Update 'README.md'

This commit is contained in:
Russtopia 2018-11-14 00:11:12 -08:00
parent 43221cbba6
commit ab4c5b74c9

View file

@ -1,9 +1,15 @@
HKExSh HKExSh
-- --
'hkexsh' (HerraduraKyberEx shell) is a golang implementation of a simple HKExSh (**H**erradura**K**yber**Ex** **Sh**ell) is a golang implementation of a simple
remote shell client and server, similar in role to ssh, offering remote shell client and server, similar in role to ssh, offering
encrypted interactive and non-interactive sessions, file copying and tunnels. encrypted interactive and non-interactive sessions, file copying and tunnels with traffic activity obfuscation ('chaffing').
***
**NOTE: Due to the experimental nature of the HerraduraKEx and Kyber IND-CCA-2 algorithms, and the novelty of the overall codebase, this package SHOULD BE CONSIDERED EXTREMELY EXPERIMENTAL and USED WITH CAUTION. It DEFINITELY SHOULD NOT be used for any sensitive applications. USE AT YOUR OWN RISK. NO WARRANTY OR CLAIM OF FITNESS FOR PURPOSE IS EXPRESSED OR IMPLIED.**
***
The client and server programs (hkexsh and hkexshd) use a mostly drop-in The client and server programs (hkexsh and hkexshd) use a mostly drop-in
replacement for golang's standard golang/pkg/net facilities (net.Dial(), net.Listen(), net.Accept() replacement for golang's standard golang/pkg/net facilities (net.Dial(), net.Listen(), net.Accept()
@ -17,12 +23,15 @@ Currently supported exchanges are:
[Omar Elejandro Herrera Reyna's HerraduraKEx project](http://github.com/Caume/HerraduraKEx); [Omar Elejandro Herrera Reyna's HerraduraKEx project](http://github.com/Caume/HerraduraKEx);
* The KYBER IND-CCA-2 secure key encapsulation mechanism, [pq-crystals Kyber](https://pq-crystals.org/kyber/) :: [Yawning/kyber golang implementation](https://git.schwanenlied.me/yawning/kyber) * The KYBER IND-CCA-2 secure key encapsulation mechanism, [pq-crystals Kyber](https://pq-crystals.org/kyber/) :: [Yawning/kyber golang implementation](https://git.schwanenlied.me/yawning/kyber)
Currently supported session encryption and hmac algorithms: Currently supported session algorithms:
[Encryption]
* AES-256 * AES-256
* Twofish-128 * Twofish-128
* Blowfish-64 * Blowfish-64
* CryptMTv1 (https://eprint.iacr.org/2005/165.pdf) * CryptMTv1 (https://eprint.iacr.org/2005/165.pdf)
[HMAC]
* HMAC-SHA256 * HMAC-SHA256
* HMAC-SHA512 * HMAC-SHA512
@ -38,11 +47,6 @@ Tunnels, if specified, are set up during initial client->server connection negot
Finally, within the hkexpasswd/ directory is a password-setting utility. HKExSh uses its own passwd file distinct from the system /etc/passwd to authenticate clients, using standard bcrypt+salt storage. Finally, within the hkexpasswd/ directory is a password-setting utility. HKExSh uses its own passwd file distinct from the system /etc/passwd to authenticate clients, using standard bcrypt+salt storage.
***
**NOTE: Due to the experimental nature of the HerraduraKEx and Kyber IND-CCA-2 algorithms, and the novelty of the overall codebase, this package SHOULD BE CONSIDERED EXTREMELY EXPERIMENTAL and USED WITH CAUTION. It DEFINITELY SHOULD NOT be used for any sensitive applications. USE AT YOUR OWN RISK. NO WARRANTY OR CLAIM OF FITNESS FOR PURPOSE IS EXPRESSED OR IMPLIED.**
***
HERRADURA KEX HERRADURA KEX
@ -141,20 +145,16 @@ Local (client) to remote (server) copy:
Remote (server) to local (client) copy: Remote (server) to local (client) copy:
* hkexcp joebloggs@host-or-ip:/remoteDirOrFile /some/where/local/Dir * hkexcp joebloggs@host-or-ip:/remoteDirOrFile /some/where/local/Dir
NOTE: Renaming while copying is NOT supported (ie., like cp's 'cp /foo/bar/fileA ./fileB). NOTE: Renaming while copying (eg., 'cp /foo/bar/fileA ./fileB') is NOT supported. Put another way, the destination (whether local or remote) must ALWAYS be a directory.
Put another way, the destination (whether local or remote) is ALWAYS a dir.
hkexcp uses tar with gzip compression (ala a 'tarpipe') under the hood, sending tar data over hkexcp uses tar (a 'tarpipe') with gzip compression, sending tar data over the hkex encrypted channel. Use the -d flag on client or server to see the generated tar commands if you're curious.
the hkex encrypted channel. Use the -d flag on client or server to see the generated tar
commandlines if you're curious.
Tunnels Tunnels
-- --
Simple tunnels (only client tunnels from client -> server for now, no reverse Simple tunnels (client -> server, no reverse tunnels for now) are supported.
tunnels) are supported.
Syntax: hkexsh -T=<tunspec>{,<tunspec>...} Syntax: hkexsh -T=<tunspec>{,<tunspec>...}
.. where <tunspec> is >localport:remoteport> .. where <tunspec> is <localport:remoteport>
Example, tunnelling ssh through hkexsh Example, tunnelling ssh through hkexsh