[Dev] [GNUnet-developers] Collecting data to demonstrate TCP ISN-based port knocking

hellekin hellekin at gnu.org
Thu May 15 14:44:26 GMT 2014


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

On 05/15/2014 02:56 AM, Christian Grothoff wrote:
> Hi all,
> 
> We are trying to get a port-knocking extension into the Linux kernel,
> which would be useful to obscure TCP services -- such as GNUnet or
> Tor Bridges, and could use your help to collect data to help convince
> the Linux people to adopt the latest patch.
> 
> As Knock uses two fields in the TCP header in order to hide information
> and we explicitly want to be compatible with machines sitting in
> typical home networks, we need to make sure that this information
> doesn't get corrupted by the majority of NAT boxes out there. We thus
> created a program which tests if Knock would work in your environment.
> It would be great if some of you were able to execute the program on
> your machines in order to help us to get an estimation of if Knock one
> day could be used in a large scale.
> 
> You can find sources, binaries and a more elaborate description here:
> https://gnunet.org/knock_nat_tester
> Technical details about Knock and a (somewhat outdated) research paper
> as well as kernel patches are provided here:
> https://gnunet.org/knock
> 
> Please help, it should only take a minute to download & run the code.
> 
> Thanks!
> 
> Julian & Christian
>
*** Hi, forwarding this to Emulatorman and the Parabola/GNU/Linux-libre
developers as they were the first ones to include the Knock patch to the
Linux kernel.

Cheers,

==
hk

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (GNU/Linux)
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=3aMj
-----END PGP SIGNATURE-----



More information about the Dev mailing list