Interface discovery and authentication in a name-based network

ABSTRACT

One embodiment provides an interface discovery system that facilitates interface discovery and authentication. During operation, the system receives a message from an unregistered interface via a local interface of a link adapter. The message can include a name. If the system determines that a source identifier of the message is not configured for a channel, the system generates a control message comprising the source identifier and an identifier of the local interface and sends the control message via a transport stack of the system.

RELATED APPLICATIONS

The subject matter of this application is related to the subject matter in the following applications:

-   -   U.S. patent application Ser. No. 13/847,814, entitled         “ORDERED-ELEMENT NAMING FOR NAME-BASED PACKET FORWARDING,” by         inventor Ignacio Solis, filed 20 Mar. 2013 (hereinafter “U.S.         patent application Ser. No. 13/847,814”);     -   U.S. patent application Ser. No. 12/338,175, entitled         “CONTROLLING THE SPREAD OF INTERESTS AND CONTENT IN A CONTENT         CENTRIC NETWORK,” by inventors Van L. Jacobson and Diana K.         Smetters, filed 18 Dec. 2008 (hereinafter “U.S. patent         application Ser. No. 12/338,175”); and     -   U.S. patent application Ser. No. 14/595,060, entitled         “AUTO-CONFIGURABLE TRANSPORT STACK,” by inventors Ignacio Solis         and Glenn C. Scott, filed 12 Jan. 2015 (hereinafter “U.S. patent         application Ser. No. 14/595,060”); the disclosures of which are         herein incorporated by reference in their entirety.

BACKGROUND

Field

This disclosure is generally related to the distribution of digital content. More specifically, this disclosure is related to channel discovery and authentication based on a name-based message-exchange.

Related Art

The proliferation of the Internet and e-commerce continues to create a vast amount of digital content. Content-centric network (CCN) architectures have been designed to facilitate accessing and processing such digital content. A CCN includes entities, or nodes, such as network clients, forwarders (e.g., routers), and content producers, which communicate with each other by sending “interest” packets for various content items and receiving “content object” packets in return. CCN interests and content objects are identified by their unique names, which are typically hierarchically structured variable-length identifiers (HSVLI). An HSVLI can include contiguous name components ordered from a most general level to a most specific level.

A CCN node typically does not accept unsolicited messages in order to prevent potential attacks and minimize their impact. However, in a CCN network, all nodes may not be coordinated to establish communication channels among themselves for message exchanges. As a result, a forwarder of a node can receive a message via a remote interface (i.e., the interface of a remote node in the CCN network) that has not been configured with a channel. Since the remote interface is “unknown” to the forwarder, it drops the received message. This can lead to a forwarder dropping a valid message from a peer node.

SUMMARY

One embodiment provides an interface discovery system that facilitates interface discovery and authentication. During operation, the system receives a message from an unregistered interface via a local interface of a link adapter. The message can include a name. If the system determines that a source identifier of the message is not configured for a channel, the system generates a control message comprising the source identifier and an identifier of the local interface and sends the control message via a transport stack of the system.

In a variation on this embodiment, the system discards the message at the link adapter, authenticates the source identifier, and configures a channel with the source identifier.

In a variation on this embodiment, the message is based on one or more of: a hierarchically structured variable-length identifier (HSVLI), which comprises contiguous name components ordered from a most general level to a most specific level. The HSVLI is applicable in a portal instance corresponding to the stack; a flat name that does not indicate any hierarchy; a role of the component within the stack; and a unique identifier, which is specific to the component of the stack.

In a variation on this embodiment, the system logs the contents of the control message in an activity log of the node.

In a further variation, the system receives an administrative command based on the activity log. The administrative command includes authenticating the source identifier and configuring a channel with the source identifier.

In a variation on this embodiment, the message is a request for establishing a tunnel as a channel. The system then authenticates a tunnel between the local interface and the unregistered interface, and configures the tunnel as a channel.

In a variation on this embodiment, the source identifier is one or more of: a media access control (MAC) address, an Internet Protocol (IP) address, a network label, and a name.

BRIEF DESCRIPTION OF THE FIGURES

FIG. 1A illustrates an exemplary content-centric network (CCN) that facilitates interface discovery and authentication, in accordance with an embodiment of the present invention.

FIG. 1B illustrates an exemplary transport framework for facilitating interface discovery and authentication, in accordance with an embodiment of the present invention.

FIG. 2 illustrates an exemplary tunnel establishment based on interface discovery and authentication, in accordance with an embodiment of the present invention.

FIG. 3A presents a flow chart illustrating a method for processing a message from an unregistered interface, in accordance with an embodiment of the present invention.

FIG. 3B presents a flow chart illustrating a method for processing a control message identifying an unregistered interface, in accordance with an embodiment of the present invention.

FIG. 4 presents a flow chart illustrating a method for processing an unsolicited or unauthenticated request for a tunnel, in accordance with an embodiment of the present invention.

FIG. 5 illustrates an exemplary apparatus that facilitates interface discovery and authentication, in accordance with an embodiment of the present invention.

FIG. 6 illustrates an exemplary computer system that facilitates interface discovery and authentication, in accordance with an embodiment of the present invention.

In the figures, like reference numerals refer to the same figure elements.

DETAILED DESCRIPTION

The following description is presented to enable any person skilled in the art to make and use the embodiments, and is provided in the context of a particular application and its requirements. Various modifications to the disclosed embodiments will be readily apparent to those skilled in the art, and the general principles defined herein may be applied to other embodiments and applications without departing from the spirit and scope of the present disclosure. Thus, the present invention is not limited to the embodiments shown, but is to be accorded the widest scope consistent with the principles and features disclosed herein.

Overview

Embodiments of the present invention solve the problem of processing an unsolicited message from an unregistered interface by facilitating discovery and authentication of the interface based on the unsolicited message. During operation, when a CCN node receives the unsolicited message from an unregistered interface (e.g., a message with an unknown source identifier), the receiving interface (e.g., the receiving link adapter) of the node drops the message and sends a control message via the transport stack of the node. The control message can include the unknown source identifier and an identifier of the receiving interface. The routing agent of the node receives the control message, authenticates the unregistered interface, and sets up a new channel with that interface. This allows the node to create routing table and pending interest table (PIT) entries. The routing agent can also log the information of the control message so that an administrative action can be taken.

In some embodiments, the authentication can require an administrative action. The routing agent then logs the arrival of the message along with the information of the control message in an activity log of the receiving node. This log entry can create an alarm for an administrator for an administrative action. In either case, a peer node can solicit a new connection without requiring a higher level coordination protocol. The unsolicited message can be used as the request to initiate a communication. Furthermore, when the node determines that the unsolicited message is an unexpected message, the node creates an entry in the activity log and generates an alert to invoke actions against potential intrusion or denial-of-service attacks.

In CCN, a transport framework enables a transport stack within the framework. The transport stack can include multiple components or communication modules, and does not adhere to a traditional layered model (e.g., OSI) where each component communicates only with the component below or above it. The transport stack can be created dynamically and configured at runtime, where each of the components within the transport stack performs a specific function. For example, one component of the transport stack can be a verifier component, which is responsible for verifying the digital signature of content objects received in response to an interest sent over the network.

In some embodiments, the transport framework operates under the CCN architecture. In CCN, each piece of content is individually named, and each piece of data is bound to a unique name that distinguishes the data from any other piece of data, such as other versions of the same data or data from other sources. This unique name allows a network device to request the data by disseminating a request or an interest that indicates the unique name, and can obtain the data independent from the data's storage location, network location, application, and means of transportation. The following terms are used to describe the CCN architecture:

-   -   Content Object (or “Content Object”): A single piece of named         data, which is bound to a unique name. Content Objects are         “persistent,” which means that a Content Object can move around         within a computing device, or across different computing         devices, but does not change. If any component of the Content         Object changes, the entity that made the change creates a new         Content Object that includes the updated content, and binds the         new Content Object to a new unique name.     -   Unique Names: A name in a CCN is typically location-independent         and uniquely identifies a Content Object. A data-forwarding         device can use the name or name prefix to forward a packet         toward a network node that generates or stores the Content         Object, regardless of a network address or physical location for         the Content Object. In some embodiments, the name may be a         hierarchically structured variable-length identifier (HSVLI).         The HSVLI can be divided into several hierarchical components,         which can be structured in various ways. For example, the         individual name components parc, home, ccn, and test.txt can be         structured in a left-oriented prefix-major fashion to form the         name “/parc/home/ccn/test.txt.” Thus, the name “/parc/home/ccn”         can be a “parent” or “prefix” of “/parc/home/ccn/test.txt.”         Additional components can be used to distinguish among different         versions of the content item, such as a collaborative document.

In some embodiments, the name can include an identifier, such as a hash value that is derived from the Content Object's data (e.g., a checksum value) and/or from elements of the Content Object's name. A description of a hash-based name is described in U.S. patent application Ser. No. 13/847,814, which is herein incorporated by reference. A name can also be a flat label. Hereinafter, “name” is used to refer to any name for a piece of data in a name-data network, such as a hierarchical name or name prefix, a flat name, a fixed-length name, an arbitrary-length name, or a label (e.g., a Multiprotocol Label Switching (MPLS) label).

-   -   Interest (or “Interest”): A packet that indicates a request for         a piece of data, and includes a name (or a name prefix) for the         piece of data. A data consumer can disseminate a request or         Interest across an information-centric network, which CCN/NDN         routers can propagate toward a storage device (e.g., a cache         server) or a data producer that can provide the requested data         to satisfy the request or Interest.

In addition, “lci” refers to labeled content information and is a Universal Resource Indicator (URI) compliant identifier in which name segments carry a label. Network protocols such as CCN can use labeled content information by applying specific labels to each name segment of a URI. In a hierarchically structured name, a labeled content name assigns a semantic type or label to each segment. For example, a type of name segment can include a name segment, which is a generic name segment that includes arbitrary octets, which allows a CCN to use a binary on-the-wire representation for messages.

The methods disclosed herein are not limited to CCN networks and are applicable to other architectures as well. A description of a CCN architecture is described in U.S. patent application Ser. No. 12/338,175, which is herein incorporated by reference.

Exemplary Network and Communication

FIG. 1A illustrates an exemplary content-centric network (CCN) that facilitates interface discovery and authentication, in accordance with an embodiment of the present invention. A network 100, which can be a CCN, can include a client device 116, a content producing device 118, and a router or other forwarding device at nodes 102, 104, 106, 108, 110, 112, and 114. A node can be a computer system, an endpoint representing users, and/or a device that can generate interests or originate content. In a CCN network, the interfaces (e.g., on a transport link adapter) are often configured based on configuration files comprising prepared configuration specifications. The configuration of these interfaces is usually modified by explicit administrative commands at runtime.

Suppose that peer nodes 102 and 114 are coupled to each other via interface 172 of node 102 and interface 174 of node 114. If nodes 102 and 114 do not have a configured channel between interfaces 172 and 174, nodes 102 and 114 may remain unaware of the interface of the peer node. As a result, node 114 can receive a message from interface 172, which has not been registered at node 114. Typically, when the receiving link adapter determines that it has received an unsolicited message from an unregistered interface, the link adapter drops the message. However, this can lead to loss of valid messages.

To solve this problem, embodiments of the present invention notify the control agent regarding the arrival of an unsolicited message. During operation, node 102 sends a message 120 via interface 172 to node 114. Message 120 can include a source identifier 122 and a destination identifier 124. Message 120 can also include inner content 126, which can be a content object or an interest. The source and destination identifiers can be: a media access control (MAC) address, an Internet Protocol (IP) address, a network label, a name, and a combination thereof. Suppose that identifiers 122 and 124 are assigned to interfaces 172 and 174, respectively.

Since message 120 is an unsolicited message from unregistered interface 172, source identifier 122 is an unknown identifier to node 114. Upon receiving message 120, the link adapter (e.g., the receiving link adapter) of node 114 determines that destination identifier 124 is assigned to a local interface 174 and, hence, message 120 is destined to node 114. The link adapter further determines that source identifier 122 is an unknown identifier from an unregistered interface. The link adapter notifies the routing agent of node 114 regarding the arrival of message 120. To do so, the link adapter drops message 120 and sends a control message to the routing agent. The control message can include source identifier 122 and an interface identifier of receiving interface 174. The interface identifier can be an internal and local identifier of node 114, or identifier 124.

The routing agent of the node receives the control message and authenticates unregistered interface 172. In some embodiments, node 114 can include an authentication module, which authenticates unregistered interface 172 and its identifier 122. This allows the routing agent to set up a new channel 130 between interfaces 172 and 174. As a result, the routing agent creates corresponding routing table entries. For any subsequent message with an interest received from node 102, node 114 creates a PIT entry, thereby allowing data forwarding between interfaces 172 and 174. In some embodiments, the authentication can require an administrative action. The routing agent then logs the arrival of message 120 along with the information of the control message in an activity log of node 114. This log entry can create an alarm for an administrator for an administrative action.

In this way, peer node 102 can solicit a new connection with node 114 without requiring a higher level coordination protocol. Unsolicited message 120 can be used as the request to initiate a communication. Furthermore, when node 114 determines that unsolicited message 120 is an unexpected message, node 114 can create an entry in the activity log and generate an alert to invoke actions against potential intrusion or denial-of-service attacks.

FIG. 1B illustrates an exemplary transport framework for facilitating interface discovery and authentication, in accordance with an embodiment of the present invention. In this example, nodes 102 and 114 can have internal transport stacks (e.g., associated with transport frameworks 150 and 160, respectively) that exchange network packets with each other over network 100. In a traditional IP architecture, a forwarder is an IP-based forwarder that looks at the header of a packet to determine the source and the destination for the packet, and forwards the packet to the destination. The stack performs TCP/UDP, and an application interacts with the stack via a socket. In contrast, node 102 (or node 114) of the present invention does not use a conventional “stack.” Rather, an application 142 running on node 102 can communicate with any stack components of transport framework 150. Similarly, an application 144 running on node 114 can communicate with any stack components of transport framework 160.

Transport framework 150 of node 102 can include stack components 154.1-154.n. Node 102 can also include forwarder 156, (e.g., a network interface card, or a router in a local area network), which can transfer packets to and from the stack (and individual stack components) of transport framework 150 via network 100. Similarly, transport framework 160 of node 114 can include stack components 164.1-164.p. Node 114 can also include a forwarder 166, which can transfer packets to and from the stack (and individual stack components) of transport framework 160 via network 100. Forwarders 156 and 166 can also facilitate the transfer of packets directly between individual stack components 154.1-154.n and 164.1-164.p, respectively.

In some embodiments, a stack component of transport framework 150 operates as a routing agent, which creates and maintains a forwarding information base (FIB) for node 102. Similarly, a stack component of transport framework 160 can operate as a routing agent for node 114. When node 114 receives message 120, the link adapter inspects source identifier 122 to determine which of the link adapter's currently configured channels should receive the message. Since source identifier 122 does not match any current configuration, the link adapter drops message 120 and sends a control message 170 up the transport stack of transport framework 160 to the stack component operating as the routing agent. Control message 170 can include source identifier 122 and an interface identifier of receiving interface 174.

Another stack component of transport framework 160 can operate as an authenticator for node 114. The routing agent can authenticate source identifier 122, either within itself or in conjunction with the authenticator, for any future communication and sets up a new channel 130. In addition, the authentication can require an administrative action. The routing agent or the authenticator then logs the arrival of message 120 along with the information of the control message in an activity log of node 114. This log entry can create an alarm in an administrative device 180, which can access a command interface of node 114. Based on the alert, an administrator can configure channel 130 between interfaces 172 and 174 via the command interface (e.g., a command line interface (CLI) or a graphical user interface (GUI)).

Unsolicited Tunnel Request

FIG. 2 illustrates an exemplary tunnel establishment based on interface discovery and authentication, in accordance with an embodiment of the present invention. In this example, node 102 sends message 120 to node 114 to establish a tunnel as a channel with node 114. The tunnel can be a Transmission Control Protocol (TCP) or a User Datagram Protocol (UDP) tunnel. Based on the request, node 114 can authenticate the requested tunnel and initiate a tunnel establishment protocol to establish tunnel 200. For example, content 126 of message 120 can be a tunnel-specific name, which can further include tunnel configuration parameters.

In response, node 114 can send encryption parameters and other necessary information to establish a tunnel to node 102. Based on the exchanged information, nodes 102 and 114 can establish a tunnel 200. Upon establishing tunnel 200, node 114 can configure tunnel 200 as a channel with node 102. In some embodiments, the authentication can require an administrative action. Node 114 then logs the arrival of message 120 along with its associated information in an activity log of node 114. This log entry can create an alarm for an administrator for an administrative action. An administrator can then configure tunnel 200 as a channel between nodes 102 and 114.

In some embodiments, upon establishing the channel (e.g., either as a tunnel or as a configured channel, as described in conjunction with FIG. 1A), node 114 can take further actions on content 126 of message 120 instead of discarding message 120. For example, if content 126 includes an inner interest 222, node 114 can create an entry in a local PIT. Subsequently, node 114 can transmit interest 222 through network 100. Suppose that interest 222 can be satisfied by device 118 in network 100. Here, device 118 can operate as a producer. Upon receiving interest 222, device 118 transmits a responsive content object 224 to node 114. Node 114 receives content object 224, looks up in the local PIT the interest name matching the name of content object 224, and finds the matching PIT entry. Node 114 can then repackage a content object 224 to include the tunnel-specific information and transmit content object 224 via tunnel 200 back to node 102.

Operations

FIG. 3A presents a flow chart 300 illustrating a method for processing a message from an unregistered interface, in accordance with an embodiment of the present invention. During operation, a CCN node receives a message via a local link adapter and extracts the inner content (operation 302). The link adapter then checks whether the source identifier of the message is configured for a channel (operation 304). If the source identifier is configured for a channel (i.e., the source identifier is known to the node), the inner content is processed by the node based on its FIB, content cache, and PIT entries (operation 306). If the source identifier has not been configured for a channel, the link adapter sends a control message comprising a source identifier and receiving interface information (e.g., an interface identifier) via the transport stack of the node (operation 308). The link adapter can also discard the message (operation 310).

FIG. 3B presents a flow chart 350 illustrating a method for processing a control message identifying an unregistered interface, in accordance with an embodiment of the present invention. During operation, the routing agent of a CCN node receives a control message comprising a source identifier and receiving interface information (e.g., an interface identifier) via the transport stack of the node (operation 352). The source identifier can be: a media access control (MAC) address, an Internet Protocol (IP) address, a network label, a name, and a combination thereof. The routing agent then checks whether an administrative action is required for the control message (operation 354).

If an administrative action is required, the routing agent logs the content of the control message in a local activity log (operation 356). This causes an alert to an administrative device. If an administrative action is not required, the routing agent authenticates the source identifier and sets up a new channel for the source identifier (operation 358). The routing agent can operate in conjunction with an authenticator to authenticate the source identifier. The routing agent then creates FIB entries for the new channel, as needed (operation 360). The node can also create PIT entries for the interests received via the new channel.

FIG. 4 presents a flow chart 400 illustrating a method for processing an unsolicited or unauthenticated request for a tunnel, in accordance with an embodiment of the present invention. During operation, a CCN node receives an unsolicited or unauthenticated request for establishing a tunnel as a channel via a link adapter (operation 402). The link adapter then checks whether an administrative action is required for the request (operation 404). If an administrative action is required, the node logs the tunnel establishment request in a local activity log (operation 406). This causes an alert to an administrative device. If an administrative action is not required, the node authenticates the requested tunnel (operation 408). The node establishes the tunnel based on a tunnel establishment protocol (operation 410) and configures the tunnel as a new channel (operation 412).

Exemplary Apparatus and Computer System

FIG. 5 illustrates an exemplary apparatus that facilitates interface discovery and authentication, in accordance with an embodiment of the present invention. Apparatus 500 can comprise a plurality of modules, which may communicate with one another via a wired or wireless communication channel. Apparatus 500 may be realized using one or more integrated circuits, and may include fewer or more modules than those shown in FIG. 5. Further, apparatus 500 may be integrated in a computer system, or realized as a separate device that is capable of communicating with other computer systems and/or devices. Specifically, apparatus 500 can comprise a communication module 502, a control module 504, a logging module 506, and an authentication module 508.

In some embodiments, communication module 502 can send and/or receive data packets to/from other network nodes across a computer network, such as a content-centric network. Communication module 502 can receive an unsolicited message from an unregistered interface. Control module 504 can send a control message up the transport stack comprising a source identifier and the receiving interface information of the unsolicited message. Logging module 506 logs the arrival of the message along with the information of the control message in a local activity log. Authentication module 508 authenticates the unregistered interface and sets up a new channel with that interface. This allows apparatus 500 to create routing table (e.g., FIB) and PIT entries.

FIG. 6 illustrates an exemplary computer system that facilitates interface discovery and authentication, in accordance with an embodiment of the present invention. Computer system 602 includes a processor 604, a memory 606, and a storage device 608. Memory 606 can include a volatile memory (e.g., RAM) that serves as a managed memory, and can be used to store one or more memory pools. Furthermore, computer system 602 can be coupled to a display device 610, a keyboard 612, and a pointing device 614. Storage device 608 can store an operating system 616, an interface discovery system 618, and data 632.

Interface discovery system 618 can include instructions, which when executed by computer system 602, can cause computer system 602 to perform methods and/or processes described in this disclosure. Specifically, interface discovery system 618 may include instructions for sending and/or receiving data packets to/from other network nodes across a computer network, such as a content-centric network (communication module 620). Further, interface discovery system 618 may include instructions for receiving and identifying an unsolicited message from an unregistered interface (communication module 620).

Interface discovery system 618 can include instructions for sending a control message up the transport stack comprising a source identifier and the receiving interface information of the unsolicited message (control module 622). Interface discovery system 618 can also include instructions for logging the arrival of the message along with the information of the control message in a local activity log (logging module 624). In addition, interface discovery system 618 can include instructions for authenticating the unregistered interface and sets up a new channel with that interface (authentication module 626).

Data 632 can include any data that is required as input or that is generated as output by the methods and/or processes described in this disclosure. Specifically, data 632 can store at least a packet that corresponds to an interest, where the interest includes a name; a transport framework; a protocol or transport stack; one or more components of a transport or protocol stack; authentication information; and the activity log of computer system 602.

The data structures and code described in this detailed description are typically stored on a computer-readable storage medium, which may be any device or medium that can store code and/or data for use by a computer system. The computer-readable storage medium includes, but is not limited to, volatile memory, non-volatile memory, magnetic and optical storage devices such as disk drives, magnetic tape, CDs (compact discs), DVDs (digital versatile discs or digital video discs), or other media capable of storing computer-readable media now known or later developed.

The methods and processes described in the detailed description section can be embodied as code and/or data, which can be stored in a computer-readable storage medium as described above. When a computer system reads and executes the code and/or data stored on the computer-readable storage medium, the computer system performs the methods and processes embodied as data structures and code and stored within the computer-readable storage medium.

Furthermore, the methods and processes described above can be included in hardware modules. For example, the hardware modules can include, but are not limited to, application-specific integrated circuit (ASIC) chips, field-programmable gate arrays (FPGAs), and other programmable-logic devices now known or later developed. When the hardware modules are activated, the hardware modules perform the methods and processes included within the hardware modules.

The foregoing descriptions of embodiments of the present invention have been presented for purposes of illustration and description only. They are not intended to be exhaustive or to limit the present invention to the forms disclosed. Accordingly, many modifications and variations will be apparent to practitioners skilled in the art. Additionally, the above disclosure is not intended to limit the present invention. The scope of the present invention is defined by the appended claims. 

What is claimed is:
 1. A computer-implemented method, comprising: receiving, by a local interface of a link adapter of a node, a message from an unregistered interface, wherein the message includes a name, a source identifier indicating the unregistered interface, and a destination identifier indicating a destination interface for the message; determining whether the destination identifier is assigned to the local interface; determining whether the source identifier is known to the link adapter; and in response to determining that the destination identifier is assigned to the local interface and the source identifier is unknown to the link adapter: discarding the message at the link adapter; generating a control message comprising the source identifier and an identifier of the local interface; and sending the control message via a transport stack of the node to configure a channel with the source identifier.
 2. The method of claim 1, further comprising: authenticating the source identifier; and configuring the channel between the local interface and the unregistered interface associated with the source identifier.
 3. The method of claim 1, wherein the name in the message is based on one or more of: a hierarchically structured variable-length identifier (HSVLI), which comprises contiguous name components ordered from a most general level to a most specific level, wherein the HSVLI is applicable in a portal instance corresponding to the stack; a flat name that does not indicate any hierarchy; a role of a component of the stack; and a unique identifier, which is specific to the component of the stack.
 4. The method of claim 1, further comprising logging contents of the control message in an activity log of the node.
 5. The method of claim 4, further comprising receiving an administrative command based on the activity log, wherein the administrative command includes authenticating the source identifier and configuring the channel with the source identifier.
 6. The method of claim 1, wherein the message is a request for establishing a tunnel as the channel; wherein the method further comprises: authenticating a tunnel between the local interface and the unregistered interface; and configuring the tunnel as the channel.
 7. The method of claim 1, wherein the source identifier is one or more of: a media access control (MAC) address, an Internet Protocol (IP) address, a network label, and a name.
 8. A non-transitory computer-readable storage medium storing instructions that when executed by a computer cause the computer to perform a method, the method comprising: receiving, by a local interface of a link adapter of a node, a message from an unregistered interface, wherein the message includes a name, a source identifier indicating the unregistered interface, and a destination identifier indicating a destination interface for the message; determining whether the destination identifier is assigned to the local interface; determining whether the source identifier is known to the link adapter; and in response to determining that the destination identifier is assigned to the local interface and the source identifier is unknown to the link adapter: discarding the message at the link adapter; generating a control message comprising the source identifier and an identifier of the local interface; and sending the control message via a transport stack of the node to configure a channel with the source identifier.
 9. The storage medium of claim 8, wherein the method further comprises: authenticating the source identifier; and configuring the channel between the local interface and the unregistered interface associated with the source identifier.
 10. The storage medium of claim 8, wherein the name in the message is based on one or more of: a hierarchically structured variable-length identifier (HSVLI), which comprises contiguous name components ordered from a most general level to a most specific level, wherein the HSVLI is applicable in a portal instance corresponding to the stack; a flat name that does not indicate any hierarchy; a role of a component of the stack; and a unique identifier, which is specific to the component of the stack.
 11. The storage medium of claim 8, wherein the method further comprises logging contents of the control message in an activity log of the node.
 12. The storage medium of claim 11, wherein the method further comprises receiving an administrative command based on the activity log, wherein the administrative command includes authenticating the source identifier and configuring the channel with the source identifier.
 13. The storage medium of claim 8, wherein the message is a request for establishing a tunnel as the channel; wherein the method further comprises: authenticating a tunnel between the local interface and the unregistered interface; and configuring the tunnel as the channel.
 14. The storage medium of claim 8, wherein the source identifier is one or more of: a media access control (MAC) address, an Internet Protocol (IP) address, a network label, and a name.
 15. A computer system for facilitating forwarding of packets, the system comprising: a processor; and a storage device storing instructions that when executed by the processor cause the processor to perform a method, the method comprising: receiving, by a local interface of a link adapter of a node, a message from an unregistered interface, wherein the message includes a name, a source identifier indicating the unregistered interface, and a destination identifier indicating a destination interface for the message; determining whether the destination identifier is assigned to the local interface; determining whether the source identifier is known to the link adapter; and in response to determining that the destination identifier is assigned to the local interface and the source identifier is unknown to the link adapter: discarding the message at the link adapter; generating a control message comprising the source identifier and an identifier of the local interface; and sending the control message via a transport stack of the node to configure a channel with the source identifier.
 16. The computer system of claim 15, wherein the method further comprises: authenticating the source identifier; and configuring the channel between the local interface and the unregistered interface associated with the source identifier.
 17. The computer system of claim 15, wherein the name in the message is based on one or more of: a hierarchically structured variable-length identifier (HSVLI), which comprises contiguous name components ordered from a most general level to a most specific level, wherein the HSVLI is applicable in a portal instance corresponding to the stack; a flat name that does not indicate any hierarchy; a role of a component of the stack; and a unique identifier, which is specific to the component of the stack.
 18. The computer system of claim 15, wherein the method further comprises logging contents of the control message in an activity log of the node.
 19. The computer system of claim 18, wherein the method further comprises receiving an administrative command based on the activity log, wherein the administrative command includes authenticating the source identifier and configuring the channel with the source identifier.
 20. The computer system of claim 15, wherein the message is a request for establishing a tunnel as the channel; wherein the method further comprises: authenticating a tunnel between the local interface and the unregistered interface; and configuring the tunnel as the channel. 