Show pageOld revisionsBack to top This page is read only. You can view the source, but not change it. Ask your administrator if you think this is wrong. ====== Authentication ====== ===== Principles ===== Just a hash challenge (actually using [[https://en.wikipedia.org/wiki/Whirlpool_(cryptography)|Whirlpool]]) to resolve for masters in order to authenticate themselves, using a symmetric key, that needs to be sent to slaves. ===== Key storage/auth methods ===== Plugins on master side can be made to store and do the hash in an other way than plain raw key storage on the master's filesystem. ==== Arduino/EEPROM method ==== ===== Permissions ===== ===== Key sending procedure ===== Log on the slave side :\\ {{:xifnet:ioslaves:screenshot_2016-08-29_a_02.40.24.png?direct|}} Log of the master which stores and sends its key to the slave :\\ {{:xifnet:ioslaves:key-master-sending.png?direct|}} Log of the master which authorizes the first master to send the key, and chooses associated permissions :\\ {{:xifnet:ioslaves:key-master-auth.png?direct|}} Logs of initial key sending (accepting the first key without being authenticated) :\\ {{:xifnet:ioslaves:initial-key-sending.png?direct|}} xifnet/ioslaves/auth.txt Last modified: 2019/03/16 17:31by xif