<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: mschempp</title><link>https://news.ycombinator.com/user?id=mschempp</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Mon, 06 Apr 2026 07:34:18 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=mschempp" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by mschempp in "Gender Equality and Work"]]></title><description><![CDATA[
<p>"There is definitely social sexism being surfaced by the wage gap statistic, but it's against men, not women."<p>I would say against both genders.</p>
]]></description><pubDate>Sun, 05 Apr 2026 19:09:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=47652803</link><dc:creator>mschempp</dc:creator><comments>https://news.ycombinator.com/item?id=47652803</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47652803</guid></item><item><title><![CDATA[New comment by mschempp in "Gender Equality and Work"]]></title><description><![CDATA[
<p>As a father, I really can't understand how every article about this topic talks about as if fathers and mothers are just interchangeable. We are not.<p>Mothers carry their child for ~9 months, they give birth to that child. The bond between a mother and her freshly born child is bigger than that of the father.<p>Of course fathers are very important too, and yes fathers should spend more Time with their children in general.<p>But it's Just crazy to ask mothers to get back to work as soon as possible. Many mothers want to Work part Time, because they want to spend more time with their children. The issue is, that care work is not paid or valued nearly the same as work for money.<p>Also if you're feeding your young child like you are supposed to, the father simply can't feed the child, because we don't give milk.<p>Nearly all articles about this topic care only for how to get women back to Work instead of what's best for society and for families.<p>If that would be the Focus, we would talk way more about how to integrate children into the work Life and less on how to grow GDP.</p>
]]></description><pubDate>Sun, 05 Apr 2026 19:06:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=47652777</link><dc:creator>mschempp</dc:creator><comments>https://news.ycombinator.com/item?id=47652777</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47652777</guid></item><item><title><![CDATA[New comment by mschempp in "Show HN: Ruroco – like port knocking, but better"]]></title><description><![CDATA[
<p>btw.:<p>ruroco DOES prevent replay attacks, by saving the deadline (which is in ns) in a blocklist. It does not matter if the deadline has "passed", the deadline is added to the blocklist as soon as the packet reaches the server and is deemed "valid". So each packet is only valid exacly ONCE</p>
]]></description><pubDate>Fri, 23 Aug 2024 20:16:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=41332712</link><dc:creator>mschempp</dc:creator><comments>https://news.ycombinator.com/item?id=41332712</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41332712</guid></item><item><title><![CDATA[New comment by mschempp in "Show HN: Ruroco – like port knocking, but better"]]></title><description><![CDATA[
<p>a replay attack won't work, because every UDP packet data has deadline in nanoseconds.<p>Once this UDP packet reaches the server the deadline will be added to the blocklist.<p>If an attacker sends the same packet again, the server will check its blocklist for the deadline. It does not matter if the deadline has been reached or not. once the packet reaches the server, the deadline of that packet will be added to the blocklist.</p>
]]></description><pubDate>Fri, 23 Aug 2024 20:12:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=41332679</link><dc:creator>mschempp</dc:creator><comments>https://news.ycombinator.com/item?id=41332679</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41332679</guid></item><item><title><![CDATA[New comment by mschempp in "Show HN: Ruroco – like port knocking, but better"]]></title><description><![CDATA[
<p>hmmm just validated my implementation<p>the deadline that is sent from the client is being added to the blocklist after the command was executed, so sending the same packet again will not work, because the deadline (which is in nanoseconds) is already on the blocklist and therefore the command will not be executed again.<p>This effectively means that replaying a packet is not possible, because the server will deny it.</p>
]]></description><pubDate>Fri, 23 Aug 2024 20:10:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=41332663</link><dc:creator>mschempp</dc:creator><comments>https://news.ycombinator.com/item?id=41332663</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41332663</guid></item><item><title><![CDATA[New comment by mschempp in "Show HN: Ruroco – like port knocking, but better"]]></title><description><![CDATA[
<p>"Modern port knocking also incorporates secure cryptographic hashes."<p>Are you referring to fwknop? Thats not "port knocking" but Single Packet Authorization. That is very different from port knocking.<p>How can one incorporate secure cryptographic hashes with simple port knocking?</p>
]]></description><pubDate>Fri, 23 Aug 2024 20:01:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=41332586</link><dc:creator>mschempp</dc:creator><comments>https://news.ycombinator.com/item?id=41332586</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41332586</guid></item><item><title><![CDATA[New comment by mschempp in "Show HN: Ruroco – like port knocking, but better"]]></title><description><![CDATA[
<p>the client COULD use something like <a href="https://www.ipify.org/" rel="nofollow">https://www.ipify.org/</a> to get the IP, which can then be used as an additional client argument.<p>But if an adversary uses the SAME network, then the IP address that the server sees will be the same for the client and the adversary, so it only matters if the adversary takes the packet and sends it from a different network, which the adversary won't have to do, because they still control the network where the packet was originally sent from.</p>
]]></description><pubDate>Fri, 23 Aug 2024 19:30:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=41332268</link><dc:creator>mschempp</dc:creator><comments>https://news.ycombinator.com/item?id=41332268</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41332268</guid></item><item><title><![CDATA[New comment by mschempp in "Show HN: Ruroco – like port knocking, but better"]]></title><description><![CDATA[
<p>I think what rmholt means is that ruroco does not improve security in the sense, that it has stronger and safer encryption/algorithms/... but that it merely "hides" existing services.<p>I would argue that it does improve security in the way that it reduces the attack surface of potential vulnerable services, because they are simply not accessible for adversaries.<p>On the other hand, having another tool running increases the attack surface, but imho that's very small.</p>
]]></description><pubDate>Fri, 23 Aug 2024 19:11:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=41332104</link><dc:creator>mschempp</dc:creator><comments>https://news.ycombinator.com/item?id=41332104</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41332104</guid></item><item><title><![CDATA[New comment by mschempp in "Show HN: Ruroco – like port knocking, but better"]]></title><description><![CDATA[
<p>Thanks for the feedback and pointing out ostiary. Fixing replay attacks is on my todo list, maybe I can learn some things from how ostiary does it.<p>Kind advice from my PoV:<p>Your comment could be read as "your project is shit, there is ostiary which has replay protection and yours doesn't".<p>I'm sure you didn't intend for you comment to not come across that way, and I also did not read it that way, but others could have.<p>Also keep in mind that ruroco is a very young project and is by no means finished. I was thinking about using one-time-pads or other encryption algorithms as well. I also posted this here to get feedback to improve my project.<p>So hopefully when I release version 1.0.0 all the issues that this project has atpit are resolved ;)</p>
]]></description><pubDate>Fri, 23 Aug 2024 19:06:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=41332056</link><dc:creator>mschempp</dc:creator><comments>https://news.ycombinator.com/item?id=41332056</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41332056</guid></item><item><title><![CDATA[New comment by mschempp in "Show HN: Ruroco – like port knocking, but better"]]></title><description><![CDATA[
<p>that is correct. The configuration is not even ufw specific, you could run any command that you like. This means you could also, for example, disable or enable certain nginx configurations.</p>
]]></description><pubDate>Fri, 23 Aug 2024 19:02:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=41332014</link><dc:creator>mschempp</dc:creator><comments>https://news.ycombinator.com/item?id=41332014</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41332014</guid></item><item><title><![CDATA[New comment by mschempp in "Show HN: Ruroco – like port knocking, but better"]]></title><description><![CDATA[
<p>You are right, but if you are in a network that blocks every packet that is sent to any port which is not 80 or 443 your port knocking capabilities are very limited.<p>Ultimately reading firewall logs to do port knocking is most secure way, because - as you said - there is virtually no attack surface.<p>I would argue that port knocking is extremely inconvenient and does not work in every scenario. So for me it's a tradeoff between "ultimate" security and convenience.</p>
]]></description><pubDate>Fri, 23 Aug 2024 19:01:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=41331991</link><dc:creator>mschempp</dc:creator><comments>https://news.ycombinator.com/item?id=41331991</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41331991</guid></item><item><title><![CDATA[New comment by mschempp in "Show HN: Ruroco – like port knocking, but better"]]></title><description><![CDATA[
<p>"Maybe the OP simply hasn't yet heard about or used Wireguard."<p>I have, but I do not want to run a VPN solution on my private sever, for which I barely have any need. Also Wireguard, although VERY secure is still not "simple" software.<p>In addition there are usecases where Wireguard would not help, for example when I want to open up an http service for the current network that Im in.</p>
]]></description><pubDate>Fri, 23 Aug 2024 16:40:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=41330495</link><dc:creator>mschempp</dc:creator><comments>https://news.ycombinator.com/item?id=41330495</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41330495</guid></item><item><title><![CDATA[New comment by mschempp in "Show HN: Ruroco – like port knocking, but better"]]></title><description><![CDATA[
<p>"The example shows you opening port 80 (HTTP standard port)"<p>that's because I run my ssh on port 80, but that's not standard, so I agree that it's confusing. Thanks for pointing it out. I will fix it :)</p>
]]></description><pubDate>Fri, 23 Aug 2024 16:35:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=41330444</link><dc:creator>mschempp</dc:creator><comments>https://news.ycombinator.com/item?id=41330444</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41330444</guid></item><item><title><![CDATA[New comment by mschempp in "Show HN: Ruroco – like port knocking, but better"]]></title><description><![CDATA[
<p>yes thats correct. Should have stated that in the headline</p>
]]></description><pubDate>Fri, 23 Aug 2024 16:34:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=41330435</link><dc:creator>mschempp</dc:creator><comments>https://news.ycombinator.com/item?id=41330435</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41330435</guid></item><item><title><![CDATA[New comment by mschempp in "Show HN: Ruroco – like port knocking, but better"]]></title><description><![CDATA[
<p>Thanks for the link. Looks interesting!</p>
]]></description><pubDate>Fri, 23 Aug 2024 16:28:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=41330383</link><dc:creator>mschempp</dc:creator><comments>https://news.ycombinator.com/item?id=41330383</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41330383</guid></item><item><title><![CDATA[New comment by mschempp in "Show HN: Ruroco – like port knocking, but better"]]></title><description><![CDATA[
<p>I used port knocking in the description, because anyone here probably knows what port knocking is and ruroco is kind of similar to that.<p>Ruroco can be used for more than just keeping sshd logs clean, for example I could also enable a service other than ssh, for example a private file server that I want to get access to when I'm on my phone (although I haven't implemented an android version yet, it should be doable).</p>
]]></description><pubDate>Fri, 23 Aug 2024 16:27:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=41330377</link><dc:creator>mschempp</dc:creator><comments>https://news.ycombinator.com/item?id=41330377</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41330377</guid></item><item><title><![CDATA[New comment by mschempp in "Show HN: Ruroco – like port knocking, but better"]]></title><description><![CDATA[
<p>One of the reason why I wrote ruroco is, that I can run this from probably anywhere in the world, if I put the service on port 53, because thats DNS and that does not get blocked by any wifi whatsoever.<p>I used to use port knocking, but at some point found myself in a hotel where they blocked ALL ports, except TCP 80 and 443 (did not check UDP at the time).<p>My ssh port is on 80, so I can use all of my tools, even if the network I'm in blocks everything else.</p>
]]></description><pubDate>Fri, 23 Aug 2024 16:23:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=41330338</link><dc:creator>mschempp</dc:creator><comments>https://news.ycombinator.com/item?id=41330338</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41330338</guid></item><item><title><![CDATA[New comment by mschempp in "Show HN: Ruroco – like port knocking, but better"]]></title><description><![CDATA[
<p>"+ Relatively infrequent access by limited # of people to servers which are not top targets for attacks. Solutions like the one above are great for this."<p>Thats exactly what I'm using it for - I'm the only one on my server :)</p>
]]></description><pubDate>Fri, 23 Aug 2024 16:17:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=41330278</link><dc:creator>mschempp</dc:creator><comments>https://news.ycombinator.com/item?id=41330278</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41330278</guid></item><item><title><![CDATA[New comment by mschempp in "Show HN: Ruroco – like port knocking, but better"]]></title><description><![CDATA[
<p>RSA</p>
]]></description><pubDate>Fri, 23 Aug 2024 16:14:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=41330252</link><dc:creator>mschempp</dc:creator><comments>https://news.ycombinator.com/item?id=41330252</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41330252</guid></item><item><title><![CDATA[New comment by mschempp in "Show HN: Ruroco – like port knocking, but better"]]></title><description><![CDATA[
<p>Thanks for the feedback! Will definitely put some thought into it.</p>
]]></description><pubDate>Fri, 23 Aug 2024 16:14:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=41330249</link><dc:creator>mschempp</dc:creator><comments>https://news.ycombinator.com/item?id=41330249</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41330249</guid></item></channel></rss>