Skip to content
/ siglatch Public
forked from linearblade/siglatch

A lightweight, cryptographically-authenticated UDP daemon for remote access, logging, and job control.

License

Notifications You must be signed in to change notification settings

mkll/siglatch

 
 

Repository files navigation

📖 README.md — siglatch

🔒 Project Overview

Siglatch — Tight, scriptable, and cryptographically enforced access controller for connectionless protocols and remote infrastructure management in hostile network environments.

Siglatch enables fine-grained, per-user, per-action control with strong cryptographic authentication — purpose-built for UDP and similar transport layers where traditional session security is impractical or overkill. Designed for environments where minimalism, determinism, and security are non-negotiable.

It draws inspiration from port knocking, encrypted messaging, and dead drop mechanics to:

  • Control access without exposing traditional open ports.
  • Authenticate commands securely with layered encryption and HMAC validation.
  • Enable flexible operations via scriptable hooks, user action controls, and future menu-driven services.

Designed with security, operational flexibility, and minimal visibility in mind, siglatch provides:

  • Temporary and revocable network access.
  • Hardened packet validation against replay and tampering.
  • Options for stealth deployment (no logs, no responses).
  • Room for future expansions (server-to-client replies, larger data payloads, anonymous communication).

One packet to rule them all.

This project prioritizes robustness, usability, and survivability in unpredictable or adversarial network conditions.


🌎 Real-World Use Cases

Siglatch is designed to securely enable or disable access to sensitive services—without relying on bloated VPNs, heavyweight web stacks, or shell hacks.

Examples include:


  • SSH Access Management
    Grant or revoke specific IPs the ability to SSH into critical systems.
    Still uses SSH keys for authentication—Siglatch simply decides who gets to knock.
    Ideal for mobile users, dynamic IPs, and zero-trust environments.

  • Web Service Control
    Securely toggle access to local dashboards, admin panels, or internal UIs.
    Services stay hidden until explicitly enabled, reducing attack surface.

  • Dead Drop Communication (live)
    Stateless encrypted payload exchange—no sessions, no metadata.
    Useful for whistleblowing, anonymous tips, or passive covert delivery.
    Siglatch handles this natively with one-way crypto-authenticated packets.

  • Interserver Signaling & Command Dispatch
    Push secure instructions (e.g., reload, rotate, notify) between daemons.
    Acts as a low-latency, authenticated internal control bus.
    Ideal for config sync, health triggers, and lightweight orchestration.

  • Log Forwarding & Job Scheduling
    Replace fragile syslog chains and scattered cron jobs with centralized, secure triggers.
    Log events and timed actions can be dispatched with encrypted, low-cost Siglatch messages.

  • Inline C Plugin Support (coming soon)
    Drop in .so modules to handle requests without shelling out or restarting the daemon.
    Achieve sub-millisecond response times for logs, access gates, or custom handlers.

In short: everything you want to control surgically and securely—without the babysitting, overhead, or footprint of traditional VPNs, HTTP servers, or orchestration systems.


📚 Documentation

These guides are being actively updated, check back often for updates!

Please read the above documents carefully to understand setup procedures, operational safety, and future plans.


🧠 Final Notes

This project is under active development. Expect rapid improvements, especially around:

  • Interactive client features.
  • Server-to-client encrypted messaging.
  • Dynamic system management (emergency sleep/shutdown controls).
  • Expanded operational tooling.
  • Dead drop communication support for lightweight, potentially anonymous exchanges.

Siglatch is built for operators who need control, security, and minimal exposure.


(Updated: 2025)

About

A lightweight, cryptographically-authenticated UDP daemon for remote access, logging, and job control.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C 86.2%
  • Shell 9.1%
  • Perl 3.3%
  • Makefile 1.1%
  • PHP 0.3%