fork 1
Open
Description
Overview
Implement server-side validation of NTDF authorization chains and DPoP proof-of-possession for maximum DRM security.
Phase 3: NTDF Chain Validation
- Build Terminal Link parser and signature verifier
- Implement nested NTDF chain unwrapping (Terminal→NPE→PE)
- Extract and validate claims from PE/NPE for policy enforcement
- Add DPoP proof validation (RFC 9449)
Phase 4: Honeypot System for Compromised Devices
- Build behavioral analytics pipeline (timing, access patterns)
- Implement active fingerprinting module (sensor data collection)
- Create decoy key delivery system with phone-home tracking
- Add threat scoring and anomaly detection
Phase 5: Production Hardening
- Add Redis-backed token revocation system
- Implement rate limiting middleware
- Add key rotation automation
- Complete geofence implementation
Security Level
Target: Maximum (Enterprise-Grade)
- Zero-trust: Every request validates full attestation chain
- Honeypot identifies jailbroken/modified devices
- DPoP prevents token theft/replay
References
- authnz-org/authnz-rs#13: Terminal Link Authentication
- NTDF Token Attestation app#161: Swift NTDF chain implementation
Acceptance Criteria
- Terminal Link validation integrated with rewrap endpoint
- DPoP proofs validated per RFC 9449
- Honeypot system operational
- All tests pass
- Performance: P95 latency < 100ms
Metadata
Metadata
Assignees
Labels
No labels