--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: RFP: fwknop -- Firewall Knock Operator - advanced port knock daemon
- From: Jari Aalto <jari.aalto@cante.net>
- Date: Sun, 17 Apr 2005 23:14:17 +0300
- Message-id: <E1DNG9p-0002Ko-Id@cante.cante.net>
Package: wnpp
Severity: wishlist
* Package name : fwknop
Version : 0.5.0
Upstream Author : Michael Rash <mbr@cipherdyne.org>
* URL : http://www.cipherdyne.org/fwknop/
* License : GPL
Description : Firewall Knock Operator - advanced port knock daemon
(Include the long description here.)
fwknop stands for "Firewall Knock Operator" and is a piece of software
that I released at the DEFCON 12 conference in July, 2004 in Las
Vegas: presentation slides
fwknop implements network access controls (via iptables) based on a
flexible port knocking mini-language, but with a twist; it combines
port knocking and passive operating system fingerprinting to make it
possible to do things like only allow, say, Linux-2.4/2.6 systems to
connect to your SSH daemon.
fwknop supports shared, multi-protocol port knock sequences along with
both relative and absolute timeouts, and coded port knock sequences
encrypted with the Rijndael block cipher.
Further reading:
http://www.cipherdyne.org/fwknop/dc_fwknop_slides.pdf
http://www.usenix.org/publications/login
http://www.usenix.org/publications/login/2004-12/index.html
http://it.slashdot.org/it/04/08/01/0436204.shtml
-- System Information:
Debian Release: 3.1
APT prefers unstable
APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.6.10-1-686
Locale: LANG=C, LC_CTYPE=C (charmap=ISO-8859-1) (ignored: LC_ALL set to en_US)
--- End Message ---
--- Begin Message ---
Hello,
This is an automatic mail sent to close the RFP you have reported or
are involved with.
Your RFP wnpp bug is being closed because of the following reasons:
- It is, as of today, older than 365 days.
- It hasn't had any activity recently.
As this is an automatic procedure, it could of course have something
wrong and probably it would be closing some bugs that are not
intended by owners and submitters (like you) to be closed, for
example if the RFP is still of your interest, or there has been
some kind of activity around it. In that case, please reopen the
bug, do it, DO IT NOW! (I don't want to be blamed because of
mass closing and not let people know that they can easily reopen
their bugs ;-).
To re-open it, you simply have to mail control@bugs.debian.org
with a body text like this:
reopen 305081
thanks bts
Further comments on the work done in the bug sent to
305081@bugs.debian.org would be truly welcomed.
Anyway, if you have any kind of problems when dealing with
the BTS, feel free to contact me and I'd be more than happy to help
you on this: <damog@debian.org>.
A similar process is being applied to other kind of wnpp bugs.
Thanks for your cooperation,
-- David Moreno Garza <damog@debian.org>.
--- End Message ---