You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+29-24Lines changed: 29 additions & 24 deletions
Original file line number
Diff line number
Diff line change
@@ -22,6 +22,34 @@ The rapid advancement of **AI** technologies, particularly large language models
22
22
23
23
Gartner research predicts a [rapid increase in AI-driven cyberattacks](https://www.gartner.com/en/newsroom/press-releases/2024-08-28-gartner-forecasts-global-information-security-spending-to-grow-15-percent-in-2025). This shifting paradigm calls for a reevaluation of traditional cybersecurity strategies, with a focus on proactive defenses, rapid response mechanisms, and the adoption of network hiding technologies to safeguard critical infrastructure.
24
24
25
+
---
26
+
27
+
## Quick Demo: See OpenNHP in Action
28
+
29
+
Before diving into the details of OpenNHP, let's start with a quick demonstration of how OpenNHP protects a server from unauthorized access. You can see it in action by accessing the protected server at https://acdemo.opennhp.org.
30
+
31
+
### 1) The Protected Server is "Invisible" to Unauthenticated Users
32
+
33
+
By default, any attempt to connect to the protected server will result in a TIME OUT error, as all ports are closed, making the server appear offline and effectively *"invisible."*
34
+
35
+

36
+
37
+
Port scanning the server will also return a TIME OUT error.
38
+
39
+

40
+
41
+
### 2) After Authentication, the Protected Server Becomes Accessible
42
+
43
+
OpenNHP supports a variety of authentication methods, such as OAuth, SAML, QR codes, and more. For simplicity, this demo uses a basic username/password authentication service at https://demologin.opennhp.org to demonstrate the process.
Once you click the "Login" button, authentication is completed successfully, and you are redirected to the protected server. At this point, the server becomes *"visible"* and accessible on your device.
48
+
49
+

50
+
51
+
---
52
+
25
53
## Vision: Making the Internet Trustworthy
26
54
27
55
The openness of TCP/IP protocols has driven the explosive growth of internet applications but also exposed vulnerabilities, allowing malicious actors to gain unauthorized access and exploit any exposed IP address. Although the [OSI network model](https://en.wikipedia.org/wiki/OSI_model) defines the *5th layer (Session Layer)* for managing connections, few effective solutions have been implemented to address this.
@@ -30,6 +58,7 @@ The openness of TCP/IP protocols has driven the explosive growth of internet app
## Solution: OpenNHP Fixes the Network Visibility Control
35
64
@@ -128,30 +157,6 @@ CL-PKC is a scheme that enhances security by avoiding key escrow and addressing
128
157
-**Strong cryptography**: Utilizes modern algorithms like ECC, Noise Protocol, and IBC for robust security.
129
158
</details>
130
159
131
-
## Quick Demo
132
-
133
-
This section provides a brief demonstration of how OpenNHP functions. The server protected by OpenNHP is https://acdemo.opennhp.org. Normally, port 443 would be open for HTTPS services, but with the *NHP-AC* component installed, all ports are closed by default, enforcing a Zero Trust "deny-all" policy.
134
-
135
-
### 1) The Protected Server is "Invisible" to Unauthenticated Users
136
-
137
-
By default, any attempt to connect to the protected server will result in a TIME OUT error, as all ports are closed, making the server appear offline and effectively *"invisible."*
138
-
139
-

140
-
141
-
Port scanning the server will also return a TIME OUT error.
142
-
143
-

144
-
145
-
### 2) After Authentication, the Protected Server Becomes Accessible
146
-
147
-
OpenNHP supports a variety of authentication methods, such as OAuth, SAML, QR codes, and more. For simplicity, this demo uses a basic username/password authentication service at https://demologin.opennhp.org to demonstrate the process.
Once you click the "Login" button, authentication is completed successfully, and you are redirected to the protected server. At this point, the server becomes *"visible"* and accessible on your device.
152
-
153
-

154
-
155
160
## Deployment
156
161
157
162
OpenNHP supports multiple deployment models to suit different use cases:
0 commit comments