Hi all. Just wondering if anyone else has done port knocking plus VPN tunnels for added security.
Here is what I am doing.
I’m using a few pings with set packet sizes to create a 2 knock address list that I will use to accept PPTP traffic. I timeout the access to the address list after 1 day. I schedule the ping script every 5 minutes so it maintains the proper IP addresses and any dynamic IP sites will get added to the list shortly.
my code is below.
Anyone else doing anything like this? Did I reinvent the wheel and/or is there a better way?
The goal is to tighten up security on the PPTP server and obfuscate the mechanism for creating a tunnel.
First, this is not obfuscation. Requiring a correct sequence of events or statements is by definition a password. This is a password consisting of specificing ‘words’ in a specific order within a specific timeframe. obfuscation would be changing the ports the pptp server ran on.
This does increase the security of pptp. Firstly, brute force password attacks are useless without knowing the knock code to first get through the front door. Secondly, a MS-CHAP hash attack might be able to recover the user and password for the pptp tunnel, but would still have to defeat the knock code to attempt a dial in.
OVPN on mikrotik sucks, it is TCP only and does not do the job. SSTP is junk, it is no good for site to site tunnels and is prone to drops on minor packet loss and takes to long to dial to recover from dropped packets. IPSEC is a pain because there is no tunnel interface.