Execute commands remotely in a secure way
Go to file
Bandie 57fb2f7b99
Using actual ConfigParser call; dingd has -c for config file
2020-05-02 20:24:16 +02:00
img Optional password function added 2018-02-01 01:36:25 +01:00
1_generateCA.sh There it is. 2017-09-30 14:51:23 +02:00
2_generateServCert.sh Renaming 2018-03-29 00:58:36 +02:00
3_generateClientCert.sh Renaming 2018-03-29 00:58:36 +02:00
LICENSE Initial commit 2017-09-30 14:39:31 +02:00
README.md Renaming 2018-03-29 00:58:36 +02:00
ding Using actual ConfigParser call; dingd has -c for config file 2020-05-02 20:24:16 +02:00
ding.cfg Renaming 2018-03-29 00:58:36 +02:00
ding.win.cfg Renaming 2018-03-29 00:58:36 +02:00
dingd Using actual ConfigParser call; dingd has -c for config file 2020-05-02 20:24:16 +02:00
dingd.cfg Renaming 2018-03-29 00:58:36 +02:00
dingd.win.cfg Renaming 2018-03-29 00:58:36 +02:00

README.md

ding

What is ding?

ding is a client-server thing written in python3. Its aim is to execute a set of commands remotely. The commands can be set in the server's config file.

How does it work?

The server will wait for a command to be sent by a client. If the command is present within the server's config file it will then execute the command, else nothing will happen.

What about ding's security?

The authentication is done via a SSL Client Certificate signed by an (self generated) Certificate Authority. The scripts for generating a CA and signing the Server/Client Certificates are also included to make it (relatively) easy. [ This involves typing in a few certificate details and entering a previously defined CA password. ]

Pic or didn't happen

Screenshot of ding Can't read a thing?

Requirements

  • Install python3 on your target computers.

Installation

At every step please read carefully what the generate certificates scripts want from you. The information on the certificates doesn't need to be true and can be totally random. They only need to be different from one another.

Step 1 to 3 can only be run on UNIX or GNU/Linux.

  1. Run ./1_generateCA.sh to generate a CA.
  2. Run ./2_generateServCert.sh to generate a signed Server Certificate.
  3. Run ./3_generateClientCert.sh to generate a signed Client Certificate.
  4. Move ding, ding.cfg, ding.crt, ding.key and CA.crt to the computer which should be able to send commands to the server.
    • UNIX or GNU/Linux: Also move ding.cfg to that computer.
    • Windows: Also move ding.win.cfg to that computer.
  5. Do some configuration on the server and client (dingd.cfg, ding.cfg or dingd.win.cfg, ding.win.cfg on Windows).
  6. Start the server using ./dingd or python .\dingd on Windows. (You may want to put this in a tmux session. [Ctrl+B, D] ;) ).
  7. Try out the client using ./ding <command> òr python .\ding <command> on Windows.

Optional: Cleartext password with timeout

If you want to be sure that this power won't be abused by bad people using your computer, you may want to add a password (saved in cleartext). The password will be sent inside the TLS connection.

Warning! Beware of the shell history!

You might want to do something like $ history -c after sending the password via the client or play around with bash's HISTCONTROL variable.

How to enable the password

  1. Open your dingd.cfg or dingd.win.cfg.
  2. Set pw_on=true.
  3. Set a password, like password=abc def.
  4. Set a password timeout: pwtimeout=10 for 10 seconds.

If you have a password with special characters as in spaces and the like, you may want to use quotation marks around your password. ./ding "abc def" or python .\ding "abc def" on Windows.