Knocker, a knock based access control system for your homelab
AI-generated “vibe coded” security software
- Many are uneasy about using an LLM‑generated project as an internet-facing security boundary, especially for homelabs.
- Several argue the “vibe coded” disclaimer should be at the top of the README and that GitHub should have an “LLM”/AI language tag.
- Others question why AI authorship is singled out vs unknown human competence, warning that shaming disclosures will discourage honesty.
- Critics say LLM code tends to be tangled, overgrown, and often beyond the author’s ability to fully review, making it riskier for security use.
Port knocking and security-through-obscurity
- A large contingent calls port knocking “stupid” or “hacky,” seeing it as security theater better replaced by WireGuard or equivalent.
- Others defend it as an extra filter: reduces log noise, blocks scanners, and adds camouflage, but not a primary security control.
- Some stress that in modern CGNAT/public Wi‑Fi scenarios, IP-based knocking/whitelisting provides little real security.
VPNs, WireGuard, and Tailscale vs Knocker
- Many recommend WireGuard (or Tailscale/Headscale) as the proper way to gate homelabs, with WireGuard’s “silent until authenticated” behavior seen as strictly superior to knocking.
- Tailscale draws mixed views: praised for easy NAT traversal and UX, criticized as an unnecessary cloud dependency for self‑hosters.
- Knocker’s author positions it as more convenient when installing a VPN client everywhere (or on mobile alongside another VPN) is impractical.
Project design and threat model concerns
- README wording about “minimizing attack surface” is seen as potentially misleading; commenters urge explicit clarification it is less secure than a VPN, just more convenient.
- Several note this is essentially token-based auth driving temporary firewall rules, not classic multi-port “knocking.”
- TTL confusion: clarified that TTL applies to how long an IP stays whitelisted, not to key lifetime.
Broader tooling and layering debates
- Long subthreads argue over fail2ban and port knocking as “cargo-cult” vs useful layers that reduce noise and slow commodity attacks.
- Some insist all external-facing services should be reachable only via a secure VPN; others accept multiple layers (VPN, SSH, fail2ban, knocking) depending on risk and convenience.
Name expectations / playful ideas
- Several expected a physical knock-based system (desk/door knock patterns, audio sensors) and muse about building that instead.