[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[GNUnet-developers] Collecting data to demonstrate TCP ISN-based port kn
From: |
Christian Grothoff |
Subject: |
[GNUnet-developers] Collecting data to demonstrate TCP ISN-based port knocking |
Date: |
Thu, 15 May 2014 07:56:09 +0200 |
User-agent: |
Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20131103 Icedove/17.0.10 |
Hi all,
We are trying to get a port-knocking extension into the Linux kernel,
which would be useful to obscure TCP services -- such as GNUnet or
Tor Bridges, and could use your help to collect data to help convince
the Linux people to adopt the latest patch.
As Knock uses two fields in the TCP header in order to hide information
and we explicitly want to be compatible with machines sitting in
typical home networks, we need to make sure that this information
doesn't get corrupted by the majority of NAT boxes out there. We thus
created a program which tests if Knock would work in your environment.
It would be great if some of you were able to execute the program on
your machines in order to help us to get an estimation of if Knock one
day could be used in a large scale.
You can find sources, binaries and a more elaborate description here:
https://gnunet.org/knock_nat_tester
Technical details about Knock and a (somewhat outdated) research paper
as well as kernel patches are provided here:
https://gnunet.org/knock
Please help, it should only take a minute to download & run the code.
Thanks!
Julian & Christian
0x48426C7E.asc
Description: application/pgp-keys
- [GNUnet-developers] Collecting data to demonstrate TCP ISN-based port knocking,
Christian Grothoff <=