An alternative to ssh (<5% total SLOCC) written from scratch in Go. Testbed for candidate PQC (post-quantum cryptography) KEMs and symmetric session encryption algorithms with traffic chaffing.
Find a file
2018-04-04 15:51:03 +00:00
hkexpasswd MSYS+mintty support; pkg renaming to hkexsh 2018-04-04 15:43:27 -07:00
hkexsh Quick 'n dirty Makefile 2018-04-04 15:51:03 +00:00
hkexshd MSYS+mintty support; pkg renaming to hkexsh 2018-04-04 15:43:27 -07:00
spinsult MSYS+mintty support; pkg renaming to hkexsh 2018-04-04 15:43:27 -07:00
herradurakex.go MSYS+mintty support; pkg renaming to hkexsh 2018-04-04 15:43:27 -07:00
hkexauth.go MSYS+mintty support; pkg renaming to hkexsh 2018-04-04 15:43:27 -07:00
hkexchan.go MSYS+mintty support; pkg renaming to hkexsh 2018-04-04 15:43:27 -07:00
hkexnet.go MSYS+mintty support; pkg renaming to hkexsh 2018-04-04 15:43:27 -07:00
LICENSE Merge of public work on github.com/Russtopia/hkexsh repo 2018-02-16 18:43:37 -08:00
Makefile Quick 'n dirty Makefile 2018-04-04 15:51:03 +00:00
README.md Merge of public work on github.com/Russtopia/hkexsh repo 2018-02-16 18:43:37 -08:00
termmode_unix.go MSYS+mintty support; pkg renaming to hkexsh 2018-04-04 15:43:27 -07:00
termmode_windows.go MSYS+mintty support; pkg renaming to hkexsh 2018-04-04 15:43:27 -07:00

HKExSh

'hkexsh' (HerraduraKEx shell) is a golang implementation of drop-in replacements for golang's standard golang/pkg/net facilities (net.Dial(), net.Listen(), net.Accept() and the net.Conn type), which automatically negotiate keying material for 'secure' sockets using the experimental HerraduraKEx key exchange algorithm first released at Omar Elejandro Herrera Reyna's HerraduraKEx project.

One can simply replace calls to net.Dial() with hkex.Dial(), and likewise net.Listen() with hkex.Listen(), to obtain connections (hkex.Conn) conforming to the basic net.Conn interface. Upon Dial(), the HerraduraKEx key exchange is initiated (whereby client and server independently derive the same keying material).

Above this layer, demo apps in this repository (demo/server/server.go and demo/client/client.go) then negotiate session settings (cipher/hmac algorithms, etc.) to be used for further communication.

NOTE: Due to the experimental nature of the HerraduraKEx algorithm used to derive crypto keying material on each end, this algorithm and the demonstration remote shell client/server programs should be used with caution. As of this time (Jan 2018) no verdict by acknowledged 'crypto experts' as to the level of security of the HerraduraKEx algorithm for purposes of session key exchange over an insecure channel has been rendered. It is hoped that such experts in the field will analyze the algorithm and determine if it is indeed a suitable one for use in situations where Diffie-Hellman and other key exchange algorithms are currently utilized.

Within the demo/ tree are client and servers implementing a simplified, ssh-like secure shell facility and a password-setting utility using its own user/password file separate from the system /etc/passwd, which is used by the server to authenticate clients.

Dependencies:

Get source code

  • $ go get -u github.com/Russtopia/hkexsh
  • $ go get github.com/mattn/go-isatty ## only used by demos, not picked up by above go get -u?

To build

  • $ cd $GOPATH/src/github.com/Russtopia/hkexsh
  • $ go install .
  • $ go build demo/client/client.go && go build demo/server/server.go
  • $ go build demo/hkexpasswd/hkexpasswd.go

To set accounts & passwords:

  • $ sudo echo "joebloggs:::*" >/etc/hkexsh.passwd
  • $ sudo ./hkexpasswd -u joebloggs
  • $ <enter a password, enter again to confirm>

Running Clent and Server. In separate shells:

  • [A]$ sudo ./server &
  • [B]$ ./client -u joebloggs