> > port-knocking is the biggest load of fud (Microsoft products apart) I
> > have heard about in ages. The term snake-oil comes to mind, as
> > does "security by obscurity and obfuscation" which we all know is no
> > security at all.
>
> Uhm. Security by obscurity is not good because it hides something *that
> is known for sure to be there*. Port knocking, on the other hand, makes
> a computer appear as if nothing is there. No open ports.
> A computer with all ports closed which uses portknocking and a computer
> with just all ports closed cannot be told apart from remote, either by
> portscanning or whatever mean. What the attacker sees is just "no open
> ports". It could, of course, imagine that port knocking might be in use,
> but even in that case, he would have to discover the knock sequence.
> With a knock sequence long enough (say, 8 ports), the likeliness of such
> a discovery is really low (1/65535^8 in this case). And, even if he
> succeeds, he just opens a port (as if there was no portknocking), and
> still has to violate whatever security measure is in place for the
> service (eg, ssh authentication).
>
> > I don't care if the originating process knocks on the well known port
> > with gold plated gloves hand braided from the finest Unobtainium by
> > seductive alluring Puerto Rican virgins, the receiving machine still
> > has to open another port short thereafter. This is not a magic port
> > and is not wrapped in Star Trek's finest stealth cloak, it's a port
> > that does TCP/IP stuff.
> >
> > If the end process listening on the newly opened port is in any way
> > weak - and this is the only possible reason anyone would ever try the
> > port knocking workaround - it's just as weak when it's listening on an
> > obfuscated port number.
>
> This is not true, for at least two reasons:
>
> - the port stays open only for the duration of the connection, not all
> the time;
>
> - at least with some implementations, the port is opened *only to the IP
> address of the user who did the knock*, not to the whole world.
>
> > If it's open, I can find it. If it's weak, I can get in. Then it's game
> > over, go home, I win.
>
> See above.
>
> > I've yet to hear positive things about port knocking from someone who
> > actually implemented it fully. In truth it's just a major pain in the
> > arse that makes the admin's life miserable and gives the boss a warm
> > fuzzy feeling based on hot air.
>
> I don't know about large setups, where it might be very possible that
> port knocking becomes a major PITA as you say. But I have setup and used
> port knocking for remote ssh access lots of time in the past, and never
> had a problem. This is just my little experience, of course.

OK, port knocking is going back on the todo list.

- Grant
-- 
gentoo-user@lists.gentoo.org mailing list

Reply via email to