Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/jvinet/knock
A port-knocking daemon
https://github.com/jvinet/knock
Last synced: 22 days ago
JSON representation
A port-knocking daemon
- Host: GitHub
- URL: https://github.com/jvinet/knock
- Owner: jvinet
- License: gpl-2.0
- Created: 2011-07-05T16:49:30.000Z (over 13 years ago)
- Default Branch: master
- Last Pushed: 2024-04-04T17:44:20.000Z (8 months ago)
- Last Synced: 2024-11-17T17:33:59.386Z (26 days ago)
- Language: C
- Homepage: http://www.zeroflux.org/projects/knock
- Size: 366 KB
- Stars: 562
- Watchers: 33
- Forks: 115
- Open Issues: 30
-
Metadata Files:
- Readme: README.md
- Changelog: ChangeLog
- License: COPYING
Awesome Lists containing this project
- awesome-hacking-lists - jvinet/knock - A port-knocking daemon (C)
README
## knock: A port-knocking implementation
Copyright (c) 2004, Judd Vinet
### ABOUT
This is a port-knocking server/client. Port-knocking is a method where a
server can sniff one of its interfaces for a special "knock" sequence of
port-hits. When detected, it will run a specified event bound to that port
knock sequence. These port-hits need not be on open ports, since we use
libpcap to sniff the raw interface traffic.### BUILDING
To build knockd, make sure you have libpcap and the autoconf tools
installed. Then run the following:$ autoreconf -fi
$ ./configure --prefix=/usr/local
$ make
$ sudo make install### EXAMPLE
The example below could be used to run a strict (DENY policy) firewall that
can only be accessed after a successful knock sequence.1. Client sends four TCP SYN packets to Server, at the following ports:
38281, 29374, 4921, 54918
2. Server detects this and runs an iptables command to open port 22 to
Client.
3. Client connects to Server via SSH and does whatever it needs to do.
4. Client sends four more TCP SYN packets to Server: 37281, 8529,
40127, 10100
5. Server detects this and runs another iptables command to close port
22 to Client.### KNOCKING CLIENTS
The accompanying knock client is very basic. If you want to do more advanced
knocks (eg, setting specific tcp flags) then you should take look at more
powerful clients.- [sendip](http://freshmeat.net/projects/sendip/)
### OTHER IMPLEMENTATIONS
Here are some other implementations of port-knocking:
- [pasmal](http://sourceforge.net/projects/pasmal/)
- [doorman](http://doorman.sourceforge.net/)