"Fossies" - the Fresh Open Source Software Archive

Member "coarseknocking-0.0.6/conf/coarse-server.conf" (27 Mar 2006, 3538 Bytes) of package /linux/privat/old/coarseknocking-0.0.6.tar.gz:


As a special service "Fossies" has tried to format the requested source page into HTML format using (guessed) Generic config files source code syntax highlighting (style: standard) with prefixed line numbers. Alternatively you can here view or download the uninterpreted source code file.

    1 ###############################################################################
    2 # File: coarse-server.conf: Coarse Knocking Server Configuration File
    3 #
    4 # This is a simple implementation of Port Knocking techniques.
    5 # This sniffs network packets with determined keys and executes commands like
    6 # firewall to open and close ports. In the client mode injects packets with
    7 # key to server.
    8 # This is a personal project of the your author and is available for everybody
    9 # by your GPL Licence.
   10 #
   11 # CoarseKnocking is free software; you can redistribute it and/or modify it 
   12 # under the terms of the GNU General Public License as published by the Free
   13 # Software Foundation; either version 2 of the License, or (at your option) any 
   14 # later version.
   15 #
   16 # CoarseKnocking is distributed in the hope that it will be useful, but WITHOUT 
   17 # ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS 
   18 # FOR A PARTICULAR PURPOSE.  See the GNU General Public License for more details.
   19 #
   20 # You should have received a copy of the GNU General Public License along with 
   21 # CoarseKnocking; if not, write to the Free Software Foundation, Inc., 59 
   22 # Temple Place, Suite 330, Boston, MA  02111-1307  USA
   23 #
   24 ##############################################################################
   25 
   26 # Binary grep...
   27 sniffing="/usr/bin/ngrep"
   28 
   29 # Destination Host
   30 dsthost="10.10.10.1"
   31 
   32 # Source Host
   33 srchost="10.10.10.2"
   34 
   35 # Destination TCP Port
   36 dport=1407
   37 
   38 ####################
   39 # OPENING rules
   40 ####################
   41 # Command executed to OPEN port if the string did be received..
   42 #
   43 # Firewall rules samples:
   44 # ipfwadm support for Linux 
   45 #command_open="/sbin/ipfwadm -I -i accept -P tcp -S $srchost -D $dsthost $dport -o"
   46 #
   47 # ipfwadm support for Linux (don't log)
   48 #command_open="/sbin/ipfwadm -I -i accept -S $srchost -D $dsthost"
   49 #
   50 # ipchain support for Linux (don't log)
   51 #command_open="/sbin/ipchains -I input -s $srchost -d $dsthost -j ACCEPT -l"
   52 #
   53 # ipchain support for Linux 
   54 #command_open="/sbin/ipchains -I input -s $srchost -d $dsthost -j ACCEPT"
   55 #
   56 # iptables support for Linux
   57 command_open="/sbin/iptables -I INPUT -s $srchost -d $dsthost -j ACCEPT"
   58 #
   59 # For those of you running FreeBSD (and compatible) you can
   60 # use their built in firewalling as well.
   61 #
   62 #command_open="/sbin/ipfw add 1 accept all from $srchost:255.255.255.255 to $dsthost:255.255.255.255"
   63 #
   64 #
   65 
   66 ####################
   67 # CLOSING rules
   68 ####################
   69 #
   70 # Command executed to CLOSE port if the string did be received..
   71 #
   72 # Firewall rules samples:
   73 # ipfwadm support for Linux 
   74 #command_close="/sbin/ipfwadm -D -i reject -P tcp -S $srchost -D $dsthost $dport -o"
   75 #
   76 # ipfwadm support for Linux (don't log)
   77 #command_close="/sbin/ipfwadm -D -i reject -S $srchost -D $dsthost"
   78 #
   79 # ipchain support for Linux (don't log)
   80 #command_close="/sbin/ipchains -D input -s $srchost -d $dsthost -j DENY -l"
   81 #
   82 # ipchain support for Linux 
   83 #command_close="/sbin/ipchains -D input -s $srchost -d $dsthost -j DENY"
   84 #
   85 # iptables support for Linux
   86 command_close="/sbin/iptables -D INPUT -s $srchost -d $dsthost -j ACCEPT"
   87 #
   88 #
   89 # For those of you running FreeBSD (and compatible) you can
   90 # use their built in firewalling as well.
   91 #
   92 #command_close="/sbin/ipfw del 1 accept all from $srchost:255.255.255.255 to $dsthost:255.255.255.255"
   93 #
   94 #
   95 
   96 # Key to open
   97 key_open="MIIEowIBAAKCAQEAqGBaWxrHZF0WwX33mG9OK4T5mHHNtjMStdSpegp7JbC3Lgzf"
   98 
   99 # Key to close
  100 key_close="z9tl2dbbGntzreQQ4Dnm7PrzNvD9PnG4oAuo378baSzKCA849Gp3w3HEhu7LFp"
  101 
  102 # Amount of packets
  103 amount=1
  104 
  105 # Network Interface.
  106 interface=eth0
  107 
  108 # End of Conf ###