Execute commands remotely in a secure way
Go to file
2018-02-01 14:09:35 +01:00
img Optional password function added 2018-02-01 01:36:25 +01:00
1_generateCA.sh There it is. 2017-09-30 14:51:23 +02:00
2_generateServCert.sh There it is. 2017-09-30 14:51:23 +02:00
3_generateClientCert.sh There it is. 2017-09-30 14:51:23 +02:00
ding_client Windows configs, and readme. 2018-02-01 14:09:35 +01:00
ding_client.cfg There it is. 2017-09-30 14:51:23 +02:00
ding_client.win.cfg Windows configs, and readme. 2018-02-01 14:09:35 +01:00
ding_server Windows configs, and readme. 2018-02-01 14:09:35 +01:00
ding_server.cfg Optional password function added 2018-02-01 01:36:25 +01:00
ding_server.win.cfg Windows configs, and readme. 2018-02-01 14:09:35 +01:00
LICENSE Initial commit 2017-09-30 14:39:31 +02:00
README.md Windows configs, and readme. 2018-02-01 14:09:35 +01:00

ding

What is ding?

ding is a client-server thing written in python3. Its aim is to execute a set of commands remotely, which commands can be set in the server's config file.

How does it work?

The server will wait for a command to be sent by a client. If the command is present within the servers config file it will then execute the command, else nothing will happen.

What about ding's security?

The authentication is done via a SSL Client Certificate signed by an (self generated) Certificate Authority. The scripts for generating a CA and signing the Server/Client Certificates are also included to make it (relatively) easy. [ This involves typing in a few certificate details and entering a previously defined CA password. ]

Pic or didn't happen

Screenshot of ding Can't read a thing?

Requirements

  • Install python3 on your target computers.

Installation

At every step please read carefully what the generate certificates scripts want from you. The information on the certificates doesn't need to be true and can be totally random. They only need to be different from one another.

Step 1 to 3 can only be run on UNIX or GNU/Linux.

  1. Run ./1_generateCA.sh to generate a CA.
  2. Run ./2_generateServCert.sh to generate a signed Server Certificate.
  3. Run ./3_generateClientCert.sh to generate a signed Client Certificate.
  4. Move ding_client, ding_client.cfg, ding_client.crt, ding_client.key and CA.crt to the computer which should be able to send commands to the server.
    • UNIX or GNU/Linux: Also move ding_client.cfg to that computer.
    • Windows: Also move ding_client.win.cfg to that computer.
  5. Do some configuration on the server and client (ding_server.cfg, ding_client.cfg or ding_server.win.cfg, ding_client.win.cfg on Windows).
  6. Start the server using ./ding_server or python .\ding_server on Windows. (You may want to put this in a tmux session. [Ctrl+B, D] ;) ).
  7. Try out the client using ./ding_client <command> òr python .\ding_client <command> on Windows.

Optional: Cleartext password with timeout

If you want to be sure that this power won't be abused by bad people using your computer, you may want to add a password (saved in cleartext). The password will be sent inside the TLS connection.

To do so:

  1. Open your ding_server.cfg or ding_server.win.cfg.
  2. Set pw_on=true.
  3. Set a password, like password=abc def.
  4. Set a password timeout: pwtimeout=10 for 10 seconds.

If you have a password with special characters as in spaces and the like, you may want to use quotation marks around your password. ./ding_client "abc def" or python .\ding_client "abc def" on Windows.