Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Hands-On Blockchain with Hyperledger

You're reading from   Hands-On Blockchain with Hyperledger Building decentralized applications with Hyperledger Fabric and Composer

Arrow left icon
Product type Paperback
Published in Jun 2018
Publisher Packt
ISBN-13 9781788994521
Length 460 pages
Edition 1st Edition
Concepts
Arrow right icon
Authors (6):
Arrow left icon
Nitin Gaur Nitin Gaur
Author Profile Icon Nitin Gaur
Nitin Gaur
Salman A. Baset Salman A. Baset
Author Profile Icon Salman A. Baset
Salman A. Baset
Petr Novotny Petr Novotny
Author Profile Icon Petr Novotny
Petr Novotny
Luc Desrosiers Luc Desrosiers
Author Profile Icon Luc Desrosiers
Luc Desrosiers
Venkatraman Ramakrishna Venkatraman Ramakrishna
Author Profile Icon Venkatraman Ramakrishna
Venkatraman Ramakrishna
Anthony O'Dowd Anthony O'Dowd
Author Profile Icon Anthony O'Dowd
Anthony O'Dowd
+2 more Show less
Arrow right icon
View More author details
Toc

Table of Contents (14) Chapters Close

Preface 1. Blockchain - Enterprise and Industry Perspective FREE CHAPTER 2. Exploring Hyperledger Fabric 3. Setting the Stage with a Business Scenario 4. Designing a Data and Transaction Model with Golang 5. Exposing Network Assets and Transactions 6. Business Networks 7. A Business Network Example 8. Agility in a Blockchain Network 9. Life in a Blockchain Network 10. Governance, Necessary Evil of Regulated Industries 11. Hyperledger Fabric Security 12. The Future of Blockchain and the Challenges Ahead 13. Other Books You May Enjoy

Chaincode security


In Fabric, smart contracts, also known as chaincode, can be written in Go or JavaScript. The chaincodes must be installed on a peer and then explicitly initiated. When initiated, each code runs in a separate Docker container. The previous versions of chaincode also run in separate Docker containers.

The Docker container running the chaincode has access to the virtual network as well as the entire networking stack. If care is not taken in carefully reviewing the chaincode before it gets installed on the peer, and isolating the network access for that chaincode, it could result in a malicious or misconfigured node probing or attaching the peer attached to the same virtual network.

Note

An operator can configure a policy to disable all outgoing or incoming network traffic on the chaincode Docker containers, except white-listed nodes.

How is chaincode shared with other endorsing peers?

Organizations must establish a process for sharing chaincode with other other organizations participating...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime