letmeind.conf 2.5 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394
  1. # letmeind daemon configuration.
  2. [GENERAL]
  3. # This config section holds general options.
  4. # Enable debugging.
  5. # This will print verbose syslog messages while modifying the firewall.
  6. #
  7. # Possible values: true, false
  8. debug = true
  9. # The control port that letmeind will listen on.
  10. # This is the public internet facing port of the daemon.
  11. #
  12. # Possible values: Any valid TCP/IP port.
  13. port = 5800
  14. # Timeout (in seconds) for receiving and sending messages on the control port.
  15. # If the timeout is exceeded, the TCP connection will be aborted.
  16. #
  17. # Possible values: A positive number of seconds.
  18. control-timeout = 5.0
  19. # Control port error policy.
  20. #
  21. # If the policy is set to 'always', then error messages will always
  22. # be transmitted to the connected client.
  23. # If the policy is set to 'basic-auth', then error messages are suppressed
  24. # unless the connected client has passed basic authentication.
  25. # If the policy is set to 'full-auth', then error messages are suppressed
  26. # unless the connected client has passed full authentication.
  27. #
  28. # Possible values: always, basic-auth, full-auth
  29. # The recommended value is: basic-auth
  30. # The default value is: always
  31. control-error-policy = always
  32. # Turn the Linux seccomp feature on.
  33. #
  34. # Possible values: off, log, kill
  35. #
  36. # off: Seccomp turned off.
  37. # log: Seccomp turned off, but access of prohibited syscalls will be logged to syslog.
  38. # kill: Seccomp turned on. Letmeind will be killed if prohibited syscalls are called.
  39. seccomp = off
  40. [NFTABLES]
  41. # This config section holds the nftables firewall configuration.
  42. # nftables chain that letmeinfwd will modity.
  43. family = inet
  44. table = filter
  45. chain-input = LETMEIN-INPUT
  46. # Timeout of installed knock-open rules.
  47. # Knocked-open ports will be closed again this many seconds after the knocking.
  48. timeout = 600
  49. [KEYS]
  50. # This config section holds the table of users with their corresponding keys.
  51. #
  52. # Use command to generate new keys:
  53. # letmein gen-key
  54. # User 00000001:
  55. #00000001 = FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
  56. # User 00000002:
  57. #00000002 = FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
  58. [RESOURCES]
  59. # This config section holds the table of knock-able ports.
  60. # Resource ID '1A' maps to TCP port 2000:
  61. #0000001A = port: 2000
  62. # Resource ID '1B' maps to TCP port 3500:
  63. #0000001B = port: 3500
  64. # A resource can be restricted to one or more users.
  65. # Restricted to users 1 and 2:
  66. #0000001C = port: 4500 / users: 00000001, 00000002
  67. # Restricted to user 1:
  68. #0000001D = port: 5500 / users: 00000001
  69. # Open port 6500 for TCP and UDP.
  70. #0000001E = port: 6500 / tcp,udp