0
I Use This!
Activity Not Available

Project Summary

IntroductionGatepf is an SSH-based authenticating daemon inspired by authpf, a user shell for authenticating gateways. As authpf, it uses SSH protocol for user authentication, and the pf's anchors mechanism.

Why not Authpf?While authpf utilizes rather sensible "do not reinvent the wheel" approach, taking advantage of the SSH protocol's reliability and the pf firewall's flexibility, increasing it's capabilities looks worthwhile. Sometimes some additional actions need to be performed besides loading pf anchors (e. g. writing logs, or reloading the whole firewall ruleset). Moreover, performing these acions may require the root credentials. Is could be done by hacking authpf as described here (russian text). However, I find that approach rather inaccurate and inefficient. Merging authentication itself (OpenSSH) with corresponding actions (authpf) into a single daemon increases integrity and maintainability. So, users that need to be able to authenticate themselves to gateway still can use SSH in traditional way, with their favorite shells. Using gatepf allows to display some more complex information to users, then a single text message. It could be latest news, account status, etc., and add some interactiveness.

DocumentationCurrently there is no documentation available.

PortabilityThe application is developed and tested on FreeBSD. Also it should work on any system that is able to run OpenSSH and has ported pf (basically on BSD-like systems). Despite of that, I don't intend to make sure that it does work on such systems. Anyway, portability patches are welcome.

Release InformationCurrently there are no releases available. Meanwhile I am familiarizing myself with the sources of OpenSSH and authpf, which will be the primary base of gatepf.

Tags

authentication authpf c freebsd gateway ssh

In a Nutshell, gatepf...

 No code available to analyze

Open Hub computes statistics on FOSS projects by examining source code and commit history in source code management systems. This project has no code locations, and so Open Hub cannot perform this analysis

Is this project's source code hosted in a publicly available repository? Do you know the URL? If you do, click the button below and tell us so that Open Hub can generate statistics! It's fast and easy - try it and see!

Add a code location

BSD 4-clause (University of California-Specific)
Permitted

Place Warranty

Commercial Use

Modify

Distribute

Forbidden

Hold Liable

Use Trademarks

Required

Include Copyright

Include License

These details are provided for information only. No information here is legal advice and should not be used as such.

All Licenses

This Project has No vulnerabilities Reported Against it

Did You Know...

  • ...
    Black Duck offers a free trial so you can discover if there are open source vulnerabilities in your code
  • ...
    compare projects before you chose one to use
  • ...
    in 2016, 47% of companies did not have formal process in place to track OS code
  • ...
    data presented on the Open Hub is available through our API

 No code available to analyze

Open Hub computes statistics on FOSS projects by examining source code and commit history in source code management systems. This project has no code locations, and so Open Hub cannot perform this analysis

Is this project's source code hosted in a publicly available repository? Do you know the URL? If you do, click the button below and tell us so that Open Hub can generate statistics! It's fast and easy - try it and see!

Add a code location

Community Rating

Be the first to rate this project
Click to add your rating
   Spinner
Review this Project!
Sample ohloh analysis