Workshop 13: Security and Privacy Layers
Learning Objectives
By the end of this workshop, you will be able to:
- Trace message security - Follow a signed envelope through verification
- Explain replay protection - Understand how sequence tracking works
- Identify trust-gated controls - Locate rate limiting and access checks
Goal
Understand how ICN enforces authenticity, integrity, and confidentiality through layered security and privacy mechanisms.
Prerequisites
- Completed Module 13: Security and Privacy
- Familiarity with Module 4 (Identity) and Module 5 (Network)
Estimated time
1-2 hours
Related Materials
icn/crates/icn-net/src/envelope.rsicn/crates/icn-security/icn/crates/icn-privacy/
Part 1: Signed Envelopes
Steps
- Open
icn/crates/icn-net/src/envelope.rs - Locate the signed envelope structure
- Identify fields responsible for authenticity and replay protection
Questions
- How is the sender identified?
- Where is the signature verified?
Checkpoint
- You can explain what makes an envelope authentic
Part 2: Replay Guard
Steps
- Search for replay guard logic in
icn/crates/icn-net/ - Identify how sequence numbers are stored and checked
Questions
- What happens when a sequence is repeated?
- How is state persisted across restarts?
Checkpoint
- You can explain how replay attacks are prevented
Part 3: Trust-Gated Controls
Steps
- Open
icn/crates/icn-security/and find rate limiting - Identify where trust classes are defined and used
Questions
- How does trust class map to rate limits?
- Where are access controls applied for gossip topics?
Checkpoint
- You can connect trust scores to enforcement behavior
Summary
After completing this workshop you should be able to:
- Trace signed envelope verification
- Explain replay protection
- Locate trust-gated access controls
Next steps
Proceed to Workshop 14: Governance and CCL Deep Dive