letmeind.conf 2.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105
  1. # letmeind daemon configuration.
  2. [GENERAL]
  3. # This config section holds general options.
  4. # Enable debugging.
  5. # This will print verbose syslog messages while modifying the firewall.
  6. #
  7. # Possible values: true, false
  8. debug = true
  9. # The control port that letmeind will listen on.
  10. # This is the public internet facing port of the daemon.
  11. #
  12. # Possible values: Any valid port; TCP, UDP or both.
  13. # If TCP and UDP flags are not specified, this defaults to TCP.
  14. port = 5800
  15. #port = 5800 / udp
  16. #port = 5800 / tcp, udp
  17. # Timeout (in seconds) for receiving and sending messages on the control port.
  18. # If the timeout is exceeded, the TCP connection will be aborted.
  19. #
  20. # Possible values: A positive number of seconds.
  21. control-timeout = 5.0
  22. # Control port error policy.
  23. #
  24. # If the policy is set to 'always', then error messages will always
  25. # be transmitted to the connected client.
  26. # If the policy is set to 'basic-auth', then error messages are suppressed
  27. # unless the connected client has passed basic authentication.
  28. # If the policy is set to 'full-auth', then error messages are suppressed
  29. # unless the connected client has passed full authentication.
  30. #
  31. # Possible values: always, basic-auth, full-auth
  32. # The recommended value is: basic-auth
  33. # The default value is: always
  34. control-error-policy = always
  35. # Turn the Linux seccomp feature on.
  36. #
  37. # Possible values: off, log, kill
  38. #
  39. # off: Seccomp turned off.
  40. # log: Seccomp turned off, but access of prohibited syscalls will be logged to syslog.
  41. # kill: Seccomp turned on. Letmeind will be killed if prohibited syscalls are called.
  42. seccomp = off
  43. [NFTABLES]
  44. # This config section holds the nftables firewall configuration.
  45. # Path to the `nft` nftables executable.
  46. #
  47. # If this is an absolute path (with leading slash), then $PATH will not be searched.
  48. # If this is a relative path (no leading slash), then $PATH and/or the current working
  49. # directory will be searched.
  50. exe = nft
  51. #exe = /usr/sbin/nft
  52. # nftables chain that letmeinfwd will modity.
  53. family = inet
  54. table = filter
  55. chain-input = LETMEIN-INPUT
  56. # Timeout of installed knock-open rules.
  57. # Knocked-open ports will be closed again this many seconds after the knocking.
  58. timeout = 600
  59. [KEYS]
  60. # This config section holds the table of users with their corresponding keys.
  61. #
  62. # Use command to generate new keys:
  63. # letmein gen-key
  64. # User 00000001:
  65. #00000001 = FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
  66. # User 00000002:
  67. #00000002 = FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
  68. [RESOURCES]
  69. # This config section holds the table of knock-able ports.
  70. # Resource ID '1A' maps to TCP port 2000:
  71. #0000001A = port: 2000
  72. # Resource ID '1B' maps to TCP port 3500:
  73. #0000001B = port: 3500
  74. # A resource can be restricted to one or more users.
  75. # Restricted to users 1 and 2:
  76. #0000001C = port: 4500 / users: 00000001, 00000002
  77. # Restricted to user 1:
  78. #0000001D = port: 5500 / users: 00000001
  79. # Open port 6500 for TCP and UDP.
  80. #0000001E = port: 6500 / tcp,udp