Most active commenters
  • tptacek(15)
  • Joel_Mckay(14)
  • akerl_(11)
  • fariszr(9)
  • lucideer(7)
  • (6)
  • mdhb(6)
  • frumplestlatz(5)
  • dugite-code(5)
  • aspenmayer(4)

67 points xlmnxp | 165 comments | | HN request time: 3.829s | source | bottom
1. myzek ◴[] No.45666685[source]
I don't want to be a hater, but exposing access to your homelab through a "fully vibe coded" application (it's mentioned at the bottom of the README) is probably not a good idea.

The idea itself sounds fun though

replies(7): >>45666794 #>>45666805 #>>45667638 #>>45668320 #>>45672456 #>>45673770 #>>45676658 #
2. mano78 ◴[] No.45666742[source]
I implemented something similar as a caddy module, then I realized that if I was connected to a public wifi network I was actually authorizing the whole bunch of people that were connected to it with me. How do you avoid this, or is it just not important?
replies(5): >>45666786 #>>45666828 #>>45667520 #>>45667566 #>>45676716 #
3. eastabrooka ◴[] No.45666781[source]
Its 2025, Just use Tailscale.
replies(1): >>45666830 #
4. ◴[] No.45666786[source]
5. sandblast ◴[] No.45666794[source]
I guess I have to implement the habit of checking such things, since I never assume such a possibility. I prefer this info to be at the top of the readme, though – much more information value than the logo that deceived me into thinking this is a mature project.

Regardless; what benefits this would have over Wireguard?

replies(2): >>45669068 #>>45675119 #
6. lucideer ◴[] No.45666797[source]
> This is ideal for homelab environments where you want to expose services to the internet without a persistent VPN connection, while minimizing your public-facing attack surface.

To an untrained eye, the wording here could be construed to imply that this is more secure than a VPN. Might be worth a reword to clarify why one might prefer it want to over a VPN.

replies(1): >>45676746 #
7. jamesbelchamber ◴[] No.45666805[source]
I guess at least they're being honest, but I would agree - there's a large delta between Al-assistance and Al-driven, and "vibe coding" is one step further (just accepting everything Al does without critique, so long as it "works").

Great for prototyping, really bad for exposing anything of any value to the internet.

(Not Anti-Al, just pro-sensible)

replies(2): >>45667301 #>>45667510 #
8. OJFord ◴[] No.45666828[source]
It shouldn't be your only layer of security, and then it's not important. Think of it as replacing explicit IP black/whitelisting - you still want a login wall or something, but now you restrict access to guess logins or otherwise obtain access through app vulnerabilities etc.
9. lucideer ◴[] No.45666830[source]
If you're running a homelab, the likelihood that you're interested in removing cloud-dependencies from your stack is above average. If that's the case, Tailscale is out.

Tailscale is just an added unnecessary external dependency layer (& security attack surface) on top of vanilla Wireguard. And in 2025 it's easier to run vanilla Wireguard than it's ever been.

replies(4): >>45666870 #>>45667234 #>>45670582 #>>45672775 #
10. yaris ◴[] No.45666860[source]
The authentication part does not look much different from password authentication (key ≈ password), and the "Configurable TTL" bit is somewhat confusing, the first part of the sentence assigns the TTL to API keys but the second part says it applies to IPs being whitelisted. I would expect that TTL for a key means that after the TTL expires the key itself becomes unusable.
replies(1): >>45676749 #
11. aspenmayer ◴[] No.45666870{3}[source]
Also, Headscale exists.
replies(1): >>45666969 #
12. TZubiri ◴[] No.45666900[source]
Port knocking is a very hacky technique that was used:

1- In the 90s were security was whatever

2- In modern days as a way to keep your logs squeaky clean ( although you get 99% there with custom ports)

3- As a cute warm up exercise that you code yourself with what's available in your system. (iptables? a couple of python scripts communicating with each other?)

It's not a security mechanism, and downloading external dependencies or code (especially if vibecoded) is a net loss (by a huge margin).

It's also a waste of time to overengineer for the reasons noted above, I've seen supposedly encrypted port knocking implementations. It feels as if someone had a security checklist and then a checklist for that checklist.

replies(1): >>45667078 #
13. abujazar ◴[] No.45666911[source]
Nowadays public facing client IPs are often shared by thousands of users behind CGNAT. IP based firewall rules are useful when the peers have their own static IP address, but provide no real security when the IP address is shared.

This is vibe coded security through obscurity, i. e. quite useless. Use Tailscale or a self hosted VPN.

replies(1): >>45667308 #
14. lucideer ◴[] No.45666969{4}[source]
I haven't tried Headscale but isn't it more complicated than Wireguard?

The selling point of Tailscale is that they simplify Wireguard UX by adding a proprietary control server - this adds complexity to the stack (extra component) but simplifies user experience (Tailscale run the control server for you).

Headscale seems like it's complicating the stack (adding an extra component) as well as complicating the user experience (you have to maintain two components yourself now instead of just the one Wireguard instance).

Granted I presume the Headscale control server might simplify management of your Wireguard instance but... you're still maintaining the control server yourself.

replies(3): >>45666998 #>>45667111 #>>45675246 #
15. imiric ◴[] No.45666994[source]
Neat project, thanks for sharing. I'll stay away since it was vibecoded, but I appreciate the honesty.

Though this is not technically a "knocker", but a typical token-based auth gateway. I experimented with something similar recently as well, and think it has its use cases.

But I would agree with some of the comments here. If you need to expose many services to the internet, especially if their protocols are not encrypted, then a tunneling/mesh/overlay network would be a better solution. I was a happy tinc user for several years, and WireGuard now fills that purpose well. As much as people use solutions like Tailscale, ZeroTier, etc., I personally don't trust them, and would prefer to roll my own with WG. It's not that difficult anyway.

There's also Teleport, which is more of an identity-aware proxy, and it worked well last time I tried it, but I wouldn't use it for personal use.

16. aspenmayer ◴[] No.45666998{5}[source]
It likely does add some complexity, though it’s relative. Self-hosting is always going to have some overhead. Managing WireGuard servers and clients and associated keys etc is probably the part that is most annoying, so I can see how it might be easier to throw that over the fence to Headscale even though it is introducing another dependency.

I was speaking more to doing it all in-house, versus outsourcing things to Tailscale, a third party not fully under one’s control, even if they act of behalf of the user. I think I largely agree with what you said.

replies(1): >>45667151 #
17. Halan ◴[] No.45667049[source]
IP based exclusion should not be considered a security measure, not even for a low risk environment like a home lab
replies(1): >>45667093 #
18. imiric ◴[] No.45667078[source]
There's nothing "hacky" about port knocking. It was never meant to be a complete security solution—nothing is.

But it works very well as an additional layer of security. Sec nerds often scoff at "security through obscurity", but it is a very valid strategy. Running sshd on a random high port is not inherently more secure, but it avoids the vast majority of dumb scanners that spam port 22, which is why all my systems do that. Camouflage is underrated, yet wildly effective. You can see how well it works in nature.

In any case, this is not a port knocking solution anyway, as I mentioned in another comment.

replies(1): >>45671790 #
19. password4321 ◴[] No.45667093[source]
> IP based exclusion should not be considered a security measure

Apologies in advance if I'm missing something obvious here, but are you saying an IP allow list is not a standard security practice? If so I'd appreciate further explanation.

replies(1): >>45667470 #
20. reedf1 ◴[] No.45667111{5}[source]
It's much simpler to babysit a service than to manage a relatively higher risk thing like generating, rotating and communicating public keys between all of the nodes in the network.
21. lucideer ◴[] No.45667151{6}[source]
Fwiw I bought an Asus router that came with Wireguard pre-installed & has a nice management UI. It handles client onboarding via a simple QR code that integrates with the Wireguard mobile app - even my mother had no issue setting it up.

Buying hardware is an investment (& not something everyone can do) but I've really never understood the point of the control server from the perspective of an open-source self-hoster (for a business like Tailscale it makes sense as it introduces an element of control, user dependency & likely analytics of some value).

There's still a lot that can be done to improve Wireguard's UX but I think the Asus example proves it can be done well. Headscale seems to be doing the worst of both worlds (promoting an architecture & user-flow of a proprietary closed-source competitor, while still requiring CLI setup & instance maintenance). For example, it seems to me like it would be better for them to wrap Wireguard directly & integrate with the actual Wireguard mobile app instead of having people install proprietary Tailscale app on their phones to use your own open-source self-hosted control server.

replies(1): >>45667186 #
22. scottydelta ◴[] No.45667182[source]
When every problem seems like a nail then every solution you come up with is a hammer.

This is what it feels like people using AI for everything.

AI is not good at telling you best solution but it will tell you that you can build it yourself since that approach is what AI is good at.

Using self hosted vpn, cloudflare zero trust or Tailscale is the easiest way to go.

I self host extensively and have multiple self hosted VPN(OpenVPN and WireGuard) along with Tailscale and cloudflare protecting my infra.

replies(2): >>45669113 #>>45676680 #
23. aspenmayer ◴[] No.45667186{7}[source]
There’s a cost with using Asus firmware instead of using stock OpenWRT, which might even be compatible with your router. Many Asus products are compatible, and may even be running OpenWRT themselves. The upshot is you get a nice GUI and a nice out of the box experience, but you’re also phoning home to Asus in small ways, just like one would be if they ran Tailscale.

I would agree that stock WireGuard is going to have the fewest dependencies, and I don’t mean to nitpick or be disagreeable because I do agree with you, that fewer third party dependencies is usually better than more.

The Asus-Merlin firmware is also nice, though the stock Asus firmwares have gotten pretty good and work for most folks for many use cases. I think VLAN config and tagging support might be one of the only features I wanted that stock Asus firmware didn’t handle when I used them last.

replies(1): >>45667858 #
24. ohyoutravel ◴[] No.45667219[source]
More adoption and proliferation of vibe coded apps like yours and the OPs is going to end up being a major disaster. I find it strange for you to say you “released” this when, in the modern era, what you linked is the equivalent of a pastebin bash script.

In your case, it looks like ChatGPT has barfed more lines of readme than lines of code!

replies(1): >>45667478 #
25. fragmede ◴[] No.45667234{3}[source]
It exists on a spectrum. Time for hobbies including homelabbing is limited, so while someone who's retired and has all the time in the world to tinker can go self host every last single thing, I'd bet that more people just want to be able to have something that works without a huge depency on the cloud. As long as the bits are on the hard drive in my basement, how the packets get routed around is less critical, to some people, I imagine.

Everybody's got their own set of beliefs and understandings, and they get to decide how they want their homelab to work.

For me, tailscale fits in just right. Others can come to their own conclusion based on how they feel about networking and points of failure and depency and all that.

26. nextlevelwizard ◴[] No.45667301{3}[source]
Github should have "LLM" as language for repos that self report to be vibe coded or at least this kind of disclosure should be at the top of the readme not after thought.

Also the "If you're Anti-AI please don't use this." is pretty funny :D I guess I must be "Anti-AI" when I think this kind of code is wild to rely on.

replies(1): >>45667404 #
27. nextlevelwizard ◴[] No.45667308[source]
It could be fun extra layer. Like of course you should always use VPN, but maybe a magic packet so your VPN server even opens a port could be fun.
28. foofoo12 ◴[] No.45667322[source]
Also FWIW, if you're using nftables you can set up port knocking: https://wiki.nftables.org/wiki-nftables/index.php/Port_knock...
29. giantg2 ◴[] No.45667334[source]
Aw man, I thought this was going to be audio sensor that logs you in with a secret physical knocking pattern (like on a door or desk).
replies(2): >>45667426 #>>45668717 #
30. Eisenstein ◴[] No.45667404{4}[source]
I fully support the AI self-disclosure, but what I wonder what it is about AI generated code that makes this a separate problem from any other code where you don't know the programmer's competence?

Is it because the AI can generate code that looks like it was made by a competent programmer, and is therefore deceiving you?

But whatever the reason, I think that if we use it as a way to shame the people who do tell us then we can be assured that willingness to disclose it going forward will be pretty abysmal.

replies(3): >>45667444 #>>45667503 #>>45676482 #
31. WJW ◴[] No.45667425[source]
I had hoped this would allow me to use various patterns of knocking on my desk to perform system actions. Do the cut-and-a-hair-shave knock to log in, or taptaptaptap-wait-tap to lock the screen, etc. Maybe with two microphones you could even distinguish between left and right handed knocks.

...now I'll have to make this myself.

replies(2): >>45667598 #>>45667669 #
32. jedimastert ◴[] No.45667426[source]
That's what I thought was well, like a Morse code detector tied to the lock on the door or something lol
replies(1): >>45667533 #
33. abujazar ◴[] No.45667470{3}[source]
It's useful when the client always has its own static IP that _doesn't change_ between sessions. In this case, where the public facing IP may be shared by thousands of users, it provides no real security. All you'd have to do to gain access would be getting the client IP and finding some way of getting on the same network. Which in many cases could be as easy as subscribing to the same cell network or other ISP, or connecting to the guest wifi network of an office building.
replies(1): >>45667717 #
34. felixandersen ◴[] No.45667478{3}[source]
I'm sorry it didn't resonate with you. The accusation of vibe coding is a bit discouraging, but I don't feel the need to prove anything. I built this in my spare time and shared it in case it's useful to others.

Some of the most helpful code I've used in my career started out as quick scripts or pastebin snippets.

Yes, I used AI to help with the documentation, but I also put in time to edit it and make sure it clearly explains the concept.

35. muvlon ◴[] No.45667503{5}[source]
I think it makes sense for stuff that is fully AI generated to the point where you commit the prompts to git. At that point, they become the real "source code" and the generated code is more of a build artifact. It makes sense to tag the language as "LLM" instead of e.g. "Python" because that's what contributors will be expected to touch when interacting with the codebase.
36. xenophonf ◴[] No.45667510{3}[source]
> Great for prototyping

I must be Doing It Wrong(TM), because my experience has been pretty negative overall. Is there like a FAQ or a HOWTO or hell even a MAKE.MONEY.FAST floating around that might clue me in?

replies(1): >>45670979 #
37. teddyh ◴[] No.45667520[source]
It’s the third option: Port knocking is stupid.

<https://news.ycombinator.com/item?id=39898061>

replies(1): >>45668241 #
38. luc_ ◴[] No.45667533{3}[source]
Maybe I'll vibecode that this weekend...
39. TuxPowered ◴[] No.45667566[source]
> How do you avoid this

IPv6 of course.

> or is it just not important

Port knocking not a security feature anyway.

40. spicybright ◴[] No.45667598[source]
I was thinking exactly the same thing. Or maybe a knock on the door before you enter to set stuff in your room to a certain state.
41. V__ ◴[] No.45667638[source]
> If you're Anti-AI please don't use this.

I'm pro security. The gall to put something out there, pretend it being vibe coded is not a big deal and possibly exposing hundreds of people to security issues. Jesus.

replies(1): >>45676663 #
42. Dilettante_ ◴[] No.45667669[source]
>Cut-and-a-hair-shave knock

TIL that that has a name.[1] All I ever knew it as was "the knock from Roger Rabbit".

[1]https://en.wikipedia.org/wiki/Shave_and_a_Haircut

43. dugite-code ◴[] No.45667699[source]
I use fwknop in a similar manner, the main advantage it has is it's using an encrypted UDP packet. It's ability to call shell scripts for more advanced uses is its best feature. I have a packet set up for a rolling restart of all my services as well as ssh access
replies(1): >>45672510 #
44. password4321 ◴[] No.45667717{4}[source]
Thanks for filling in the details. I agree that an IP allow list works best for users who are alone on an IP that doesn't change often, which is the case for a majority of home internet users but not when they're away from home.
replies(1): >>45668699 #
45. lucideer ◴[] No.45667858{8}[source]
I'm on Merlin currently but I'm in the process of moving over to OPNSense for this exact reason.

However, while you can never really trust anything you run with internet access, I feel there's a fundamental line between an explicitly cloud-dependent service like Tailscale (e.g. a Tailscale control server outage incident would impact your home server access) compared to a fully self-hosted service that may or may not phone home if you don't put preventative measures in front of it, but will continue to function fine if you do put said measures in place.

The Asus mobile app is another potential concern but the Merlin browser UI is fine for most purposes.

replies(1): >>45671646 #
46. RickJWagner ◴[] No.45667944[source]
Somebody must tell Mel Brooks about this.
replies(1): >>45672221 #
47. symbogra ◴[] No.45668241{3}[source]
I implemented port knocking couple decades ago as a teenager and it was stupid then too.
48. sanex ◴[] No.45668320[source]
It's open source. Audit it like you would any other service that exposed your homelab to the Internet. How do you know XYZ repo isn't coded for some bootcampers capstone project? I bet those are even less secure.

Edit: should have mentioned I am a bootcamp grad, not just throwing random shade.

replies(2): >>45668415 #>>45669044 #
49. QuantumNomad_ ◴[] No.45668415{3}[source]
> How do you know XYZ repo isn't coded for some bootcampers capstone project?

I gate access to my homelab using Wireguard.

Wireguard is widely deployed across the world, and has been worked on for years.

No random new repo that was vibe coded can measure up in the slightest to that.

50. tptacek ◴[] No.45668433[source]
I will never, ever understand this "single-packet authentication" "port knocking" fetish. It has never made sense. Bin it, along with fail2ban, and just set up WireGuard.

Your network authentication should not be a fun game or series of Rube Goldberg contraptions.

replies(7): >>45668640 #>>45668974 #>>45669023 #>>45672079 #>>45672470 #>>45673304 #>>45676649 #
51. mdhb ◴[] No.45668640[source]
I mostly agree.. there’s a couple of very specific scenarios where maybe something like knockd makes sense I think but they are all scenarios where you’re doing things covertly, not as a general authentication mechanism.

As a side note I just happen to be reading a book at the moment that contains a fairly detailed walkthrough of the procedure required to access the Russian SVRs headquarters in New York in 1995.

Think of this as an analogue version and in no way a perfect analogy but it does include a step that has more or less the same security properties as this… anyways here’s a relevant quote:

“After an SVR officer passed through various checkpoints in the mission’s lower floors, he would take an elevator or stairs to an eighth-floor lobby that had two steel doors. Neither had any identifying signs.

One was used by the SVR, the other by the GRU. The SVR’s door had a brass plate and knob, but there was no keyhole. To open the door, the head of the screw in the lower right corner of the brass plate had to be touched with a metal object, such as a wedding ring or a coin.

The metal would connect the screw to the brass plate, completing an electrical circuit that would snap open the door’s bolt lock and sometimes shock the person holding the coin.The door opened into a small cloakroom. No jackets or suit coats were allowed inside the rezidentura because they could be used to conceal documents and hide miniature cameras.

SVR officers left their coats, cell phones, portable computers, and all other electronic devices in lockers. A camera videotaped everyone who entered the cloakroom. It was added after several officers discovered someone had stolen money from wallets left in jackets. Another solid steel door with a numeric lock that required a four-digit code to open led from the cloakroom into the rezidentura.

A male secretary sat near the door and kept track of who entered, exited, and at what times. A hallway to the left led to the main corridor, which was ninety feet long and had offices along either side. ”

Excerpt from Comrade J by Pete Earley

As another funny side note… I once discovered years ago that the North Koreans had a facility like this that they used to run a bunch of financing intelligence operations using drugs in Singapore where I was at the time and thought it would be funny to go and visit. It was in a business complex rather than a dedicated diplomatic facility from memory. But as I recall it was a similar scenario of unmarked door with no keyhole.

replies(2): >>45668751 #>>45669171 #
52. yccs27 ◴[] No.45668699{5}[source]
Unfortunately there's an increasing number of home internet connections behind CGNat, as IPv4 adresses run out (and IPv6 doesn't gain momentum, heaven knows why)
replies(2): >>45669294 #>>45672929 #
53. lugarlugarlugar ◴[] No.45668717[source]
https://www.youtube.com/watch?v=zE5PGeh2K9k&list=PL6AGg52_Gz...
54. tptacek ◴[] No.45668751{3}[source]
WireGuard is designed to be silent preceding a cryptographically authenticated INIT message. It's a superset of whatever security features you'd get from "knocking".
replies(2): >>45668801 #>>45668839 #
55. mdhb ◴[] No.45668801{4}[source]
I’m not arguing with you or pretending to not know the difference. I’m saying that is the right answer 999/1000 but there are other scenarios as well.
56. akerl_ ◴[] No.45668839{4}[source]
In fairness, most of the fervor for these kind of knock-based flows predate Wireguard existing. They come from the era where OpenVPN and friends were the common practice in that space, and I would not have considered "add OpenVPN" to be a rational way to improve the security of anything I was doing.
replies(1): >>45671686 #
57. hatradiowigwam ◴[] No.45668974[source]
Fail2ban is not in the same realm as port knocking, and to "bin it" would be foolish security posture at best, and negligent at worst.
replies(2): >>45669348 #>>45669979 #
58. slightwinder ◴[] No.45669023[source]
Every door you close, is one less someone can break.

Every complex services running, is a door someone can potentially break. Even with the most secure and battle tested service, you never know where someone fucked up and introduced an exploit or backdoor. Happened too often to be not a concern. XZ Utils backdoor for example was just last year.

> Your network authentication should not be a fun game or series of Rube Goldberg contraptions.

If there is no harm, who cares...

replies(1): >>45669312 #
59. OrderlyTiamat ◴[] No.45669044{3}[source]
If I had to audit security services for exposing homelab to the internet, I wouldn't use those services in the first place. I'm fine trying things out, but this is a very important security boundary, and it's a solved problem. Why risk it with an auditor who does it for a hobby (me)?
60. gregoriol ◴[] No.45669068{3}[source]
Github should have a tag about it on projects
61. OutOfHere ◴[] No.45669113[source]
If you're getting people to rely on external dependency services, e.g. Cloudflare or Tailscale, then you're a part of the problem, not the solution!
62. nati0n ◴[] No.45669171{3}[source]
Enjoyed the read, thanks for passing along. What book is it from?
replies(1): >>45669216 #
63. mdhb ◴[] No.45669216{4}[source]
Comrade J by Pete Earley
64. abujazar ◴[] No.45669294{6}[source]
I guess it's partially because ISPs are perfectly happy selling crippled internet connectivity as the base service and charging hefty premiums for "luxuries" like static IPs. It has also become common to only offer static IPs to business customers.
65. mdhb ◴[] No.45669312{3}[source]
Just to be super clear.. using this in place of something like WireGuard is absolutely not an improvement. It’s actively worse in the majority of scenarios assuming you can manage to secure your keys.
replies(2): >>45669572 #>>45671802 #
66. mdhb ◴[] No.45669348{3}[source]
I’m not super familiar with the intricacies of fail2ban and don’t currently understand why op made that claim but would very much like to know more because he is talking about a topic he is highly regarded for and I respect that. I just don’t have the context.
replies(2): >>45670625 #>>45671161 #
67. slightwinder ◴[] No.45669572{4}[source]
Yes, of course, should this just be an optional gadget for a setup, which is already as safe as possible for the situation. After all, when the port has been opened, your setup is also open for attacks. The knockers purpose is to reduce the timeframe of when your system is accessible for attackers.
68. tptacek ◴[] No.45669979{3}[source]
No, fail2ban is cargo cult security, and if you actually "need" it, you've misconfigured your system. Don't allow password authentication.
replies(3): >>45670325 #>>45673312 #>>45673525 #
69. mondainx ◴[] No.45670183[source]
Sorry, but I felt a bit of nostalgia here; I wrote some port knocking code a couple decades ago, this is straight-up "neat" and I'm surprised it is still around.
70. ◴[] No.45670325{4}[source]
71. bakugo ◴[] No.45670582{3}[source]
Normally I'd agree with the philosophy, but I don't really see how you can say this about vanilla Wireguard in particular considering how involved it is, especially if you have more than 2 devices that you want to connect together.

Not only do you need to manually manage the keys for each device and make sure they're present in every other device's configuration, but plain Wireguard also cannot punch through NATs and firewalls without any open ports like Tailscale can, as far as I know.

Combine that with the fact that networking issues can be some of the hardest to diagnose and fix, and something like Tailscale becomes a no-brainer. If you prefer using plain Wireguard instead, that's fine, and I still use it too for some more specific use cases, but trying to argue that Tailscale is entirely unnecessary is just wrong.

replies(2): >>45673797 #>>45679682 #
72. Joel_Mckay ◴[] No.45670625{4}[source]
Port-knocking mainly mitigates slow distributed-brute-force login attacks, and works best when ports are interleaved with several tripwire black-hole and knock-port-close firewall rules.

Use-cases:

1. helps auto-ban hosts doing port-scans or using online vulnerability scanners

2. helps reduce further ingress for a few minutes as the hostile sees the site is "down". Generally, try to waste as much of a problem users time as possible, as it changes the economics of breaking networked systems.

3. the firewall rule-trigger delay means hostiles have a harder time guessing which action triggered a IP ban. If every login attempt costs 3 days, folks would have to be pretty committed to breaking into a simple website.

4. keeps failed login log noise to a minimum, so spotting actual problems is easier

5. Easier to forensically analyze the remote packet stream when doing a packet dump tap, as only the key user traffic is present

6. buys time to patch vulnerable code when zero day exploits hits other hosts exposed services

7. most administrative ssh password-less key traffic should be tunneled over SSL web services, and thus attackers have a greater challenge figuring out if dynamic service-switching is even active

People that say it isn't a "security policy" are somewhat correct, but are also naive when it comes to the reality of dealing with nuisance web traffic.

Fail2ban is slightly different in that it is for setting up tripwires for failed email logins, and known web-vulnerability scanners etc. Then whispering that IP ban period to the firewall (must override the default config.)

Finally, if the IP address for some application login session changes more than 5 times an hour, one should also whisper a ban to the firewalls. These IP ban rules are often automatically shared between groups to reduce forum spam, VoIP attacks, and problem users. Popular cloud-based VPN/proxies/Tor-exit-nodes run out of unique IPs faster than most assume.

Have a nice day, =3

replies(3): >>45671078 #>>45671584 #>>45671674 #
73. eitland ◴[] No.45670979{4}[source]
No. You have just missed the two last steps. Here is the full explanation, and it is the same as it has always been on HN:

1. Make prototype

2. Magic happens here

3. Make lots of $$$

Great for prototyping only makes it easier to get to step 2, but done correctly, it certainly does that.

As proven by the nice app I have running on my laptop, but probably won't make any money from.

74. akerl_ ◴[] No.45671078{5}[source]
If a slow brute force attack is working on your system, all the port knocking and tripwires and whatever are just gimmicks.

Don’t waste resources putting lipstick on the pig.

replies(1): >>45671327 #
75. ◴[] No.45671161{4}[source]
76. Joel_Mckay ◴[] No.45671327{6}[source]
Stolen password-less key bots are also common these days, and again it is more about reducing log noise.

"Don’t waste resources putting lipstick on the pig."

I would never kink-shame someone that ignored the recent CVE-2025-48416, that proved exposing unprotected services is naive =3

replies(1): >>45671578 #
77. trashb ◴[] No.45671479[source]
The way I see it, port knocking may not be a valid security measure but it can be a good filter. It will allow you to filter out port scanning and other mass cracking attempts.

My opinion is that being able to filter out noise and false positives from authentication logs allows you to improve your actual security measures.

An other advantage is that it may hide information about your system making it harder for an attacker to target you based on a broad scan without doing some (usually detectable) targeted reconnaissance first. For example imagine someone found a 0-day in one of the services behind the port-knock and is scanning for the vulnerable version.

It does however add another cog in the machine that may break.

replies(1): >>45671498 #
78. ◴[] No.45671498[source]
79. akerl_ ◴[] No.45671578{7}[source]
If somebody has a stolen credential, they aren’t going to be brute forcing at all. Likewise that CVE wouldn’t be attacked by a brute force attack.

But I see you’ve backpedaled to this being about log noise, not security.

replies(1): >>45671926 #
80. frumplestlatz ◴[] No.45671584{5}[source]
This is a metric ton of completely pointless theater.

Your services should simply be unreachable over anything but wireguard (or another secure VPN option).

replies(2): >>45672039 #>>45672104 #
81. aspenmayer ◴[] No.45671646{9}[source]
> However, while you can never really trust anything you run with internet access, I feel there's a fundamental line between an explicitly cloud-dependent service like Tailscale (e.g. a Tailscale control server outage incident would impact your home server access) compared to a fully self-hosted service that may or may not phone home if you don't put preventative measures in front of it, but will continue to function fine if you do put said measures in place.

This is why I mentioned Headscale in the first place. It’s not for everyone or every use case, but it’s good that it exists, on the whole.

82. mdhb ◴[] No.45671674{5}[source]
I recently wrote a deception / honeypot service that does some similar stuff so that all makes sense to me and I think the general strategy of impose costs on attackers by making them expose more of their infrastructure etc are actually a really good move especially in the context of developing an early warning signal.

I had some additional logic that gave me a really easy but unintuitive way to tell with an incredibly high degree of confidence the difference between a bot and a human on keyboard scenario and for what it’s worth I think that is the specific thing that makes it worth the effort.

If I have reasons to suspect it’s a bot I just drop the request and move on with my day. The signal to noise ratio isn’t worth it to me.

replies(1): >>45672092 #
83. frumplestlatz ◴[] No.45671686{5}[source]
OpenVPN was a perfectly reasonable answer to this problem for many years.

“Port knocking” et al were most definitively not.

replies(1): >>45671866 #
84. frumplestlatz ◴[] No.45671790{3}[source]
It’s really, really not a valid strategy for anything. Just put your services behind WireGuard.
85. tptacek ◴[] No.45671802{4}[source]
Just to clarify: it's actively worse in every scenario. It's engineering malpractice.
replies(1): >>45679265 #
86. akerl_ ◴[] No.45671866{6}[source]
Eh. I've used OpenVPN over many years for many kinds of problems. I'm hesitant to call it perfectly reasonable even for the most mundane use case of "running an entirely vanilla virtual private network". For the use case of securely wrapping services in the way Wireguard can do, it's hilariously bad.

OpenVPN is basically 1000 configuration options and magic incantations wearing a trenchcoat, and if you get any of them wrong the whole thing crumbles (or worse, appears to work but is not secure).

87. Joel_Mckay ◴[] No.45671926{8}[source]
Threat detection is a higher security priority than prevention in my experience.

One may believe whatever they like, as both our intentions are clear friend.

Have a wonderful day =3

replies(1): >>45671967 #
88. akerl_ ◴[] No.45671967{9}[source]
It's weird to assign them comparatively like that but also, what does that have to do with fail2ban?

The roving spam it blocks are not threats, and stolen credentials aren't going to be detected by it.

replies(1): >>45672371 #
89. Joel_Mckay ◴[] No.45672039{6}[source]
Depends on the use-case, IPsec is often not supported by many LANs. Also, network crossing is 1 badly configured client away from full infrastructure worming.

At some point, the idealism of white-listed pears and VPN will fail due to maintenance service costs. Two things may be true at the same time friend. =3

https://www.poetry.com/poem/101535/the-blind-men-and-the-ele...

replies(1): >>45672313 #
90. fencepost ◴[] No.45672079[source]
Knocking can cut down on grinding. I have in the past created setups where you had to knock prior to establishing a VPN connection, and given the semi-regular problems with VPN implementations I really don't feel bad about that. Fortigate, Sonicwall, Cisco, Ivanti, etc - sure a big part of it is "don't run VPNs based on big legacy codebases" but who's to say there won't be implementation problems found (or introduced given "Jia Tan" style attacks) in Wireguard?

Is knocking incredibly weak security through obscurity? Sure, but part of what it does is cut down on log volume.

replies(1): >>45672341 #
91. Joel_Mckay ◴[] No.45672092{6}[source]
I would simply bounce these users to a video game site, that paid us for referrals.

So we made coffee-money wasting spammers time, and attacks stayed rudimentary. =3

92. fencepost ◴[] No.45672104{6}[source]
"We had a secure VPN option set up, but then we had to replace our Ivanti VPN solution so we switched to Fortigate. Then there were some concerns so we jumped to Sonicwall. After that debacle we finally got the budget to go with Cisco and I'm sure everything will be fine now!"
replies(2): >>45672297 #>>45675478 #
93. SoftTalker ◴[] No.45672221[source]
Yeah the urge to post a "What Knockers!" Gene Wilder gif is strong. Good thing HN doesn't allow that.
94. frumplestlatz ◴[] No.45672297{7}[source]
I said a secure VPN option.

However, even with all those choices, “port knocking” still wouldn’t be a solution for anything.

[edit]

Are you just searching for random WireGuard CVEs now?

CVE-2024-26950 was a *local-only* DoS and potential UaF requiring privileged access to wireguard netlink sockets.

replies(1): >>45672540 #
95. frumplestlatz ◴[] No.45672313{7}[source]
Yes, and those two true things are:

- You should be using WireGuard.

- “Port knocking” is pointless theater.

replies(1): >>45672524 #
96. tptacek ◴[] No.45672341{3}[source]
There is literally no value to cutting down on WireGuard attempts. Like, the exact same set of skbuffs are being created and destroyed in either case.
replies(1): >>45675501 #
97. Joel_Mckay ◴[] No.45672371{10}[source]
In general, bots/worms/clowns will first check if a host/router is already infected or vulnerable to a shim. Thus, tripwires on those checks or URI often auto-ban infected/hostile hosts before a scan fully escalates to a successful payload. Note, people don't want a VM delta-snapshot of their zero-day around for automated analysis.

99.98% of hostile traffic simply reuse already published testing tools, or services like Shodan to target hosts.

One shouldn't waste resources guessing the motives behind problem traffic. =3

replies(1): >>45674314 #
98. dawnerd ◴[] No.45672456[source]
It’s getting scary how many security related apps are being vibe coded by people with very little security experience (not a knock heh on op, they could very well be experienced).
99. sneak ◴[] No.45672470[source]
I view port knocking as just a very, very poor form of an unencrypted PSK (replayable) authentication step.

Just skip the plaintext password (the sequence of ports transmitted) and use certificate based auth, as you note below.

replies(1): >>45672489 #
100. tptacek ◴[] No.45672489{3}[source]
It's part of a long line of cargo culted security things people do because it makes them feel on-the-ball; they're all anti-tiger rocks. Even before WireGuard, port knocking never made sense, and for most of its history it was actively harmful.
101. sneak ◴[] No.45672510[source]
I use this thing called sshd that listens on only a single port and its main advantage is that it uses actual cryptography to authenticate using a client keypair.
replies(1): >>45673193 #
102. Joel_Mckay ◴[] No.45672524{8}[source]
CVE-2024-26950 is also true, and while I respect your opinion... a VPN has a lot of additional links in the chain trivially broken by competent hostiles or incompetent client installations.

IPSec is simply a luxury unavailable on some LANs =3

replies(1): >>45676070 #
103. Joel_Mckay ◴[] No.45672540{8}[source]
You mean CVE-2024-26950 ? =3

<edit>

Firewall administrative network port traffic priority is important for systems under abnormal stress.

replies(1): >>45672942 #
104. sneak ◴[] No.45672775{3}[source]
Not really. Most things people run in homelabs have tons of cloud dependencies. Try running Home Assistant offline, for example.
replies(1): >>45673059 #
105. ianburrell ◴[] No.45672929{6}[source]
IPv4 addresses have run out, everything has been allocated, and they are now being traded.

IPv6 is slowly growing in popularity. Google stats are close to 50%. If your ISP has IPv6, you might be accessing Hacker News with IPv6 since they added support recently.

106. ◴[] No.45672942{9}[source]
107. lucideer ◴[] No.45673059{4}[source]
I run home assistant offline. I've never encountered any issues, except for the little weather widget that comes enabled by default not working.

I know there's plenty of HA integrations that require some cloud service but the core application is very offline-friendly...

108. dugite-code ◴[] No.45673193{3}[source]
Fwknop uses HMAC keys so quite good crypto by itself, but it's for single shot commands. Good for keeping the ssh port locked until you actually need it. I use it on top of SSH key pairs as part of my layered security, Just as any good access control strategy should.
109. trelane ◴[] No.45673304[source]
Do you have a guide to using wireguard in this way?
replies(1): >>45673329 #
110. dugite-code ◴[] No.45673312{4}[source]
IMHO Fial2ban, just like port knocking, isn't cargo cult security. They are a single tool that can be included in a general system security arsenal, not the only tool you should use but one of a suite of tools that can be used depending on what you want to achieve.

Personally I use fwknop for port knocking as it doesn't suffer from replay attacks as it's an encrypted packet. But still serves the same niche

replies(1): >>45674206 #
111. tptacek ◴[] No.45673329{3}[source]
Using WireGuard in what way? WireGuard defaults to the security posture SPA/port knocking hopes to asymptotically achieve.
replies(1): >>45673364 #
112. trelane ◴[] No.45673364{4}[source]
> Using WireGuard in what way?

Using WireGuard to gate access to a server. It looks like it's a VPN, not an access control mechanism. So I am curious how this works.

replies(3): >>45673372 #>>45673417 #>>45675523 #
113. tptacek ◴[] No.45673372{5}[source]
Set up WireGuard, filter everything but WireGuard (51820/udp) on en0, and then SSH in over the WireGuard connection.
114. akerl_ ◴[] No.45673417{5}[source]
WireGuard is sort of a VPN, but really its core is peer to peer links with simple, footgun-resistant configs.

The most mundane setup is two peers with each other’s public keys that let each peer talk to the other via the WireGuard link.

115. wolrah ◴[] No.45673525{4}[source]
They can't get in but they can still fill my logs up, so fail2ban cuts them off after a few failures.

Also by collecting data on the IP addresses that are triggering fail2ban I can identify networks and/or ASes that disproportionally host malicious traffic and block them at a global level.

replies(1): >>45673585 #
116. tptacek ◴[] No.45673585{5}[source]
Why bother logging them at all? What is this doing for you? You can't meaningfully characterize attacker traffic this way. They'll come from any AS they want to.
replies(3): >>45673825 #>>45675271 #>>45679180 #
117. muppetman ◴[] No.45673770[source]
Suggesting people don't shoot themselves with a loaded gun is not being a hater, it's being a good person.
118. lucideer ◴[] No.45673797{4}[source]
> trying to argue that Tailscale is entirely unnecessary is just wrong

Tailscale is great if it meets your requirements, & it probably does for most - I wasn't arguing that at all. Only that it won't be an option for everyone: in particular a non-tiny subset of home server hosters.

119. hrimfaxi ◴[] No.45673825{6}[source]
Don't compliance regimes like NIST 800-53 require logging access attempts, whether successful or not, and especially for privileged users?
replies(1): >>45674192 #
120. aborsy ◴[] No.45674033[source]
Wireguard port is the only port that could be exposed to the Internet.

With xz backdoor owning ssh, I wouldn’t completely trust ssh public key authentication either.

121. kazinator ◴[] No.45674175[source]
It has sequence diagrams so it must be a good idea.
122. akerl_ ◴[] No.45674192{7}[source]
> To balance monitoring and auditing requirements with other system needs, event logging requires identifying the subset of event types that are logged at a given point in time. For example, organizations may determine that systems need the capability to log every file access successful and unsuccessful, but not activate that capability except for specific circumstances due to the potential burden on system performance.

It's possible that some compliance regimes exist that mandate keeping logs of all unsuccessfully authentication attempts. There's surely a compliance regime out there that mandates every possible permutation of thing.

But the far more common permutation, like we see with NIST, is that the organization has to articulate which logs it keeps, why those logs are sufficient for conducting investigations into system activity, and how it supports those investigations.

replies(1): >>45676063 #
123. akerl_ ◴[] No.45674206{5}[source]
The point being made is that unless "what you want to achieve" is "run a tool that isn't improving your security posture", port knocking isn't providing value to the security model.

Hence the cargo cult.

replies(1): >>45675373 #
124. akerl_ ◴[] No.45674314{11}[source]
You're just sort of loosely interweaving unrelated comments?

You're back on prevention instead of detection, but also no: an attacker with valid creds isn't going to run other checks first before using them.

And yes: by volume, most attacks on the internet are just spam reusing published tools and IP lists. And that traffic is zero percent risky unless your auth is already busted.

replies(2): >>45675156 #>>45679219 #
125. parliament32 ◴[] No.45674733[source]
The "port knocking" has surfaced often since the early 2000s, but it continues to be a rather silly exercise in making security-by-obscurity look more complicated while not really helping all that much.

Briefly looking at the diagram at the top of the repo, it looks like you "knock" with an API key. Why not just run a reverse proxy in front of (whatever service you're trying to protect) and use the API keys there? To harden further, do some sort of real authentication (PKI, client certs). If you want your logs to look cleaner, install and actually configure fail2ban.

replies(1): >>45676726 #
126. dugite-code ◴[] No.45675119{3}[source]
Perhaps not requiring a wireguard client installed on the machine you are accessing from. There are several circumstances where installing a VPN client isn't possible or practical
127. ◴[] No.45675246{5}[source]
128. wolrah ◴[] No.45675271{6}[source]
> Why bother logging them at all? What is this doing for you?

Logging both successful and failed requests is important for troubleshooting my systems, especially the client-facing ones (a subset of which are the only ones that are accessible to the open internet), and failed authentication attempts are just one sort of request failure. Sometimes those failures are legitimate client systems where someone misconfigured something, and the logs allow me to troubleshoot that after the fact. That it can also be fed to fail2ban to block attackers is just another benefit.

> You can't meaningfully characterize attacker traffic this way. They'll come from any AS they want to.

Obviously in a world full of botted computers, IoT devices, etc. it's true that an attacker can hypothetically come from anywhere, but in practice at least from the perspective of a small service provider I just don't see that happen. I'm aware that you are involved with much larger scale operations than I'm likely to ever touch so perhaps that's where our experiences differ. No one's targeting my services specifically, they're just scanning the internet for whatever's out there and occasionally happen to stumble upon one of my systems that needs to be accessible to wherever my clients happen to bring their devices.

Sure, I see random domestic residential ISP addresses get banned from individual servers from time to time, but I never see the organized attacks I see which are usually coming from small hosting providers half way around the world from my clients. I have on multiple occasions seen fail2ban fire off rapidly sequential IP addresses like xxx.xxx.xxx.1 followed by xxx.xxx.xxx.2 then xxx.xxx.xxx.3, or in other cases a series of semi-random addresses all in the same subnet, which then triggers my network block and magically they're stopped instead of just moving on to another network. If I were to be packet sniffing on the outside of the relevant firewall I'm sure I'd see another address in the blocked network trying to do its thing but I've never looked.

129. dugite-code ◴[] No.45675373{6}[source]
I can't agree that it's "a tool that isn't improving your security posture", if it's a layer on top of other tools, you might argue it's effectiveness isn't great but to say it's effectively nothing is a reach.
replies(1): >>45675589 #
130. immibis ◴[] No.45675478{7}[source]
These are what I call, corporate solutions. They're used to make CEOs feel good while deflecting blame, not to actually do the job. See also how nobody gets blamed if AWS goes down, but everyone who used a different host with higher uptime did get blamed when that went down.

Open source tools are good at actually doing the job, as long as it's a programmer type of job. We've known how to do unbreakable encryption for decades now. Even PGP still hasn't been broken. Wireguard is one of those solutions in the "so simple it has obviously no bugs" category - that's actually what differentiates it from protocols like OpenVPN.

Think about the recent satellite listening talk at DEFCON and how that massive data leak could have been prevented by even just running your traffic through AES with a fixed key of the CEO's cat's name on a Raspberry Pi, but that's a non-corporate solution and so not acceptable to a corporation, who will only ever consider enabling encryption if it comes with a six figure per year license fee which is what the satellite box makers charged for it. Corporations, as a rule, are only barely competent enough to make money and no more.

replies(2): >>45676056 #>>45676120 #
131. immibis ◴[] No.45675501{4}[source]
Sure there is, if the attacker has to fulfil some basic obfuscation then it cuts down on the amount of crypto work you have to do before ignoring the packet.

It's not extra security but it is a little extra efficiency.

Wireguard has something like this built in though, the PresharedKey (which is in addition to the public key crypto, and doesn't reduce your security to the level of a shared-key system). It's still more work to verify that than a port knock however.

replies(1): >>45675965 #
132. immibis ◴[] No.45675523{5}[source]
It is a VPN. The point was to block all external traffic except for VPN traffic. Then make sure your VPN is secure, and you're all set. When you want to connect to some service, connect to the VPN first and then connect to the service through the VPN. Then all your traffic has actual security and not just some light obfuscation via secret handshake.

IMO, "only wireguard" is too restrictive of a policy - I also trust openssh and nginx to be open to the internet, if configured moderately carefully. Most FOSS servers that are widely deployed on the internet are safe to be deployed on the internet, or we'd know about it. I reviewed something that's not widely deployed on the internet though (Apache Zookeeper) and couldn't convince myself that every code path was properly checking authentication. That would have to go behind a VPN.

133. akerl_ ◴[] No.45675589{7}[source]
It’s not nothing: it’s one more thing that can break or eat resources or have a vuln. And it’s not improving the thread model. It’s net negative.
replies(1): >>45679213 #
134. NoPicklez ◴[] No.45675674[source]
"Knock Knock" kinda sounds like a cool name for an access control system
135. tptacek ◴[] No.45675965{5}[source]
This has no value at all. WireGuard assumes an adversary trying to make it do extra work doing handshakes; a big chunk of the WireGuard paper discusses it. I don't think this is as important a problem as Jason does (but it's his baby), but either way: part of the point of WireGuard is that it's safe to hang out on the open Internet this way.
136. tptacek ◴[] No.45676056{8}[source]
PGP has very much had breaks, both in its authenticator and a full-on confidentiality break for the mail plugins, both traceable to the structure of the system itself, and that's before we get into the fundamental DOS flaw that killed the keyservers, which themselves are an antifeature. I don't think you can find a practicing cryptography engineer to stick up for PGP.

I don't like or trust OpenVPN. I'd sooner expose OpenSSH itself, which has really a pretty stunning security track record.

replies(1): >>45676181 #
137. hrimfaxi ◴[] No.45676063{8}[source]
I was thinking of:

> The need to limit unsuccessful logon attempts and take subsequent action when the maximum number of attempts is exceeded applies regardless of whether the logon occurs via a local or network connection. Due to the potential for denial of service, automatic lockouts initiated by systems are usually temporary and automatically release after a predetermined, organization-defined time period.

https://csf.tools/reference/nist-sp-800-53/r5/ac/ac-7/

replies(1): >>45676142 #
138. tptacek ◴[] No.45676070{9}[source]
I don't understand what you think CVE-2024-26950 has to do with this thread. Do you understand what that vulnerability actually is, or did you just go search "WireGuard CVE" to find ammunition?
replies(1): >>45676141 #
139. Joel_Mckay ◴[] No.45676120{8}[source]
Cisco spent years marketing every solution as a router or appliance box.

A lot of VPN installations are simply done wrong, and it only takes 1 badly configured client or cloud side-channel to make it pointless. IPSec is not supported on a lot of LANs, and 5k users would prove rather expensive to administer.

Also, GnuPG Kyber will not be supported by VPN software anytime soon, but it would be super cool if it happens. =3

140. Joel_Mckay ◴[] No.45676141{10}[source]
Firewall administrative network port traffic priority is important for systems under abnormal stress.
replies(1): >>45676198 #
141. akerl_ ◴[] No.45676142{9}[source]
That’s almost always going to be a setting in your IDP, not based on log capture/retention.

The IDP will have some settings for max fails before lockout, and apply it by counting.

142. Joel_Mckay ◴[] No.45676181{9}[source]
The key concept is accountability, and if only 7 people have access to a host instance... the damage done by malicious or incompetent actors is kept small.

The biggest weakness in VPN is client-side cross-network leaks.

IPSec is simply a luxury if the LAN supports it, but also an administrative nightmare for >5k users. =3

143. tptacek ◴[] No.45676198{11}[source]
I don't know what this even means. Do you understand the vulnerability you cited? Can you explain it here?
replies(1): >>45676550 #
144. operrs ◴[] No.45676223[source]
If you need to manage risk for a legacy service that has a requirement to be internet exposed, I suggest checking out https://knocknoc.io/ for a self-hosted and/or cloud based solution that was not built with vibe coding, but actual customer security use cases. They provide 2FA and/or single sign-on to allow just in time access to internet exposed applications which remain hidden from unauthenticated/approved users.
145. GuinansEyebrows ◴[] No.45676482{5}[source]
there is a non-zero chance that the human programmer has an interest in producing correct, secure code. there is zero chance than an LLM has the same interest. maybe those two are closer together in some cases, but not in many others.
146. Joel_Mckay ◴[] No.45676550{12}[source]
The relatively benign legacy kernel level pointer-bug CVE chosen is hardly the worst thing from WireGuard or strongSwan over the years. However, it makes the point a priority reliable network side-channel administrative login is more robust under some use-cases.

Adding layers of complexity rarely improves security, and doesn't usually address the underlying issue of accountability. And I often ponder if a bastion host is even still meaningful in modern clouds. =3

replies(1): >>45676589 #
147. tptacek ◴[] No.45676589{13}[source]
The bug you cited is in Netlink. It's not exposed on the network. What's the "worse" thing you're referring to? I think you just searched "WireGuard CVE" and tried to play it off.
replies(1): >>45676813 #
148. fariszr ◴[] No.45676649[source]
I use tailscale for this. But I can't have two vps running at the same time on android, nor do I want to install tailscale on every device I own. I created knocker exactly for this reason.
149. fariszr ◴[] No.45676658[source]
I mean it's just using firewalld. You can't inspect the rules. For me it's simple enough that it shouldn't be a big security issue, but I understand and that's why I wrote that in the readme.
150. fariszr ◴[] No.45676663{3}[source]
I mean you are free to not use it, it's for personal use. I was annoyed by all the vpn based solutions and built knocker to have something that works without installing it on each and every device.
151. fariszr ◴[] No.45676680[source]
Tailscale is not as easy as this. It has to be installed on every device or at the router level.

And it will not work on mobile if you already use another VPN.

152. fariszr ◴[] No.45676716[source]
It's a compromise.It's not as secure as using a VPN, but it's way more convenient, since only one device has to have a knocker client on it without needing any sort of VPN.

The likelihood of someone is on the same network as you noticing your servic, try to hack it, before the TTL expires again is IMO quite low.

This is without taking into account that the services themselves have their own security and login processes, getting a port open doesn't mean the service is hacked.

153. fariszr ◴[] No.45676726[source]
> Why not just run a reverse proxy in front of (whatever service you're trying to protect) and use the API keys there?

Because it breaks the clients of most homelab services.

That's what authelia does.

154. fariszr ◴[] No.45676746[source]
Sorry if i wasn't clear. It isn't more secure, it's just more convenient because it works in every network, without needing to set up a VPN connection on each device.

I created this because I always have a VPN on my devices, and I can't have tailscale running with that, in addition to tailscale killing my battery life on android.

155. fariszr ◴[] No.45676749[source]
The TTL is for the whitelist. The whitelist rules aren't permanent.
156. fariszr ◴[] No.45676795[source]
Hey I'm the creator of knocker! I actually wanted to write a blog post about it before posting, but OP already did that. If you have any questions just let me know!

Will go into more details why I created in the blog post coming very soon! Just doing the final touches right now.

157. Joel_Mckay ◴[] No.45676813{14}[source]
In general, doing a qualitative summary of the projects impact is less helpful, and never as verbose as some would prefer on platform specific issues. Additionally, wireguard is now more popular than strongswan these days...

https://www.cve.org/CVERecord/SearchResults?query=ipsec

https://www.cve.org/CVERecord/SearchResults?query=wireguard

https://www.cve.org/CVERecord/SearchResults?query=strongswan

Best of luck, and straw-man arguments are never taken seriously. =3

replies(1): >>45676859 #
158. tptacek ◴[] No.45676859{15}[source]
This reads like a long-winded way of saying you aren't bothering to read what the vulnerabilities actually are.
replies(1): >>45677102 #
159. Joel_Mckay ◴[] No.45677102{16}[source]
>This reads like a long-winded way of saying you aren't bothering to read what the vulnerabilities actually are.

Almost, it is more that I don't care specifically why a IPSec option is often a liability, and would rather stick with something less silly.

Ad hominem attacks do not change the fact there are new issues in IPSec/VPN approaches found regularly. Pick any failure mode(s) on the list that applies to your specific use-case and platform.... or could find new ones if you are still bored.

Have a great day =3

https://www.youtube.com/watch?v=6vgoEhsJORU

160. Capricorn2481 ◴[] No.45679180{6}[source]
> You can't meaningfully characterize attacker traffic this way. They'll come from any AS they want to

I'm not totally following what Fail2Ban has to do with Wireguard. Are we talking strictly about homelabs you don't expose to the internet?

Because I have a homelab I can connect to with Wireguard. That's great. But there are certain services I want to expose to everybody. So I have a VPS that can connect to my homelab via Wireguard and forward certain domain traffic to it.

That's a safe setup in that I don't expose my IP to the internet and don't have to open ports, but I could still be DDOS'd. Would it not make sense for me to use Fail2Ban (or some kind of rate limiting) even if I'm using Wireguard? I can still be DDOS'd.

161. DaSHacka ◴[] No.45679213{8}[source]
How is it not improving the threat model to not have a service directly connected to the internet, but instead put behind a layer of protection?
162. Capricorn2481 ◴[] No.45679219{12}[source]
> And that traffic is zero percent risky unless your auth is already busted

Well it's a waste of our time and resources. I'm not just going to let people make 100 requests per second for no reason?

163. DaSHacka ◴[] No.45679265{5}[source]
I somehow doubt that it is quite truly worse in every single scenario, and that there is not one single scenario that port knocking may be better utilized than WireGuard.

I also find it hard to believe it is engineering malpractice to use one technology over another.

What happens if there is a vulnerability in WireGuard? Or if WireGuard traffic is not allowed in or out of a network due to a policy or security restriction?

164. Capricorn2481 ◴[] No.45679682{4}[source]
> but plain Wireguard also cannot punch through NATs and firewalls without any open ports like Tailscale can, as far as I know

I could be wrong, but I think Tailscale just does what you can do on Wireguard, which is `PersistentKeepAlive`. It lets a wireguard client periodically ping another to keep the NAT mapping open.