

fwknop does not require specialized logging support on the server To devices like the iPhone and allows any normal user to use it. fwknop does not require root access on the client side because itĭoesn't manipulate raw packet headers - this brings SPA functionality a or -R on the fwknop client command line).

an IP that isĮncrypted within the SPA payload - the later is what fwknop does with That does trust the source IP in the header vs. (it is possible to mount a MITM attack against any SPA implementation fwknop does not require trusting an IP address in the network header To be installed on the server (or the client). fwknop does not require a heavyweight interpreter like perl or python Here are a few decisions made by fwknop that are direct Solution you choose probably depends on which of these design decisions However, fwknop makes several designĭecisions that are at odds with those made by knockknock, so the I would say that the most interesting competing implementation is Moxie > other options you've grown fond of as well? Obviously you're biased, but perhaps there's I came across your website and tool, fwknop at > implications I went on a hunt to find the best tool for implementing " > After weeks of reading about port knocking, security and its My best guess is to create a knockknock rule for the web gui (8112) and leave deluge's inbound (5000) + outbound (6000) ports open and standard SSH knockknock rule.Ĭan anyone contribute/comment on how this should be setup? It runs on a separate port (8112 by default), for a total of three.

"deluge-web -fork" is a web gui to add/remove Torrents.
KNOCKKNOCK SECURITY TORRENT
Once a Torrent is added it needs two ports to operate (1 Inbound + 1 Outbound). "deluged" runs as a local daemon on the server. I threw in an application like Deluge because I can't get my head around the firewall logic. All Inbound+Outbound traffic flows over one port after the connection is established - easy enough.Ĥ. Am I correct in assuming that it would be wise to NOT use UFW to configure my firewall and instead rely strictly on iptables? I believe this to be true because knockknock will need custom iptable entries to work.ģ. Has anyone on the forums attempted to setup port knocking with knockknock before?Ģ. Or, I can use knockknock and hide SSH and Deluge but need to keep 1outbound+1inbound tcp port open for deluge xfers (or use knockknock-proxy). I think my options are I can firewall the server, open SSH port and keep it visible, and get to the deluge by going to localhost:8112 after a ssh -D $someport.
KNOCKKNOCK SECURITY PASSWORD
