Page 1 of 1

Port Knocking

Posted: Wed Feb 20, 2008 3:47 pm
by Libra Monkee
Anybody know anything about it?


found internets

Posted: Wed Feb 20, 2008 4:03 pm
by complacent
yup. it's cool enough I guess...


;)

Posted: Wed Feb 20, 2008 4:10 pm
by schvin
makes me cross. i guess the obfuscation and neat factors are high, but doesn't seem scalable or usable from an enterprise perspective, so that makes me cross. i seem to be getting crotchety in my old age.

Posted: Wed Feb 20, 2008 4:18 pm
by Sabre
I used it a long time ago for a project I had. Feel free to ask questions ;)

Posted: Wed Feb 20, 2008 5:35 pm
by Libra Monkee
By knocking on certain sequence of closed firewall ports you could open a port for your connection. Does that sound right?

Posted: Wed Feb 20, 2008 5:43 pm
by avriette
Libra Monkee wrote:By knocking on certain sequence of closed firewall ports you could open a port for your connection. Does that sound right?
"open a port" is too specific. "information could be transmitted" is more appropriate. Consider the case of two prisoners communicating by tapping a mutual wall.

Posted: Wed Feb 20, 2008 6:07 pm
by complacent
schvin wrote:makes me cross. i guess the obfuscation and neat factors are high, but doesn't seem scalable or usable from an enterprise perspective, so that makes me cross. i seem to be getting crotchety in my old age.
wow, you might be a little crotchety... ;)

I think it's "cool enough" for say a warez box or that one box that you keep some tools on.

But I agree, it would not be easily deployed amongst the enterprise.

Posted: Wed Feb 20, 2008 10:51 pm
by ElZorro
Nothing says it couldn't be deployed across an enterprise - think of it like a key, with the ports being the tumblers. Hit the tumblers right and the lock opens. You can encode this into software (great in client server applications). The problem is it is near worthless against a replay attack - if someone can sniff the traffic between the just play the sequence back and get in. If approach the server without sniffing they won't be able to get in.

Posted: Thu Feb 21, 2008 9:50 am
by complacent
ElZorro wrote:Nothing says it couldn't be deployed across an enterprise - think of it like a key, with the ports being the tumblers. Hit the tumblers right and the lock opens. You can encode this into software (great in client server applications). The problem is it is near worthless against a replay attack - if someone can sniff the traffic between the just play the sequence back and get in. If approach the server without sniffing they won't be able to get in.
Agreed, the obfuscation is out teh window when you start coding it into software...

If you look at it as a one trick pony that only "works" as a one trick pony, you start to get a better idea of how it can be implemented and still remain "cool".

Posted: Thu Feb 21, 2008 9:54 am
by schvin
yeah - agree with comments.

Posted: Thu Feb 21, 2008 10:41 am
by Sabre
ElZorro wrote:The problem is it is near worthless against a replay attack - if someone can sniff the traffic between the just play the sequence back and get in. If approach the server without sniffing they won't be able to get in.
Ah, now that isn't true! Take your key analogy (which was great!) one step further. Knowing that you are on a computer, you can now establish a out-of-band sequence that the ports should be knocked on. There are 65536 ports available (technically), so if you have a function that generates the next sequence psuedo-randomly, it doesn't matter if you sniff the traffic of the previous connection sequence, as the next time it will be a different port combination. If you knock on 5 ports before the right one opens, you have a VERY small chance that you will ever guess the right sequence (think 1 in a billion). Now if you can find the sequence, you're in with no problem... but let's hope the person that designed the system did something better than cos(x)*100 ;)

Posted: Thu Feb 21, 2008 10:55 am
by schvin
that's a good point... it would be pretty swank as an OPIE transport.

Posted: Thu Feb 21, 2008 11:07 am
by Sabre
Now you're thinking in the right direction ;)

Posted: Thu Feb 21, 2008 12:12 pm
by ElZorro
Sabre wrote:so if you have a function that generates the next sequence psuedo-randomly, it doesn't matter if you sniff the traffic of the previous connection sequence, as the next time it will be a different port combination.
Excellent. :)