On 25/02/21 08:12, Marc SCHAEFER wrote:
On Wed, Feb 24, 2021 at 10:49:56PM +0000, tincanteksup wrote:
My idea (as daft as it is) would only serve one purpose:  To hide a
listening TCP port.   Because there would be no SYN-ACK from the server if
the SYN failed security checks.
This is what port knocking does: unfirewall the OpenVPN UDP or TCP port
if a password is given: the password being an specific sequence of
opens.



I was typing the exact same thing when I saw your post; this is indeed what port knocking was invented for, and port knocking even helps in UDP based setups.  It is far easier & fast to be able to DROP traffic on any UDP or TCP port if the right "knocking sequence" was not entered.  It would be interesting to see if that could be added/integrated into OpenVPN, but the main problem is that "proper" port knocking requires a user to be able to send raw packets. On linux this is possible, not sure about Windows, but it's definitely a no-no on Android or iOS.

JJK


_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to