Skip to content

Commit d0151dc

Browse files
authored
Merge pull request #1208 from OpenNHP/readme--frontload-demo
Move demo further up in README.md
2 parents 6454c58 + db5857d commit d0151dc

File tree

1 file changed

+29
-24
lines changed

1 file changed

+29
-24
lines changed

README.md

Lines changed: 29 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,34 @@ The rapid advancement of **AI** technologies, particularly large language models
2222

2323
Gartner research predicts a [rapid increase in AI-driven cyberattacks](https://www.gartner.com/en/newsroom/press-releases/2024-08-28-gartner-forecasts-global-information-security-spending-to-grow-15-percent-in-2025). This shifting paradigm calls for a reevaluation of traditional cybersecurity strategies, with a focus on proactive defenses, rapid response mechanisms, and the adoption of network hiding technologies to safeguard critical infrastructure.
2424

25+
---
26+
27+
## Quick Demo: See OpenNHP in Action
28+
29+
Before diving into the details of OpenNHP, let's start with a quick demonstration of how OpenNHP protects a server from unauthorized access. You can see it in action by accessing the protected server at https://acdemo.opennhp.org.
30+
31+
### 1) The Protected Server is "Invisible" to Unauthenticated Users
32+
33+
By default, any attempt to connect to the protected server will result in a TIME OUT error, as all ports are closed, making the server appear offline and effectively *"invisible."*
34+
35+
![OpenNHP Demo](docs/images/OpenNHP_ACDemo0.png)
36+
37+
Port scanning the server will also return a TIME OUT error.
38+
39+
![OpenNHP Demo](docs/images/OpenNHP_ScanDemo.png)
40+
41+
### 2) After Authentication, the Protected Server Becomes Accessible
42+
43+
OpenNHP supports a variety of authentication methods, such as OAuth, SAML, QR codes, and more. For simplicity, this demo uses a basic username/password authentication service at https://demologin.opennhp.org to demonstrate the process.
44+
45+
![OpenNHP Demo](docs/images/OpenNHP_DemoLogin.png)
46+
47+
Once you click the "Login" button, authentication is completed successfully, and you are redirected to the protected server. At this point, the server becomes *"visible"* and accessible on your device.
48+
49+
![OpenNHP Demo](docs/images/OpenNHP_ACDemo1.png)
50+
51+
---
52+
2553
## Vision: Making the Internet Trustworthy
2654

2755
The openness of TCP/IP protocols has driven the explosive growth of internet applications but also exposed vulnerabilities, allowing malicious actors to gain unauthorized access and exploit any exposed IP address. Although the [OSI network model](https://en.wikipedia.org/wiki/OSI_model) defines the *5th layer (Session Layer)* for managing connections, few effective solutions have been implemented to address this.
@@ -30,6 +58,7 @@ The openness of TCP/IP protocols has driven the explosive growth of internet app
3058

3159
![Trustworthy Internet](docs/images/TrustworthyCyberspace.png)
3260

61+
---
3362

3463
## Solution: OpenNHP Fixes the Network Visibility Control
3564

@@ -128,30 +157,6 @@ CL-PKC is a scheme that enhances security by avoiding key escrow and addressing
128157
- **Strong cryptography**: Utilizes modern algorithms like ECC, Noise Protocol, and IBC for robust security.
129158
</details>
130159

131-
## Quick Demo
132-
133-
This section provides a brief demonstration of how OpenNHP functions. The server protected by OpenNHP is https://acdemo.opennhp.org. Normally, port 443 would be open for HTTPS services, but with the *NHP-AC* component installed, all ports are closed by default, enforcing a Zero Trust "deny-all" policy.
134-
135-
### 1) The Protected Server is "Invisible" to Unauthenticated Users
136-
137-
By default, any attempt to connect to the protected server will result in a TIME OUT error, as all ports are closed, making the server appear offline and effectively *"invisible."*
138-
139-
![OpenNHP Demo](docs/images/OpenNHP_ACDemo0.png)
140-
141-
Port scanning the server will also return a TIME OUT error.
142-
143-
![OpenNHP Demo](docs/images/OpenNHP_ScanDemo.png)
144-
145-
### 2) After Authentication, the Protected Server Becomes Accessible
146-
147-
OpenNHP supports a variety of authentication methods, such as OAuth, SAML, QR codes, and more. For simplicity, this demo uses a basic username/password authentication service at https://demologin.opennhp.org to demonstrate the process.
148-
149-
![OpenNHP Demo](docs/images/OpenNHP_DemoLogin.png)
150-
151-
Once you click the "Login" button, authentication is completed successfully, and you are redirected to the protected server. At this point, the server becomes *"visible"* and accessible on your device.
152-
153-
![OpenNHP Demo](docs/images/OpenNHP_ACDemo1.png)
154-
155160
## Deployment
156161

157162
OpenNHP supports multiple deployment models to suit different use cases:

0 commit comments

Comments
 (0)