On 20.09.2014 18:20, PGNd wrote:
> Hi Gerhard
>
> On Sat, Sep 20, 2014, at 08:53 AM, Gerhard Wiesinger wrote:
>
>
> Thanks for the comments.
>
> Re: the stateful approach, knockd's config-specified rules allow for 
> arbitrary rule-setting.  I do, now, understand your primary goals re: doing 
> this in SW. In the case of traditional, port-based knocking, I'll explore use 
> of your solution.  Nicely done, Thanks.
>
>> Maybe someone can tell us other pros and cons of both concepts.
> A comment simply based on my experience to date ... I'm currently evaluating 
> another approach to service protection.
>
> With a port-listener-based approach, as done here & in knockd, the ports need 
> to be listening -- i.e., open.
>
> In the case of a generally stealthed fw, where default port state is 
> closed/non-reponse, those open listener ports can be scanned for using nmap, 
> and can disscovered with tcpdump ...
>
> I'd thought with a reasonable # of randonly-selected ports, this would 
> eliminate all unauthorized access attempts for a protected service.  To my 
> real surprise, I still see access attempts -- using the knock sequences.  I 
> know I'm not leaking the knock-port specs, and change them, so I can only 
> assume they're being otherwise discovered.  The services are, in fact, 
> further protected by AUTH & fail2ban-on-fail'd-AUTH, so not really an issue.  
> But, surprising to me nonetheless.

Interesting. How long is your knocking sequence? 8 should be enough. Of 
course someone with network access can sniff (ISPs, etc.). Nevertheless 
it should be very unlikely.

>
> In response to my interests in implementing persistent, db-backed ACCOUNTING 
> data, I've been looking at libpcap-based accounting methods.  I.e., libpcap 
> sniffing might already be in place for me; I have yet to quantify the 
> performance penalty for doing so.
>
> Assuming that libpcap listening is already in place, for knock-like service 
> protection, I'm exploring fwknop (http://www.cipherdyne.org/fwknop/) as an 
> alternative.
>
> As a libpcap sniffer, NO open ports are required -- eliminating that 
> compromise vector -- and it additionally supports encryption of the 'knock', 
> addressing the portential for tcpdump compromise.
>
> A nice depolyment bonus is the availability of iOS/Android/WebUI fwknop 
> 'knock' clients.
>
>

fwknop/SPA is also a nice approach but there are also user land library 
dependencies and possible security leaks 
(http://www.cipherdyne.org/blog/2012/09/single-packet-authorization-the-fwknop-approach.html).
 
Of course iptables might also have a security leak. But as far as I know 
there never was any in the past.

libpcap might also have security leaks, I think there were some in the past.

OpenVPN has also a nice feature with static key authentication. All 
other non matching packets are ignored.

Ciao,
Gerhard

--
http://www.wiesinger.com/


------------------------------------------------------------------------------
Slashdot TV.  Video for Nerds.  Stuff that Matters.
http://pubads.g.doubleclick.net/gampad/clk?id=160591471&iu=/4140/ostg.clktrk
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to