{"id":198108,"date":"2013-10-21T12:40:03","date_gmt":"2013-10-21T08:40:03","guid":{"rendered":"http:\/\/savepearlharbor.com\/?p=198108"},"modified":"-0001-11-30T00:00:00","modified_gmt":"-0001-11-29T21:00:00","slug":"","status":"publish","type":"post","link":"https:\/\/savepearlharbor.com\/?p=198108","title":{"rendered":"<span class=\"post_title\">ICMP port knocking \u0432 OpenWRT<\/span>"},"content":{"rendered":"<div class=\"content html_format\"> \t\t\t\u0412\u043f\u0435\u0447\u0430\u0442\u043b\u0451\u043d\u043d\u044b\u0439 <a href=\"http:\/\/habrahabr.ru\/post\/186488\/\">\u0441\u0442\u0430\u0442\u044c\u0451\u0439<\/a> \u0440\u0435\u0448\u0438\u043b \u0440\u0435\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u0442\u044c \u043f\u043e\u0434\u043e\u0431\u043d\u043e\u0435 \u0440\u0435\u0448\u0435\u043d\u0438\u0435 \u043d\u0430 \u0434\u043e\u043c\u0430\u0448\u043d\u0435\u043c \u0440\u043e\u0443\u0442\u0435\u0440\u0435, \u043f\u043e\u0434 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c OpenWRT (Bleeding Edge r38381). \u0420\u0435\u0448\u0435\u043d\u0438\u0435 \u043d\u0430\u0432\u0435\u0440\u043d\u043e \u043d\u0435 \u043d\u0430\u0441\u0442\u043e\u043b\u044c\u043a\u043e \u0435\u043b\u0435\u0433\u0430\u043d\u0442\u043d\u043e\u0435 \u043a\u0430\u043a \u043d\u0430 Miktotik, \u043d\u043e \u0433\u043b\u0430\u0432\u043d\u043e\u0435 \u0447\u0442\u043e \u0440\u0430\u0431\u043e\u0447\u0435\u0435 \u0438 \u0431\u0435\u0437 \u0441\u043a\u0440\u0438\u043f\u0442\u043e\u0432 \u0438 cron. \u0422\u0430\u043a \u0436\u0435 \u0435\u0433\u043e \u043c\u043e\u0436\u043d\u043e \u0432\u0437\u044f\u0442\u044c \u0437\u0430 \u043e\u0441\u043d\u043e\u0432\u0443 \u0434\u043b\u044f \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043d\u0430 \u0434\u0440\u0443\u0433\u0438\u0445 \u041e\u0421 Linux. \u041a\u043e\u043c\u0443 \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u043e \u043f\u0440\u043e\u0448\u0443 \u043f\u043e\u0434 \u043a\u0430\u0442.<a name=\"habracut\"><\/a><\/p>\n<p>  \u041f\u0440\u0438\u0448\u043b\u043e\u0441\u044c \u043e\u0431\u043b\u0430\u0437\u0438\u0442\u044c \u043c\u043d\u043e\u0433\u043e \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432. \u0414\u0443\u043c\u0430\u043b \u0438 \u0441\u043a\u0440\u0438\u043f\u0442\u044b \u043f\u0438\u0441\u0430\u0442\u044c \u043f\u043e \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u043d\u0438\u044e LOG \u0438\u043b\u0438 ULOG \u0441\u043e\u0431\u044b\u0442\u0438\u0439 \u043e\u0442 iptables \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u043e\u043c \u0436\u0443\u0440\u043d\u0430\u043b\u0435. \u0414\u0430\u0436\u0435 \u043d\u0430\u0442\u043a\u043d\u0443\u043b\u0441\u044f \u043d\u0430 \u043f\u0440\u043e\u0435\u043a\u0442 \u2014 <a href=\"http:\/\/joker.linuxstuff.pl\/specter\/\">Specter<\/a>, \u0441 \u043f\u043e\u043c\u043e\u0448\u044c\u044e \u043a\u043e\u0442\u043e\u0440\u043e\u0433\u043e \u043c\u043e\u0436\u043d\u043e \u0440\u0435\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u0442\u044c \u0440\u0435\u0430\u043a\u0446\u0438\u044e (\u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0441\u043a\u0440\u0438\u043f\u0442\u043e\u0432) \u043d\u0430 \u0441\u043e\u0431\u044b\u0442\u0438\u044f ULOG \u043e\u0442 iptables, \u0447\u0435\u0433\u043e \u043d\u0435\u0442 \u0432 ulogd. <a href=\"http:\/\/www.portknocking.org\/view\/implementations\">\u0422\u0443\u0442<\/a> \u0431\u043e\u043b\u044c\u0448\u0430\u044f \u043f\u043e\u0434\u0431\u043e\u0440\u043a\u0430 \u0441\u0442\u0430\u0440\u044b\u0445 \u043f\u0440\u043e\u0435\u043a\u0442\u043e\u0432 \u043f\u043e \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 Port knocking, \u043d\u043e \u0441\u043e\u0432\u0441\u0435\u043c \u043d\u0435 \u0445\u043e\u0442\u0435\u043b\u043e\u0441\u044c \u0437\u0430\u043d\u0438\u043c\u0430\u0442\u044c\u0441\u044f \u043a\u043e\u043c\u043f\u0438\u043b\u044f\u0446\u0438\u0435\u0439 \u043d\u0430 \u0440\u043e\u0443\u0442\u0435\u0440\u0435 \u0438\u043b\u0438 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u043a\u0435. \u041f\u0440\u0438 \u043f\u043e\u0438\u0441\u043a\u0435 \u0440\u0435\u0448\u0435\u043d\u0438\u044f, \u0447\u0430\u0441\u0442\u043e \u043d\u0430\u0442\u0430\u043b\u043a\u0438\u0432\u0430\u043b\u0441\u044f \u043d\u0430 \u0441\u043e\u0432\u0435\u0442\u044b \u043f\u0440\u043e \u0431\u044b\u0441\u0442\u0440\u043e\u0442\u0443 \u0438 \u0443\u0434\u043e\u0431\u0441\u0442\u0432\u043e ipset-\u043e\u0432, \u0447\u0442\u043e \u0431\u044b \u043d\u0435 \u043d\u0430\u0433\u0440\u043e\u043c\u043e\u0436\u0434\u0430\u0442\u044c iptables \u043a\u0443\u0447\u0435\u0439 \u00ab\u043e\u0434\u0438\u043d\u0430\u043a\u043e\u0432\u044b\u0445\u00bb \u043f\u043e \u0434\u0435\u0443\u0441\u0442\u0432\u0438\u044e \u043f\u0440\u0430\u0432\u0438\u043b. \u0418 \u0432 \u043d\u0438\u0445 \u0431\u044b\u043b\u0438 \u0437\u0430\u043c\u0435\u0447\u0435\u043d\u044b \u043a\u043b\u044e\u0447\u0438 &quot;&#8212;match-set&quot; \u0438 &quot;&#8212;add-set&quot;, \u0434\u0430\u043b\u044c\u043d\u0435\u0439\u0448\u0438\u0435 \u043f\u043e\u0438\u0441\u043a\u0438 \u0438 \u043f\u0440\u0438\u0432\u0435\u043b\u0438 \u043a \u0440\u0435\u0448\u0435\u043d\u0438\u044e.<br \/>  \u0412 \u043e\u0431\u0449\u0435\u043c \u0438\u0442\u043e\u0433\u0435 \u0431\u044b\u043b\u043e \u043f\u0440\u0438\u043d\u044f\u0442\u043e \u0440\u0435\u0448\u0435\u043d\u0438\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c ipset-\u044b, \u0442.\u043a. \u043d\u0435 \u043d\u0443\u0436\u043d\u043e \u0447\u0442\u043e-\u043b\u0438\u0431\u043e \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0442\u044c \u0438 \u043f\u0438\u0441\u0430\u0442\u044c \u0440\u0435\u0430\u043a\u0446\u0438\u0438 \u043d\u0430 \u0441\u043e\u0431\u044b\u0442\u0438\u044f \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u0430\u043c\u0438 iptables.<\/p>\n<p>  \u0418\u0442\u0430\u043a, \u0440\u0435\u0448\u0435\u043d\u0438\u0435 \u0440\u0435\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u043d\u043e \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0441\u0443\u0433\u0443\u0431\u043e iptables \u0438 ipset. \u0414\u043b\u044f \u043f\u0440\u043e\u0441\u0442\u043e\u0442\u044b \u0432\u043e\u0441\u043f\u0440\u0438\u044f\u0442\u0438\u044f \u043a\u043e\u043c\u0431\u0438\u043d\u0430\u0446\u0438\u044f \u00ab\u0441\u0442\u0443\u043a\u043e\u0432\u00bb \u0431\u0443\u0434\u0435\u0442 \u0442\u0430\u043a\u043e\u0439 \u0436\u0435, \u043a\u0430\u043a \u0438 \u0432 \u0443\u043f\u043e\u043c\u044f\u043d\u0443\u0442\u043e\u0439 \u0441\u0442\u0430\u0442\u044c\u0435. \u041d\u0430\u043f\u043e\u043c\u043d\u044e \u044d\u0442\u043e \u2014 2-\u0430 ICMP \u043f\u0430\u043a\u0435\u0442\u0430 \u043f\u043e\u0434\u0440\u044f\u0434 \u0440\u0430\u0437\u043c\u0435\u0440\u043e\u043c 70 \u0431\u0430\u0439\u0442 \u0438 \u0437\u0430 \u043d\u0438\u043c\u0438 2-\u0430 ICMP \u043f\u0430\u043a\u0435\u0442\u0430 \u043f\u043e\u0434\u0440\u044f\u0434 \u0440\u0430\u0437\u043c\u0435\u0440\u043e\u043c 100 \u0431\u0430\u0439\u0442. <u>\u041d\u0443 \u0438 \u043d\u0435 \u0437\u0430\u0431\u044b\u0432\u0430\u0435\u043c \u043e \u0440\u0430\u0437\u043c\u0435\u0440\u0435 \u0437\u0430\u0433\u043e\u043b\u043e\u0432\u043a\u0430 ICMP \u043f\u0430\u0440\u043a\u0435\u0442\u0430 (28 \u0431\u0430\u0439\u0442)<\/u>.<br \/>  \u0412 \u043c\u043e\u0451\u043c \u0441\u043b\u0443\u0447\u0430\u0435 \u043f\u043e\u0441\u043b\u0435 \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0432\u0443\u044e\u0449\u0438\u0445 \u00ab\u0441\u0442\u0443\u043a\u043e\u0432\u00bb \u0440\u0430\u0437\u0440\u0435\u0448\u0430\u0435\u0442\u044c\u0441\u044f \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u0435 \u043d\u0430 \u043f\u043e\u0440\u0442\u0443 1194\/tcp \u0434\u043b\u044f OpenVPN \u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u0434\u043b\u044f IP \u0430\u0434\u0440\u0435\u0441\u0430, \u0441 \u043a\u043e\u0442\u043e\u0440\u043e\u0433\u043e \u043f\u0440\u043e\u0438\u0437\u0432\u0435\u043b\u0438 \u00ab\u0441\u0442\u0443\u043a\u0438\u00bb. \u0421 \u0438\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0438\u0435\u0439 \u043f\u043e \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0435 OpenVPN \u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u043d\u0430 OpenWRT \u043c\u043e\u0436\u043d\u043e \u043e\u0437\u043d\u0430\u043a\u043e\u043c\u0438\u0442\u044c\u0441\u044f \u043d\u0430 \u043e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0439 <a href=\"http:\/\/wiki.openwrt.org\/inbox\/vpn.howto\">Wiki<\/a>, \u0442.\u043a. \u044d\u0442\u043e \u0432\u044b\u0445\u043e\u0434\u0438\u0442 \u0437\u0430 \u0440\u0430\u043c\u043a\u0438 \u0434\u0430\u043d\u043d\u043e\u0439 \u0441\u0442\u0430\u0442\u044c\u0438.<\/p>\n<h4>\u041f\u043e\u0434\u0433\u043e\u0442\u043e\u0432\u043a\u0430 ipset-\u043e\u0432<\/h4>\n<p>  \u0421\u0442\u043e\u0438\u0442 \u043e\u0442\u043c\u0435\u0442\u0438\u0442\u044c, \u0447\u0442\u043e \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430 \u043f\u0440\u0430\u0432\u0438\u043b \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f ipset-\u043e\u0432 \u0432 \u0444\u0430\u0439\u043b\u0435 \u043d\u0430\u0441\u0442\u0440\u043e\u0435\u043a \u0444\u0430\u0439\u0440\u0432\u043e\u043b\u0430 OpenWRT \u043f\u043e\u044f\u0432\u0438\u043b\u043e\u0441\u044c \u0442\u043e\u043b\u044c\u043a\u043e \u0441 \u0440\u0435\u043b\u0438\u0437\u0430 Attitude Adjustment, \u043f\u0440\u0430\u0432\u0434\u0430 \u0432 \u0440\u0435\u0432\u0438\u0437\u0438\u0438 r36349 \u043d\u0435 \u0440\u0430\u0431\u043e\u0442\u0430\u043b\u043e (<u>\u041f\u0440\u0438 \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u0438 \u043f\u0440\u0430\u0432\u0438\u043b, \u0432\u044b\u0434\u0430\u0432\u0430\u043b\u043e \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u0435, \u0447\u0442\u043e datatype \u0434\u043b\u044f ipset-\u043e\u0432 \u043d\u0435 \u0443\u043a\u0430\u0437\u0430\u043d<\/u>).<\/p>\n<p>  \u041d\u043e ipset-\u044b \u043c\u043e\u0436\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u0442\u044c \u0440\u0443\u0447\u043a\u0430\u043c\u0438, \u0436\u0435\u043b\u0430\u0442\u0435\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u0432\u0430\u0442\u044c \u0438\u0445 \u043f\u0440\u0438 \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0435, \u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440: \u043f\u0440\u043e\u043f\u0438\u0441\u0430\u0442\u044c \u0432 \/etc\/rc.local.  <\/p>\n<pre><code class=\"bash\">ipset create knock1 hash:ip ipset create knock2 hash:ip ipset create knock3 hash:ip ipset create AllowedVPN hash:ip <\/code><\/pre>\n<p>  \u0415\u0441\u043b\u0438 \u0436\u0435 fw3 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u0442 \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u0435 ipset-\u043e\u0432 (fw3 \u2014 \u044d\u0442\u043e \u0441\u0430\u043c \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0444\u0430\u0439\u0440\u0432\u043e\u043b\u043e\u043c \u0432 OpenWRT, \u0441 \u0434\u0435\u0442\u0430\u043b\u044c\u043d\u044b\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435\u043c \u043d\u0430\u0441\u0442\u0440\u043e\u0435\u043a \u043c\u043e\u0436\u043d\u043e \u043e\u0437\u043d\u0430\u043a\u043e\u043c\u0438\u0442\u044c\u0441\u044f \u043d\u0430 \u043e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0439 <a href=\"http:\/\/wiki.openwrt.org\/doc\/uci\/firewall\">Wiki<\/a>), \u0442\u043e \u0432 \u0444\u0430\u0439\u043b \u043d\u0430\u0441\u0442\u0440\u043e\u0435\u043a \u0444\u0430\u0439\u0440\u0432\u043e\u043b\u0430 <b>\/etc\/config\/firewall<\/b> \u0434\u043e\u0431\u0430\u0432\u043b\u044f\u044e\u0442\u044c\u0441\u044f \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0435 \u043f\u0443\u043d\u043a\u0442\u044b:<\/p>\n<pre><code class=\"bash\">config ipset   option enabled 1   option name knock1   option storage hash   option match src_ip  config ipset   option enabled 1   option name knock2   option storage hash   option match src_ip  config ipset   option enabled 1   option name knock3   option storage hash   option match src_ip  config ipset   option enabled 1   option name AllowedVPN   option storage hash   option match src_ip <\/code><\/pre>\n<h4>\u041b\u043e\u0433\u0438\u043a\u0430 \u043e\u0442\u043b\u0430\u0432\u043b\u0438\u0432\u0430\u043d\u0438\u044f \u043f\u043e\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u0438 ICMP \u043f\u0430\u043a\u0435\u0442\u043e\u0432<\/h4>\n<p>  <\/p>\n<h5>\u041b\u043e\u0432\u0438\u043c \u043f\u0435\u0440\u0432\u044b\u0439 knock<\/h5>\n<p>  <\/p>\n<pre><code class=\"bash\">icmptype 8 length 98 ! match-set knock1 src ! match-set knock2 src ! match-set knock3 src ! match-set AllowedVPN src add-set knock1 src<\/code><\/pre>\n<p>  \u0418\u0441\u0445\u043e\u0434\u044f\u0449\u0438\u0439 \u0430\u0434\u0440\u0435\u0441 ICMP \u043f\u0430\u043a\u0435\u0442\u0430 \u0440\u0430\u0437\u043c\u0435\u0440\u043e\u043c 98 \u0431\u0430\u0439\u0442 \u0437\u0430\u043d\u043e\u0441\u0438\u043c \u0432 ipset knock1, \u0435\u0441\u043b\u0438 \u0435\u0433\u043e \u043d\u0435\u0442 \u0432 \u043e\u0441\u0442\u0430\u043b\u044c\u043d\u044b\u0445 ipset-\u0430\u0445.<\/p>\n<h5>\u041b\u043e\u0432\u0438\u043c \u0432\u0442\u043e\u0440\u043e\u0439 knock<\/h5>\n<p>  <\/p>\n<pre><code class=\"bash\">icmptype 8 length 98 match-set knock1 src ! match-set knock2 src ! match-set knock3 src ! match-set AllowedVPN src add-set knock2 src <\/code><\/pre>\n<p>\u0418\u0441\u0445\u043e\u0434\u044f\u0449\u0438\u0439 \u0430\u0434\u0440\u0435\u0441 ICMP \u043f\u0430\u043a\u0435\u0442\u0430 \u0440\u0430\u0437\u043c\u0435\u0440\u043e\u043c 98 \u0431\u0430\u0439\u0442 \u0437\u0430\u043d\u043e\u0441\u0438\u043c \u0432 ipset knock2, \u0435\u0441\u043b\u0438 \u043e\u043d \u0443\u0436\u0435 \u0435\u0441\u0442\u044c \u0432 ipset-\u0435 knock1 \u0438 \u043d\u0435\u0442 \u0432 \u043e\u0441\u0442\u0430\u043b\u044c\u043d\u044b\u0445.<\/p>\n<h5>\u041b\u043e\u0432\u0438\u043c \u0442\u0440\u0435\u0442\u0438\u0439 knock<\/h5>\n<p>  <\/p>\n<pre><code class=\"bash\">icmptype 8 length 128 match-set knock1 src match-set knock2 src ! match-set knock3 src ! match-set AllowedVPN src add-set knock3 src <\/code><\/pre>\n<p>\u0418\u0441\u0445\u043e\u0434\u044f\u0449\u0438\u0439 \u0430\u0434\u0440\u0435\u0441 ICMP \u043f\u0430\u043a\u0435\u0442\u0430 \u0440\u0430\u0437\u043c\u0435\u0440\u043e\u043c 128 \u0431\u0430\u0439\u0442 \u0437\u0430\u043d\u043e\u0441\u0438\u043c \u0432 ipset knock3, \u0435\u0441\u043b\u0438 \u043e\u043d \u0442\u0430\u043a \u0436\u0435 \u043f\u0440\u0438\u0441\u0443\u0442\u0441\u0432\u0443\u0435\u0442 \u0432 ipset-\u0430\u0445 knock1 \u0438 knock2, \u043d\u043e \u043d\u0435\u0442 \u0432 AllowedVPN.<\/p>\n<h5>\u041b\u043e\u0432\u0438\u043c \u0447\u0435\u0442\u0432\u0451\u0440\u0442\u044b\u0439 knock<\/h5>\n<p>  <\/p>\n<pre><code class=\"bash\">icmptype 8 length 128 match-set knock1 src match-set knock2 src match-set knock3 src ! match-set AllowedVPN src add-set AllowedVPN src <\/code><\/pre>\n<p>  \u0418\u0441\u0445\u043e\u0434\u044f\u0449\u0438\u0439 \u0430\u0434\u0440\u0435\u0441 ICMP \u043f\u0430\u043a\u0435\u0442\u0430 \u0440\u0430\u0437\u043c\u0435\u0440\u043e\u043c 128 \u0431\u0430\u0439\u0442 \u0437\u0430\u043d\u043e\u0441\u0438\u043c \u0432 ipset AllowedVPN, \u0435\u0441\u043b\u0438 \u043e\u043d \u0442\u0430\u043a \u0436\u0435 \u043f\u0440\u0438\u0441\u0443\u0442\u0441\u0432\u0443\u0435\u0442 \u0432 ipset-\u0430\u0445 knock1, knock2 \u0438 knock3.<br \/>  <u>\u0414\u043b\u044f \u0442\u043e\u0433\u043e \u0447\u0442\u043e \u0431\u044b \u043f\u043e\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u044c \u043e\u0442\u043b\u0430\u0432\u043b\u0438\u0432\u0430\u043b\u0430\u0441\u044c \u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e, \u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0432 iptables \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e \u0437\u0430\u043d\u043e\u0441\u0438\u0442\u044c \u0432 \u043e\u0431\u0440\u0430\u0442\u043d\u043e\u043c \u043f\u043e\u0440\u044f\u0434\u043a\u0435<\/u>. \u0418\u043d\u0430\u0447\u0435 \u043f\u0435\u0440\u0432\u044b\u0439 \u00ab\u0441\u0442\u0443\u043a\u00bb \u0431\u0443\u0434\u0435\u0442 \u043e\u0442\u043b\u043e\u0432\u043b\u0435\u043d \u043f\u0435\u0440\u0432\u044b\u043c \u0438 \u0432\u0442\u043e\u0440\u044b\u043c \u043f\u0440\u0430\u0432\u0438\u043b\u0430\u043c\u0438 \u0441\u0440\u0430\u0437\u0443 \u0442\u0430\u043a \u0436\u0435 \u043a\u0430\u043a \u0442\u0440\u0435\u0442\u0438\u0439 \u00ab\u0441\u0442\u0443\u043a\u00bb \u043e\u0442\u043b\u043e\u0432\u0438\u0442\u044c\u0441\u044f \u0442\u0440\u0435\u0442\u0438\u043c \u0438 \u0447\u0435\u0442\u0432\u0451\u0440\u0442\u044b\u043c \u043f\u0440\u0430\u0432\u0438\u043b\u0430\u043c\u0438 \u0441\u0440\u0430\u0437\u0443.<br \/>  <u>\u0414\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u043d\u0430 \u043e\u0442\u0441\u0443\u0442\u0441\u0432\u0438\u0435 \u0432 \u0434\u0440\u0443\u0433\u0438\u0445 ipset-\u0430\u0445 \u0443\u043a\u0430\u0437\u0430\u043d\u044b \u0434\u043b\u044f \u0447\u0451\u0442\u043a\u043e\u0433\u043e \u0441\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u043d\u0438\u044f \u043f\u043e\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u00ab\u0441\u0442\u0443\u043a\u043e\u0432\u00bb<\/u>.<\/p>\n<p>  \u041d\u0438\u0436\u0435 \u043f\u0440\u0438\u0432\u0435\u0434\u0435\u043d\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u0430\u043d\u0434 iptables \u0434\u043b\u044f \u0437\u0430\u043d\u0435\u0441\u0435\u043d\u0438\u044f \u0432 \u0447\u0435\u043f\u043e\u0447\u043a\u0443 input_rule (\u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u0430\u044f \u0447\u0435\u043f\u043e\u0447\u043a\u0430 \u0432 \u0444\u0430\u0439\u0440\u0432\u043e\u043b\u0435 OpenWRT \u0434\u043b\u044f \u043f\u0440\u0430\u0432\u0438\u043b \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f), \u0434\u043e\u0431\u0430\u0432\u043b\u044f\u044e\u0442\u0441\u044f \u0432 <b>\/etc\/firewall.user<\/b>.  <\/p>\n<pre><code class=\"bash\">iptables -A input_rule -p icmp -m icmp --icmp-type echo-request -m length --length 128 -m limit --limit 10\/s -m set --match-set knock1 src -m set --match-set knock2 src -m set --match-set knock3 src -m set ! --match-set AllowedVPN src -j SET --add-set AllowedVPN src iptables -A input_rule -p icmp -m icmp --icmp-type echo-request -m length --length 128 -m limit --limit 10\/s -m set --match-set knock1 src -m set --match-set knock2 src -m set ! --match-set knock3 src -m set ! --match-set AllowedVPN src -j SET --add-set knock3 src iptables -A input_rule -p icmp -m icmp --icmp-type echo-request -m length --length 98  -m limit --limit 10\/s -m set --match-set knock1 src -m set ! --match-set knock2 src -m set ! --match-set knock3 src -m set ! --match-set AllowedVPN src -j SET --add-set knock2 src iptables -A input_rule -p icmp -m icmp --icmp-type echo-request -m length --length 98  -m limit --limit 10\/s -m set ! --match-set knock1 src -m set ! --match-set knock2 src -m set ! --match-set knock3 src -m set ! --match-set AllowedVPN src -j SET --add-set knock1 src<\/code><\/pre>\n<p>  <\/p>\n<div class=\"spoiler\"><b class=\"spoiler_title\">\u0422\u0435\u0436\u0435 \u043f\u0440\u0430\u0432\u0438\u043b\u0430, \u043d\u043e \u0441 \u043b\u043e\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0439 \u0436\u0443\u0440\u043d\u0430\u043b<\/b><\/p>\n<div class=\"spoiler_text\">\n<pre><code class=\"bash\">iptables -A input_rule -p icmp -m icmp --icmp-type echo-request -m length --length 128 -m limit --limit 10\/s -m set --match-set knock1 src -m set --match-set knock2 src -m set --match-set knock3 src -m set ! --match-set AllowedVPN src -j LOG --log-prefix &quot;(KNOCK4 O) &quot; iptables -A input_rule -p icmp -m icmp --icmp-type echo-request -m length --length 128 -m limit --limit 10\/s -m set --match-set knock1 src -m set --match-set knock2 src -m set --match-set knock3 src -m set ! --match-set AllowedVPN src -j SET --add-set AllowedVPN src iptables -A input_rule -p icmp -m icmp --icmp-type echo-request -m length --length 128 -m limit --limit 10\/s -m set --match-set knock1 src -m set --match-set knock2 src -m set ! --match-set knock3 src -m set ! --match-set AllowedVPN src -j LOG --log-prefix &quot;(KNOCK3 O) &quot; iptables -A input_rule -p icmp -m icmp --icmp-type echo-request -m length --length 128 -m limit --limit 10\/s -m set --match-set knock1 src -m set --match-set knock2 src -m set ! --match-set knock3 src -m set ! --match-set AllowedVPN src -j SET --add-set knock3 src iptables -A input_rule -p icmp -m icmp --icmp-type echo-request -m length --length 98  -m limit --limit 10\/s -m set --match-set knock1 src -m set ! --match-set knock2 src -m set ! --match-set knock3 src -m set ! --match-set AllowedVPN src -j LOG --log-prefix &quot;(KNOCK2 O) &quot; iptables -A input_rule -p icmp -m icmp --icmp-type echo-request -m length --length 98  -m limit --limit 10\/s -m set --match-set knock1 src -m set ! --match-set knock2 src -m set ! --match-set knock3 src -m set ! --match-set AllowedVPN src -j SET --add-set knock2 src iptables -A input_rule -p icmp -m icmp --icmp-type echo-request -m length --length 98  -m limit --limit 10\/s -m set ! --match-set knock1 src -m set ! --match-set knock2 src -m set ! --match-set knock3 src -m set ! --match-set AllowedVPN src -j LOG --log-prefix &quot;(KNOCK1 O) &quot; iptables -A input_rule -p icmp -m icmp --icmp-type echo-request -m length --length 98  -m limit --limit 10\/s -m set ! --match-set knock1 src -m set ! --match-set knock2 src -m set ! --match-set knock3 src -m set ! --match-set AllowedVPN src -j SET --add-set knock1 src<\/code><\/pre>\n<p>  <\/div>\n<\/div>\n<p>  <\/p>\n<h4>\u00ab\u0421\u0430\u043c\u043e\u0435 \u0433\u043b\u0430\u0432\u043d\u043e\u0435\u00bb \u043f\u0440\u0430\u0432\u0438\u043b\u043e<\/h4>\n<p>  \u0418\u043c\u0435\u043d\u043d\u043e \u044d\u0442\u043e \u043f\u0440\u0430\u0432\u0438\u043b\u043e \u0438 \u0440\u0430\u0437\u0440\u0435\u0448\u0430\u0435\u0442 \u0432\u0445\u043e\u0434\u044f\u0449\u0435\u0435 \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u0435 \u043d\u0430 \u043f\u043e\u0440\u0442 1194\/tcp, \u0435\u0441\u043b\u0438 IP \u0430\u0434\u0440\u0435\u0441 \u0441 \u043a\u043e\u0442\u043e\u0440\u043e\u0433\u043e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u044c\u0441\u044f \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u0435, \u043d\u0430\u0445\u043e\u0434\u0438\u0442\u044c\u0441\u044f \u0432 ipset-\u0435 AllowedVPN.  <\/p>\n<pre><code class=\"bash\">config 'rule'   option enabled 1   option 'target' 'ACCEPT'   option 'name' 'VPN'   option 'src' 'wan'   option 'proto' 'tcp'   option 'dest_port' '1194'   option 'extra' '-m set --match-set AllowedVPN src' <\/code><\/pre>\n<p>  \u0418\u043d\u0430\u0447\u0435 \u0435\u0433\u043e \u043c\u043e\u0436\u043d\u043e \u043f\u0440\u043e\u043f\u0438\u0441\u0430\u0442\u044c \u0432 \/etc\/firewall.user <\/p>\n<pre><code class=\"bash\">iptables -A input_rule -p tcp --dport 1194 -m set --match-set AllowedVPN src -j ACCEPT <\/code><\/pre>\n<p>  <\/p>\n<h4>Port knocking<\/h4>\n<p>  \u041f\u0440\u043e\u0438\u0437\u0432\u0435\u0441\u0442\u0438 Port knocking \u0432 Windows \u043c\u043e\u0436\u043d\u043e \u043a\u043e\u043c\u0430\u043d\u0434\u043e\u0439:<br \/>  <b>ping readyshare.mydomain.ua -l 70 -n 2 &#038;&#038; ping readyshare.mydomain.ua -l 100 -n 2<\/b><\/p>\n<p>  <img decoding=\"async\" src=\"http:\/\/habr.habrastorage.org\/post_images\/8fa\/e38\/87d\/8fae3887dec82c298595cdd6a2f7b3cb.png\"\/><\/p>\n<h4>\u0417\u0430\u043a\u0440\u044b\u0442\u0438\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u0430<\/h4>\n<p>  \u041f\u043e\u043b\u043d\u043e\u0441\u0442\u044c\u044e \u0440\u0430\u0441\u043f\u0438\u0441\u044b\u0432\u0430\u0442\u044c \u043b\u043e\u0433\u0438\u043a\u0443 \u043d\u0435 \u0431\u0443\u0434\u0443, \u0442.\u043a. \u043e\u043d\u0430 \u043e\u0447\u0435\u043d\u044c \u0441\u0445\u043e\u0436\u0430 \u0441 \u043e\u043f\u0438\u0441\u0430\u043d\u043e\u0439 \u0432\u044b\u0448\u0435, \u043f\u0440\u043e\u0441\u0442\u043e \u043b\u043e\u0433\u0438\u043a\u0430 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0432 \u043f\u0440\u0430\u0432\u0438\u043b\u0430\u0445 \u0438\u043d\u0432\u0435\u0440\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0430 \u0438 \u043f\u0440\u043e\u0438\u0441\u0445\u043e\u0434\u0438\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u0438\u0435 \u0438\u0437 ipset-\u043e\u0432. \u041d\u0443 \u0438 \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0432\u0435\u043d\u043d\u043e \u0435\u0441\u043b\u0438 IP \u0430\u0434\u0440\u0435\u0441\u0430 \u043d\u0435\u0442 \u0432 ipset-e AllowedVPN \u2014 \u0442\u043e \u0438 \u043d\u0435\u0442 \u0434\u043e\u0441\u0442\u0443\u043f\u0430.<br \/>  <u>\u041f\u043e\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u044c \u00ab\u0441\u0442\u0443\u043a\u043e\u0432\u00bb \u0442\u0430\u043a\u0430\u044f \u0436\u0435 \u043a\u0430\u043a \u0438 \u043f\u0440\u0438 \u043e\u0442\u043a\u0440\u044b\u0442\u0438\u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u0430.<\/u><br \/>  \u041d\u0438\u0436\u0435 \u043f\u0440\u0438\u0432\u0435\u0434\u0435\u043d\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u0430\u043d\u0434 iptables \u0434\u043b\u044f \u0437\u0430\u043d\u0435\u0441\u0435\u043d\u0438\u044f \u0432 \u0447\u0435\u043f\u043e\u0447\u043a\u0443 input_rule, \u0444\u0430\u0439\u043b <b>\/etc\/firewall.user<\/b>  <\/p>\n<pre><code class=\"bash\">iptables -A input_rule -p icmp -m icmp --icmp-type echo-request -m length --length 128 -m limit --limit 10\/s -m set ! --match-set knock1 src -m set ! --match-set knock2 src -m set ! --match-set knock3 src -m set --match-set AllowedVPN src -j SET --del-set AllowedVPN src iptables -A input_rule -p icmp -m icmp --icmp-type echo-request -m length --length 128 -m limit --limit 10\/s -m set ! --match-set knock1 src -m set ! --match-set knock2 src -m set --match-set knock3 src -m set --match-set AllowedVPN src -j SET --del-set knock3 src iptables -A input_rule -p icmp -m icmp --icmp-type echo-request -m length --length 98  -m limit --limit 10\/s -m set ! --match-set knock1 src -m set --match-set knock2 src -m set --match-set knock3 src -m set --match-set AllowedVPN src -j SET --del-set knock2 src iptables -A input_rule -p icmp -m icmp --icmp-type echo-request -m length --length 98  -m limit --limit 10\/s -m set --match-set knock1 src -m set --match-set knock2 src -m set --match-set knock3 src -m set --match-set AllowedVPN src -j SET --del-set knock1 src <\/code><\/pre>\n<p>  <\/p>\n<div class=\"spoiler\"><b class=\"spoiler_title\">\u0422\u0435\u0436\u0435 \u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0434\u043b\u044f \u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f, \u043d\u043e \u0441 \u043b\u043e\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0439 \u0436\u0443\u0440\u043d\u0430\u043b<\/b><\/p>\n<div class=\"spoiler_text\">\n<pre><code class=\"bash\">iptables -A input_rule -p icmp -m icmp --icmp-type echo-request -m length --length 128 -m limit --limit 10\/s -m set ! --match-set knock1 src -m set ! --match-set knock2 src -m set ! --match-set knock3 src -m set --match-set AllowedVPN src -j LOG --log-prefix &quot;(KNOCK4 C) &quot; iptables -A input_rule -p icmp -m icmp --icmp-type echo-request -m length --length 128 -m limit --limit 10\/s -m set ! --match-set knock1 src -m set ! --match-set knock2 src -m set ! --match-set knock3 src -m set --match-set AllowedVPN src -j SET --del-set AllowedVPN src iptables -A input_rule -p icmp -m icmp --icmp-type echo-request -m length --length 128 -m limit --limit 10\/s -m set ! --match-set knock1 src -m set ! --match-set knock2 src -m set --match-set knock3 src -m set --match-set AllowedVPN src -j LOG --log-prefix &quot;(KNOCK3 C) &quot; iptables -A input_rule -p icmp -m icmp --icmp-type echo-request -m length --length 128 -m limit --limit 10\/s -m set ! --match-set knock1 src -m set ! --match-set knock2 src -m set --match-set knock3 src -m set --match-set AllowedVPN src -j SET --del-set knock3 src iptables -A input_rule -p icmp -m icmp --icmp-type echo-request -m length --length 98  -m limit --limit 10\/s -m set ! --match-set knock1 src -m set --match-set knock2 src -m set --match-set knock3 src -m set --match-set AllowedVPN src -j LOG --log-prefix &quot;(KNOCK2 C) &quot; iptables -A input_rule -p icmp -m icmp --icmp-type echo-request -m length --length 98  -m limit --limit 10\/s -m set ! --match-set knock1 src -m set --match-set knock2 src -m set --match-set knock3 src -m set --match-set AllowedVPN src -j SET --del-set knock2 src iptables -A input_rule -p icmp -m icmp --icmp-type echo-request -m length --length 98  -m limit --limit 10\/s -m set --match-set knock1 src -m set --match-set knock2 src -m set --match-set knock3 src -m set --match-set AllowedVPN src -j LOG --log-prefix &quot;(KNOCK1 C) &quot; iptables -A input_rule -p icmp -m icmp --icmp-type echo-request -m length --length 98  -m limit --limit 10\/s -m set --match-set knock1 src -m set --match-set knock2 src -m set --match-set knock3 src -m set --match-set AllowedVPN src -j SET --del-set knock1 src <\/code><\/pre>\n<\/div>\n<\/div>\n<p>  \u041d\u0430\u0434\u0435\u044e\u0441\u044c \u043c\u043e\u0439 \u043e\u043f\u044b\u0442 \u043f\u0440\u0438\u0433\u043e\u0434\u0438\u0442\u044c\u0441\u044f \u0434\u0440\u0443\u0433\u0438\u043c.<\/p>\n<p>  \u0425\u043e\u0440\u043e\u0448\u0430\u044f <a href=\"http:\/\/www.qccolab.com\/wp-content\/uploads\/2013\/04\/ipset-slides.pdf\">\u043f\u0440\u0435\u0437\u0435\u043d\u0442\u0430\u0446\u0438\u044f<\/a> \u043f\u043e ipset-\u0430\u043c Chris Cooper-\u0430 \u0438\u0437 QC Co-Lab, \u043e\u0442 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u044f \u043d\u0430\u0447\u0430\u043b \u043e\u0442\u0442\u0430\u043b\u043a\u0438\u0432\u0430\u0442\u044c\u0441\u044f \u043f\u0440\u0438 \u043f\u043e\u0441\u0442\u0440\u043e\u0435\u043d\u0438\u0438 \u0440\u0435\u0448\u0435\u043d\u0438\u044f. \t\t\t<\/p>\n<div class=\"clear\"><\/div>\n<\/p><\/div>\n<p> \u0441\u0441\u044b\u043b\u043a\u0430 \u043d\u0430 \u043e\u0440\u0438\u0433\u0438\u043d\u0430\u043b \u0441\u0442\u0430\u0442\u044c\u0438 <a href=\"http:\/\/habrahabr.ru\/post\/198108\/\"> http:\/\/habrahabr.ru\/post\/198108\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"content html_format\"> \t\t\t\u0412\u043f\u0435\u0447\u0430\u0442\u043b\u0451\u043d\u043d\u044b\u0439 <a href=\"http:\/\/habrahabr.ru\/post\/186488\/\">\u0441\u0442\u0430\u0442\u044c\u0451\u0439<\/a> \u0440\u0435\u0448\u0438\u043b \u0440\u0435\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u0442\u044c \u043f\u043e\u0434\u043e\u0431\u043d\u043e\u0435 \u0440\u0435\u0448\u0435\u043d\u0438\u0435 \u043d\u0430 \u0434\u043e\u043c\u0430\u0448\u043d\u0435\u043c \u0440\u043e\u0443\u0442\u0435\u0440\u0435, \u043f\u043e\u0434 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c OpenWRT (Bleeding Edge r38381). \u0420\u0435\u0448\u0435\u043d\u0438\u0435 \u043d\u0430\u0432\u0435\u0440\u043d\u043e \u043d\u0435 \u043d\u0430\u0441\u0442\u043e\u043b\u044c\u043a\u043e \u0435\u043b\u0435\u0433\u0430\u043d\u0442\u043d\u043e\u0435 \u043a\u0430\u043a \u043d\u0430 Miktotik, \u043d\u043e \u0433\u043b\u0430\u0432\u043d\u043e\u0435 \u0447\u0442\u043e \u0440\u0430\u0431\u043e\u0447\u0435\u0435 \u0438 \u0431\u0435\u0437 \u0441\u043a\u0440\u0438\u043f\u0442\u043e\u0432 \u0438 cron. \u0422\u0430\u043a \u0436\u0435 \u0435\u0433\u043e \u043c\u043e\u0436\u043d\u043e \u0432\u0437\u044f\u0442\u044c \u0437\u0430 \u043e\u0441\u043d\u043e\u0432\u0443 \u0434\u043b\u044f \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043d\u0430 \u0434\u0440\u0443\u0433\u0438\u0445 \u041e\u0421 Linux. \u041a\u043e\u043c\u0443 \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u043e \u043f\u0440\u043e\u0448\u0443 \u043f\u043e\u0434 \u043a\u0430\u0442.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-198108","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/savepearlharbor.com\/index.php?rest_route=\/wp\/v2\/posts\/198108","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/savepearlharbor.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/savepearlharbor.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/savepearlharbor.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/savepearlharbor.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=198108"}],"version-history":[{"count":0,"href":"https:\/\/savepearlharbor.com\/index.php?rest_route=\/wp\/v2\/posts\/198108\/revisions"}],"wp:attachment":[{"href":"https:\/\/savepearlharbor.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=198108"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/savepearlharbor.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=198108"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/savepearlharbor.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=198108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}