Wiki source code of P4P SecuritySheet
Last modified by Zenna Elfen on 2025/11/24 08:46
Show last authors
| author | version | line-number | content |
|---|---|---|---|
| 1 | {{velocity}} | ||
| 2 | #set ($object = $doc.getObject('P4P Security.Code.P4P SecurityClass')) | ||
| 3 | #if (!$object) | ||
| 4 | #set ($messageKey = 'p4p security.sheet.description') | ||
| 5 | #set ($messageType = 'info') | ||
| 6 | #if ($doc.documentReference.name != 'P4P SecuritySheet') | ||
| 7 | #set ($messageKey = 'p4p security.sheet.noObject') | ||
| 8 | #set ($messageType = 'warning') | ||
| 9 | #end | ||
| 10 | {{$messageType}} | ||
| 11 | $services.localization.render($messageKey) | ||
| 12 | {{/$messageType}} | ||
| 13 | #stop | ||
| 14 | #end | ||
| 15 | #set ($discard = $xwiki.jsfx.use('uicomponents/edit/editableProperty.js', { | ||
| 16 | 'forceSkinAction': true, | ||
| 17 | 'language': $xcontext.locale | ||
| 18 | })) | ||
| 19 | #set ($discard = $doc.use($object)) | ||
| 20 | #set ($editing = $xcontext.action == 'edit') | ||
| 21 | {{html wiki="true" clean="false"}} | ||
| 22 | <div class="xform"> | ||
| 23 | <dl> | ||
| 24 | <dt #if (!$editing && $hasEdit) | ||
| 25 | class="editableProperty" | ||
| 26 | data-property="$escapetool.xml($services.model.serialize($object.getPropertyReference('title1')))" | ||
| 27 | data-property-type="object"#end> | ||
| 28 | <label#if ($editing) for="P4P Security.Code.P4P SecurityClass_0_title1"#end> | ||
| 29 | $escapetool.xml($doc.displayPrettyName('title1', false, false)) | ||
| 30 | </label> | ||
| 31 | <span class="xHint"> | ||
| 32 | $escapetool.xml($services.localization.render('Name of the related network or security project')) | ||
| 33 | </span> | ||
| 34 | </dt> | ||
| 35 | <dd>$doc.display('title1')</dd> | ||
| 36 | <dt #if (!$editing && $hasEdit) | ||
| 37 | class="editableProperty" | ||
| 38 | data-property="$escapetool.xml($services.model.serialize($object.getPropertyReference('relation')))" | ||
| 39 | data-property-type="object"#end> | ||
| 40 | <label#if ($editing) for="P4P Security.Code.P4P SecurityClass_0_relation"#end> | ||
| 41 | $escapetool.xml($doc.displayPrettyName('relation', false, false)) | ||
| 42 | </label> | ||
| 43 | <span class="xHint"> | ||
| 44 | $escapetool.xml($services.localization.render('Page that relates to this entry')) | ||
| 45 | </span> | ||
| 46 | </dt> | ||
| 47 | <dd>$doc.display('relation')</dd> | ||
| 48 | <dt #if (!$editing && $hasEdit) | ||
| 49 | class="editableProperty" | ||
| 50 | data-property="$escapetool.xml($services.model.serialize($object.getPropertyReference('auth_access')))" | ||
| 51 | data-property-type="object"#end> | ||
| 52 | <label#if ($editing) for="P4P Security.Code.P4P SecurityClass_0_auth_access"#end> | ||
| 53 | $escapetool.xml($doc.displayPrettyName('auth_access', false, false)) | ||
| 54 | </label> | ||
| 55 | <span class="xHint"> | ||
| 56 | $escapetool.xml($services.localization.render(' These mechanisms define who can perform which actions and under what conditions in a decentralized environment. They often use capabilities, tokens, or delegated rights to allow flexible yet secure permission management without centralized authority. Examples: Access Control Lists (ACLs), Macaroons, ZCAP-LD (Capability-based security), OAuth-style delegation etc.')) | ||
| 57 | </span> | ||
| 58 | </dt> | ||
| 59 | <dd>$doc.display('auth_access')</dd> | ||
| 60 | <dt #if (!$editing && $hasEdit) | ||
| 61 | class="editableProperty" | ||
| 62 | data-property="$escapetool.xml($services.model.serialize($object.getPropertyReference('auth_long')))" | ||
| 63 | data-property-type="object"#end> | ||
| 64 | <label#if ($editing) for="P4P Security.Code.P4P SecurityClass_0_auth_long"#end> | ||
| 65 | $escapetool.xml($doc.displayPrettyName('auth_long', false, false)) | ||
| 66 | </label> | ||
| 67 | <span class="xHint"> | ||
| 68 | $escapetool.xml($services.localization.render(' How do peers manage permissions, delegation, and capabilities? In other words: How are decisions made regarding who can do what?')) | ||
| 69 | </span> | ||
| 70 | </dt> | ||
| 71 | <dd>$doc.display('auth_long')</dd> | ||
| 72 | <dt #if (!$editing && $hasEdit) | ||
| 73 | class="editableProperty" | ||
| 74 | data-property="$escapetool.xml($services.model.serialize($object.getPropertyReference('mes_lev')))" | ||
| 75 | data-property-type="object"#end> | ||
| 76 | <label#if ($editing) for="P4P Security.Code.P4P SecurityClass_0_mes_lev"#end> | ||
| 77 | $escapetool.xml($doc.displayPrettyName('mes_lev', false, false)) | ||
| 78 | </label> | ||
| 79 | <span class="xHint"> | ||
| 80 | $escapetool.xml($services.localization.render('This layer protects the content of messages end-to-end, independent of the underlying transport. It guarantees that only intended recipients can decrypt the message, even when it passes through intermediaries or asynchronous systems. Examples: Message Layer Security (MLS), Olm/Megolm (Matrix encryption), Double Ratchet (Signal-style forward secrecy) etc.')) | ||
| 81 | </span> | ||
| 82 | </dt> | ||
| 83 | <dd>$doc.display('mes_lev')</dd> | ||
| 84 | <dt #if (!$editing && $hasEdit) | ||
| 85 | class="editableProperty" | ||
| 86 | data-property="$escapetool.xml($services.model.serialize($object.getPropertyReference('mes_long')))" | ||
| 87 | data-property-type="object"#end> | ||
| 88 | <label#if ($editing) for="P4P Security.Code.P4P SecurityClass_0_mes_long"#end> | ||
| 89 | $escapetool.xml($doc.displayPrettyName('mes_long', false, false)) | ||
| 90 | </label> | ||
| 91 | <span class="xHint"> | ||
| 92 | $escapetool.xml($services.localization.render('How does the project relate to protecting messages end-to-end, possibly across async networks?')) | ||
| 93 | </span> | ||
| 94 | </dt> | ||
| 95 | <dd>$doc.display('mes_long')</dd> | ||
| 96 | <dt #if (!$editing && $hasEdit) | ||
| 97 | class="editableProperty" | ||
| 98 | data-property="$escapetool.xml($services.model.serialize($object.getPropertyReference('staticList3')))" | ||
| 99 | data-property-type="object"#end> | ||
| 100 | <label#if ($editing) for="P4P Security.Code.P4P SecurityClass_0_staticList3"#end> | ||
| 101 | $escapetool.xml($doc.displayPrettyName('staticList3', false, false)) | ||
| 102 | </label> | ||
| 103 | <span class="xHint"> | ||
| 104 | $escapetool.xml($services.localization.render('These systems obscure who communicates with whom by hiding routing information, timing, and other metadata. Techniques like onion routing or mixnets ensure privacy even when the data itself is already encrypted. Examples: Onion Routing (Tor), Mixnets (such as Katzenpost, Nym) etc.')) | ||
| 105 | </span> | ||
| 106 | </dt> | ||
| 107 | <dd>$doc.display('staticList3')</dd> | ||
| 108 | <dt #if (!$editing && $hasEdit) | ||
| 109 | class="editableProperty" | ||
| 110 | data-property="$escapetool.xml($services.model.serialize($object.getPropertyReference('longText3')))" | ||
| 111 | data-property-type="object"#end> | ||
| 112 | <label#if ($editing) for="P4P Security.Code.P4P SecurityClass_0_longText3"#end> | ||
| 113 | $escapetool.xml($doc.displayPrettyName('longText3', false, false)) | ||
| 114 | </label> | ||
| 115 | <span class="xHint"> | ||
| 116 | $escapetool.xml($services.localization.render('How does the project relate to hiding who is talking to whom, such as guarding metadata?')) | ||
| 117 | </span> | ||
| 118 | </dt> | ||
| 119 | <dd>$doc.display('longText3')</dd> | ||
| 120 | <dt #if (!$editing && $hasEdit) | ||
| 121 | class="editableProperty" | ||
| 122 | data-property="$escapetool.xml($services.model.serialize($object.getPropertyReference('list_tran')))" | ||
| 123 | data-property-type="object"#end> | ||
| 124 | <label#if ($editing) for="P4P Security.Code.P4P SecurityClass_0_list_tran"#end> | ||
| 125 | $escapetool.xml($doc.displayPrettyName('list_tran', false, false)) | ||
| 126 | </label> | ||
| 127 | <span class="xHint"> | ||
| 128 | $escapetool.xml($services.localization.render('This ensures that data packets are confidential and tamper-proof while moving between peers over the network. It protects the communication channel itself, typically through protocols like TLS or Noise, establishing a secure tunnel for data exchange. Examples: Examples: TLS/ DTLS, Noise Protocol Framework etc.')) | ||
| 129 | </span> | ||
| 130 | </dt> | ||
| 131 | <dd>$doc.display('list_tran')</dd> | ||
| 132 | <dt #if (!$editing && $hasEdit) | ||
| 133 | class="editableProperty" | ||
| 134 | data-property="$escapetool.xml($services.model.serialize($object.getPropertyReference('long_tran')))" | ||
| 135 | data-property-type="object"#end> | ||
| 136 | <label#if ($editing) for="P4P Security.Code.P4P SecurityClass_0_long_tran"#end> | ||
| 137 | $escapetool.xml($doc.displayPrettyName('long_tran', false, false)) | ||
| 138 | </label> | ||
| 139 | <span class="xHint"> | ||
| 140 | $escapetool.xml($services.localization.render('How does the project relate to protecting data packets in transit and peer-to-peer channels?')) | ||
| 141 | </span> | ||
| 142 | </dt> | ||
| 143 | <dd>$doc.display('long_tran')</dd> | ||
| 144 | <dt #if (!$editing && $hasEdit) | ||
| 145 | class="editableProperty" | ||
| 146 | data-property="$escapetool.xml($services.model.serialize($object.getPropertyReference('link_sec')))" | ||
| 147 | data-property-type="object"#end> | ||
| 148 | <label#if ($editing) for="P4P Security.Code.P4P SecurityClass_0_link_sec"#end> | ||
| 149 | $escapetool.xml($doc.displayPrettyName('link_sec', false, false)) | ||
| 150 | </label> | ||
| 151 | <span class="xHint"> | ||
| 152 | $escapetool.xml($services.localization.render('Any relevant links?')) | ||
| 153 | </span> | ||
| 154 | </dt> | ||
| 155 | <dd>$doc.display('link_sec')</dd> | ||
| 156 | <dt #if (!$editing && $hasEdit) | ||
| 157 | class="editableProperty" | ||
| 158 | data-property="$escapetool.xml($services.model.serialize($object.getPropertyReference('longText5')))" | ||
| 159 | data-property-type="object"#end> | ||
| 160 | <label#if ($editing) for="P4P Security.Code.P4P SecurityClass_0_longText5"#end> | ||
| 161 | $escapetool.xml($doc.displayPrettyName('longText5', false, false)) | ||
| 162 | </label> | ||
| 163 | <span class="xHint"> | ||
| 164 | $escapetool.xml($services.localization.render('Any other considerations for security? (F.ex. integrated solutions such as Velid/I2P or other comments)')) | ||
| 165 | </span> | ||
| 166 | </dt> | ||
| 167 | <dd>$doc.display('longText5')</dd> | ||
| 168 | </dl> | ||
| 169 | </div> | ||
| 170 | {{/html}} | ||
| 171 | {{/velocity}} |