The IDS Clearing House Service is a prototype implementation of the Clearing House component of the Industrial Data Space.
Data in the Clearing House is stored encrypted and practically immutable. There are multiple ways in which the Clearing House enforces Data Immutability:
- Using the
Logging Service
there is no way to update an already existing log entry in the database - Log entries in the database include a hash value of the previous log entry, chaining together all log entries. Any change to a previous log entry would require rehashing all following log entries.
- The connector logging information in the Clearing House receives a signed receipt from the Clearing House that includes among other things a timestamp and the current chain hash. A single valid receipt in possession of any connector is enough to detect any change to data up to the time indicated in the receipt.
The IDS Clearing House Service currently implements the Logging Service
. Other services that comprise the Clearing House may follow. The Clearing House Service consists of two parts:
The Clearing House App
is a REST API written in Rust that implements the business logic of the Clearing House. The Clearing House Processors
is a library written in Java that integrates the Clearing House App
into the Trusted Connector. The Clearing House Processors
provide the multipart
and idscp2
endpoints described in the IDS-G. These are used by the IDS connectors to interact with the Clearing House. Both Clearing House App
and Clearing House Processors
are needed to provide the Clearing House Service
.
The Clearing House Service API requires a Trusted Connector Trusted Connector (Version 7.1.0+) for deployment. The process of setting up a Trusted Connector is described here. Using a docker image of the Trusted Connector should be sufficient for most deployments:
docker pull fraunhoferaisec/trusted-connector-core:7.2.0
The Clearing House Processors are written in Java for use in the Camel Component of the Trusted Connector. To configure the Trusted Connector for the Clearing House Service API, it needs access to the following files inside the docker container (e.g. mounted as a volume):
clearing-house-processors.jar
: The Clearing House Processors need to be placed in the/root/jars
folder of the Trusted Connector. The jar file needs to be build from the Clearing House Processors usinggradle
.clearing-house-routes.xml
: The camel routes required by the Clearing House need to be placed in the/root/deploy
folder of the Trusted Connector.application.yml
: This is a new configuration file of Trusted Connector 7.0.0+. The file version in this repository enables the use of some of the environment variables documented in the next section.
Besides those files that are specific for the configuration of the Clearing House Service API, the Trusted Connector requires other files for its configuration, e.g. a truststore and a keystore with appropriate key material. Please refer to the Documentation of the Trusted Connector for more information. Also, please check the Examples as they contain up-to-date configurations for the Trusted Connector.
The Clearing House Processors can override some standard configuration settings of the Trusted Connector using environment variables. If these variables are not set, the Clearing House Processors will use the standard values provided by the Trusted Connector. Some of the variables are mandatory and have to be set:
TC_DAPS_URL
: The url of the DAPS used by the Clearing House. The Trusted Connector useshttps://daps.aisec.fraunhofer.de/v3
as the default DAPS url.TC_KEYSTORE_PW
: The password of the key store mounted in the Trusted Connector. Defaults topassword
.TC_TRUSTSTORE_PW
: The password of the trust store mounted in the Trusted Connector. Defaults topassword
.TC_CH_ISSUER_CONNECTOR
(mandatory): Issuer connector needed for IDS Messages as specified by the InfoModelTC_CH_AGENT
(mandatory): Server agent needed for IDS Messages as specified by the InfoModelSERVICE_SHARED_SECRET
(mandatory): Shared secret, see Configuration sectionSERVICE_ID_TC
(mandatory): Internal ID of theTrusted Connector
that is used by theLogging Service
to identify theTrusted Connector
.SERVICE_ID_LOG
(mandatory): Internal ID of theLogging Service
.
tc-core:
container_name: "tc-core"
image: fraunhoferaisec/trusted-connector-core:7.1.0
tty: true
stdin_open: true
volumes:
- /var/run/docker.sock:/var/run/docker.sock
- ./data/trusted-connector/application.yml:/root/etc/application.yml
- ./data/trusted-connector/allow-all-flows.pl:/root/deploy/allow-all-flows.pl
- ./data/trusted-connector/ch-ids.p12:/root/etc/keystore.p12
- ./data/trusted-connector/truststore.p12:/root/etc/truststore.p12
- ./data/trusted-connector/clearing-house-processors-0.10.0.jar:/root/jars/clearing-house-processors.jar
- ./data/trusted-connector/routes/clearing-house-routes.xml:/root/deploy/clearing-house-routes.xml
environment:
TC_DAPS_URL: https://<my-daps-url>
SERVICE_SHARED_SECRET: <shared-secret>
SERVICE_ID_TC: <trusted-connector-id>
SERVICE_ID_LOG: <logging-service-ic>
ports:
- "8443:8443"
- "9999:9999"
- "29292:29292"
The dockerfiles located here can be used to create containers for the services of the Clearing House App
. There are two types of dockerfiles:
- Simple builds (e.g. dockerfile) that require you to build the Service APIs yourself using Rust
- Multistage builds (e.g. dockerfile) that have a stage for building the rust code
To build the containers check out the repository and in the main directory execute
docker build -f docker/<dockerfile> . -t <image-name>
Please read the configuration section of the service (Logging Service
, Document API
, Keyring API
) you are trying to run, before using docker run
oder docker-compose
. All Containers build with the provided dockerfiles require at least one volume:
- The configuration file
Rocket.toml
is expected at/server/Rocket.toml
Containers of the Keyring API require an additional volume:
/server/init_db
needs to contain thedefault_doc_type.json
Containers of the Logging Service require an additional volume:
- The folder containing the signing key needs to match the path configured for the signing key in
Rocket.toml
, e.g./sever/keys
The Clearing House services use signed JWTs with HMAC and a shared secret to ensure a minimal integrity of the requests received. The Trusted Connector
as well as the services (Logging Service
, Document API
, Keyring API
) need to have access to the shared secret.
For production use please consider using additional protection measures.