A secure remote client/server terminal, written in Golang. Intended as a test-bed for experimental key exchanges and symmetric session crypto. Integrated traffic chaffing.
Go to file
Russ Magee c64797f2d9 Basic server-side recording of exitStatus of pty(cmd).
TODO: sending of exitStatus to client and client handling of said packet via
  a WritePacket() with unique existStatus op.
2018-06-29 16:54:20 -07:00
hkexpasswd Grr, added new Makefiles 2018-05-26 23:46:55 -07:00
hkexsh Attempts to handle disconnects better.. TODO: torture tests and implement exit status for -x commands 2018-06-26 20:14:43 -07:00
hkexshd Basic server-side recording of exitStatus of pty(cmd). 2018-06-29 16:54:20 -07:00
spinsult MSYS+mintty support; pkg renaming to hkexsh 2018-04-04 15:43:27 -07:00
LICENSE.gpl misc. cleanup, LICENSE.{gpl,mit} updates 2018-04-07 13:04:10 -07:00
LICENSE.mit misc. cleanup, LICENSE.{gpl,mit} updates 2018-04-07 13:04:10 -07:00
Makefile More Makefile fixes 2018-05-26 23:42:43 -07:00
README.md Updated README.md 2018-06-27 15:40:48 -07:00
herradurakex.go misc. cleanup, LICENSE.{gpl,mit} updates 2018-04-07 13:04:10 -07:00
hkexauth.go Got client hangup working again. Security scrub auth vars. 2018-05-04 23:25:26 -07:00
hkexchan.go -Added error checking for all stages of hkex.Conn.Accept() and GetStream() 2018-04-28 16:05:33 -07:00
hkexnet.go Attempts to handle disconnects better.. TODO: torture tests and implement exit status for -x commands 2018-06-26 20:14:43 -07:00
termmode_unix.go MSYS+mintty support; pkg renaming to hkexsh 2018-04-04 15:43:27 -07:00
termmode_windows.go MSYS+mintty support; pkg renaming to hkexsh 2018-04-04 15:43:27 -07:00

README.md

HKExSh

'hkexsh' (HerraduraKEx shell) is a golang implementation of a simple remote shell client and server, similar in role to ssh, offering encrypted interactive and non-interactive sessions. The client and server programs (hkexsh and hkexshd) use a mostly drop-in replacement for golang's standard golang/pkg/net facilities (net.Dial(), net.Listen(), net.Accept() and the net.Conn type), which automatically negotiate keying material for 'secure' sockets using the experimental HerraduraKEx key exchange algorithm first released at Omar Elejandro Herrera Reyna's HerraduraKEx project.

One can simply replace calls to net.Dial() with hkex.Dial(), and likewise net.Listen() with hkex.Listen(), to obtain connections (hkex.Conn) conforming to the basic net.Conn interface. Upon Dial(), the HerraduraKEx key exchange is initiated (whereby client and server independently derive the same keying material).

Above the hkex.Conn layer, the server and client apps in this repository (server/hkexshd and client/hkexsh) negotiate session settings (cipher/hmac algorithms, interactive/non-interactive, etc.) to be used for further communication.

Packets are subject to random padding, and (optionally) the client and server channels can both send chaff packets at random defineable intervals to help thwart analysis of session activity (especially for interactive shell sessions).

NOTE: Due to the experimental nature of the HerraduraKEx algorithm used to derive crypto keying material, this algorithm and the demonstration remote shell client/server programs should be used with caution and should definitely NOT be used for any sensitive applications, or at the very least at one's own risk.

As of this time (Jan 2018) no verdict by acknowledged 'crypto experts' as to the level of security of the HerraduraKEx algorithm for purposes of session key exchange over an insecure channel has been rendered. It is hoped that experts in the field will analyze the algorithm and determine if it is indeed a suitable one for use in situations where Diffie-Hellman or other key exchange algorithms are currently utilized.

Finally, within the hkexpasswd/ directory is a password-setting utility using its own user/password file distinct from the system /etc/passwd, which is used by the hkexshd server to authenticate clients.

Dependencies:

Get source code

  • $ go get -u blitter.com/go/hkexsh
  • $ cd $GOPATH/src/blitter.com/go/hkexsh
  • $ go build ./... # install all dependent go pkgs

To build

  • $ cd $GOPATH/src/blitter.com/go/hkexsh
  • $ make clean all

To set accounts & passwords:

  • $ echo "joebloggs:::*" >hkexsh.passwd
  • $ sudo mv hkexsh.passwd /etc
  • $ sudo hkexpasswd/hkexpasswd -u joebloggs
  • $ <enter a password, enter again to confirm>

Running Clent and Server. In separate shells:

  • [A]$ sudo hkexshd/hkexshd & # add -d for debugging
  • [B]$ hkexsh/hkexsh -u joebloggs # add -d for debugging

NOTE if running client (hkexsh) with -d, one will likely need to run 'reset' afterwards to fix up the shell tty afterwards as stty echo may not be restored if client crashes or is interrupted.