Information for RPM fwknop-2.6.10-6.fc33.riscv64.rpm
ID | 703885 | ||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Name | fwknop | ||||||||||||||||||||||||||||||||||||||||||||||||||
Version | 2.6.10 | ||||||||||||||||||||||||||||||||||||||||||||||||||
Release | 6.fc33 | ||||||||||||||||||||||||||||||||||||||||||||||||||
Epoch | |||||||||||||||||||||||||||||||||||||||||||||||||||
Arch | riscv64 | ||||||||||||||||||||||||||||||||||||||||||||||||||
Summary | A Single Packet Authorization (SPA) implementation | ||||||||||||||||||||||||||||||||||||||||||||||||||
Description | fwknop implements an authorization scheme known as Single Packet Authorization (SPA) that requires only a single encrypted packet to communicate various pieces of information including desired access through an iptables policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities (both 0-day and unpatched code) much more difficult. The authorization server passively monitors authorization packets via libpcap and hence there is no "server" to which to connect in the traditional sense. Any service protected by fwknop is inaccessible (by using iptables to intercept packets within the kernel) before authenticating; anyone scanning for the service will not be able to detect that it is even listening. This authorization scheme offers many advantages over port knocking, include being non-replayable, much more data can be communicated, and the scheme cannot be broken by simply connecting to extraneous ports on the server in an effort to break knock sequences. The authorization packets can easily be spoofed as well, and this makes it possible to make it appear as though, say, www.yahoo.com is trying to authenticate to a target system but in reality the actual connection will come from a seemingly unrelated IP. Although the default data collection method is to use libpcap to sniff packets off the wire, fwknop can also read packets out of a file that is written by the iptables ulogd pcap writer or by a separate sniffer process. | ||||||||||||||||||||||||||||||||||||||||||||||||||
Build Time | 2020-08-15 11:36:11 GMT | ||||||||||||||||||||||||||||||||||||||||||||||||||
Size | 198.95 KB | ||||||||||||||||||||||||||||||||||||||||||||||||||
deabb320f3e719b9f70218412a58662b | |||||||||||||||||||||||||||||||||||||||||||||||||||
License | GPLv2 | ||||||||||||||||||||||||||||||||||||||||||||||||||
Buildroot | f33-build-302429-56960 | ||||||||||||||||||||||||||||||||||||||||||||||||||
Provides |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
Obsoletes | No Obsoletes | ||||||||||||||||||||||||||||||||||||||||||||||||||
Conflicts | No Conflicts | ||||||||||||||||||||||||||||||||||||||||||||||||||
Requires |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
Recommends | No Recommends | ||||||||||||||||||||||||||||||||||||||||||||||||||
Suggests | No Suggests | ||||||||||||||||||||||||||||||||||||||||||||||||||
Supplements | No Supplements | ||||||||||||||||||||||||||||||||||||||||||||||||||
Enhances | No Enhances | ||||||||||||||||||||||||||||||||||||||||||||||||||
Files |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
Component of |
|