This document contains the protocol specification of the Negotiated Tunnel Protocol. This is an application bridging protocol. This document covers
protocol versions 0 and 1.
The primary audience of this document is people implementing libraries that use DOF protocols. Others that are concerned about how DOF protocols work on a network at a very low level can also benefit from this document.
Readers should be familiar with technical protocol documentation. This document is similar to an 'RFC' for DOF protocols, and familiarity with the language used in these types of documents is helpful.
This document is not required reading for those who need to use existing DOF libraries, although system designers may benefit from an understanding of this information. In particular, the information related to security and connections can help system designers to better understand how DOF systems work.
This document is managed by the Technical Steering Committee of the OpenDOF Project, Inc., referred to as 'ODP-TSC'. The inside cover of this document contains contact information for the Technical Steering Committee.Read More
The DOF Object Model was created to simplify the implementation and programming tasks associated with the OpenDOF Project and its
Object Access Libraries (OALs). The DOF Object Model describes and defines the technological foundation of the OpenDOF Project. It shows how DOF Objects, DOF Interfaces, and other related elements work together to create scalable and reliable network services based on a system of providers and requestors in peer-to-peer relationships.Read More
This document presents technical specifications for using transport-provided security with DOF systems.
General requirements that apply to all security modes are
presented in the DOF Security Specification.
Common PDUs related to security modes are covered in the DOF Protocol Specification.
This information is highly technical. This document serves as a specification and reference against which someone could implement networked software that interoperated with DOF products without using existing libraries.Read More
The Ticket Request Protocol (TRP) is used to communicate between a node and an authentication server (AS). As with other protocols
in the DOF Protocol Stack, TRP may be relayed from nodes that are not an AS to a node that is an AS in a transparent manner. This is a form of proxy that is common in DOF systems. The end target of the communication is a domain, and the domain is identified in all TRP communication.
Read More
This document describes the Ticket Exchange Protocol (TEP). Nodes use the Ticket Exchange Protocol to create an authenticated, secure link on
which access control rules are applied. As discussed in the DOF
Security Specification, TEP uses a three-party authentication system based on information stored in a security domain. The security specification covers the details of communication with the security domain.
The security domain (represented by an authentication server, or AS), uses a family of protocols called “Ticket Request Protocols,” or TRP, to communicate.Read More
This document presents technical specifications for using shared-key identification in DOF systems.
General requirements that apply to all identification are presented
in the DOF Security Specification.
This information is highly technical. This document serves as a specification and reference against which someone could implement networked software that interoperated with DOF products without using existing libraries.Read More
This document contains information about the DOF Protocol Stack. This is critical information for anyone who needs to work with
the protocols themselves, and contains useful background information for those interested in the architecture and inner workings of DOF systems.
This information is highly technical. This document serves as a specification and reference against which someone could implement networked software that interoperated with DOF products without using existing libraries.Read More
This document contains information about the DOF Protocol Stack. This is critical information for anyone who needs to work with
the protocols themselves, and contains useful background information for those interested in the architecture and inner workings of DOF systems.
This information is highly technical. This document serves as a specification and reference against which someone could implement networked software that interoperated with DOF products without using existing libraries.Read More
This document describes the Object Access Protocol, or OAP. The Object Access Protocol defines how a provider or a requestor interacts
with other providers and requestors in a network to exchange object information and to allow requestors to manipulate those objects.Read More
This document contains information about the DOF Protocol Stack. This is critical information for anyone who needs to work with
the protocols themselves, and contains useful background information for those interested in the architecture and inner workings of DOF systems.
This information is highly technical. This document serves as a specification and reference against which someone could implement networked software that interoperated with DOF products without using existing libraries.Read More
This document presents common protocol definitions related to DOF security. Higher-level information about DOF security can be found in Guidelines for
DOF Security. Information that is presented in that document is not repeated here. Discussions about attack prevention and possible modes of attack are also not discussed in this document.Read More
This document contains information about the DOF Protocol Stack. This is critical information for anyone who needs to work with the
protocols themselves, and contains useful background information for those interested in the architecture and inner workings of DOF systems.
This information is highly technical. This document serves as a specification and reference against which someone could implement networked software that interoperated with DOF products without using existing libraries.Read More
This document contains information about DOF protocols. This is critical information for anyone who needs to work with the protocols themselves,
and contains useful background information for those interested in the architecture and inner workings of DOF implementations.
This information is highly technical. This document serves as a specification and reference against which someone could implement networked software that interoperated with DOF products without using existing libraries.Read More
This document contains reference information for DOF Object Model Type formats. DOF data types are extensible, with its base defined in
the DOF Common Types specification.Read More
This document contains reference information for DOF OID formats. The OID is a primary type in the DOF object model. It
is an extensible type, with its base defined in the DOF Common Types specification. The document also contains formats for some registered OID Attribute Identifiers.Read More
This document contains the protocol specification of the DOF Network Protocol, version 1. This protocol belongs to the DOF Protocol Stack
described in the DOF Protocol Specification.Read More
This document contains information that is common to all DOF protocols. This is critical information for anyone who needs to work
with the protocols themselves, and contains useful background information for those interested in the architecture and inner workings of any DOF implementation.
This information is highly technical. This document serves as a specification and reference against which someone could implement networked software that interoperated with DOF products without using existing libraries.Read More
This document presents technical specifications for using Counter with CBC-MAC (CCM) with DOF implementations.
The DOF Security Specification presents general requirements that
apply to all security modes. Common PDUs related to security modes are covered in the DOF Protocol Specification.
This information is highly technical. This document serves as a specification and reference against which someone could implement networked software that interoperated with DOF products without using existing libraries.Read More
The Basic DOF Security Programmer’s Guide contains the knowledge system developers need to use the DOF Object Access Libraries (OALs) to
connect DOF nodes in secure domains. This guide does not cover advanced security topics, such as setting up an Authentication Server (AS) and domain database storage. This guide is intended as a practical guide to implementing security in code.Read More
This guide contains the basic knowledge system developers need to use the DOF Object Access Libraries (OALs) to connect DOF nodes on
a network.Read More
The Basic DOF Operations C Programmer’s Guide contains the basic knowledge applications programmers need to get started with the DOF Object
Access Library (OAL).Read More
The Basic DOF Operations Java Programmer’s Guide contains the basic knowledge applications programmers need to get started with the DOF Object
Access Library (OAL).Read More
The purpose of this training is to introduce the DOF Object Model, review DOF operations, and show how a DOF interface
is created, from design to publication.Read More