letmeind.conf 2.7 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697
  1. # letmeind daemon configuration.
  2. [GENERAL]
  3. # This config section holds general options.
  4. # Enable debugging.
  5. # This will print verbose syslog messages while modifying the firewall.
  6. #
  7. # Possible values: true, false
  8. debug = true
  9. # The control port that letmeind will listen on.
  10. # This is the public internet facing port of the daemon.
  11. #
  12. # Possible values: Any valid port; TCP, UDP or both.
  13. # If TCP and UDP flags are not specified, this defaults to TCP.
  14. port = 5800
  15. #port = 5800 / udp
  16. #port = 5800 / tcp, udp
  17. # Timeout (in seconds) for receiving and sending messages on the control port.
  18. # If the timeout is exceeded, the TCP connection will be aborted.
  19. #
  20. # Possible values: A positive number of seconds.
  21. control-timeout = 5.0
  22. # Control port error policy.
  23. #
  24. # If the policy is set to 'always', then error messages will always
  25. # be transmitted to the connected client.
  26. # If the policy is set to 'basic-auth', then error messages are suppressed
  27. # unless the connected client has passed basic authentication.
  28. # If the policy is set to 'full-auth', then error messages are suppressed
  29. # unless the connected client has passed full authentication.
  30. #
  31. # Possible values: always, basic-auth, full-auth
  32. # The recommended value is: basic-auth
  33. # The default value is: always
  34. control-error-policy = always
  35. # Turn the Linux seccomp feature on.
  36. #
  37. # Possible values: off, log, kill
  38. #
  39. # off: Seccomp turned off.
  40. # log: Seccomp turned off, but access of prohibited syscalls will be logged to syslog.
  41. # kill: Seccomp turned on. Letmeind will be killed if prohibited syscalls are called.
  42. seccomp = off
  43. [NFTABLES]
  44. # This config section holds the nftables firewall configuration.
  45. # nftables chain that letmeinfwd will modity.
  46. family = inet
  47. table = filter
  48. chain-input = LETMEIN-INPUT
  49. # Timeout of installed knock-open rules.
  50. # Knocked-open ports will be closed again this many seconds after the knocking.
  51. timeout = 600
  52. [KEYS]
  53. # This config section holds the table of users with their corresponding keys.
  54. #
  55. # Use command to generate new keys:
  56. # letmein gen-key
  57. # User 00000001:
  58. #00000001 = FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
  59. # User 00000002:
  60. #00000002 = FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
  61. [RESOURCES]
  62. # This config section holds the table of knock-able ports.
  63. # Resource ID '1A' maps to TCP port 2000:
  64. #0000001A = port: 2000
  65. # Resource ID '1B' maps to TCP port 3500:
  66. #0000001B = port: 3500
  67. # A resource can be restricted to one or more users.
  68. # Restricted to users 1 and 2:
  69. #0000001C = port: 4500 / users: 00000001, 00000002
  70. # Restricted to user 1:
  71. #0000001D = port: 5500 / users: 00000001
  72. # Open port 6500 for TCP and UDP.
  73. #0000001E = port: 6500 / tcp,udp