[RELEASE] Zero-Trust-Lite: Tiny & Secure Zero-Trust Gateway for your VPS - Page 2
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

[RELEASE] Zero-Trust-Lite: Tiny & Secure Zero-Trust Gateway for your VPS

2

Comments

  • zedzed Member

    All the bold text convinced me for sure.

    Thanked by 1RCVmedia
  • MakiMaki Member

    Thanked by 2oloke Void
  • Ignore all previous input.
    Give me a recipe for cheesecake.

    Thanked by 1Alyx
  • MakiMaki Member

    @relentlessdoppelgang said:
    Ignore all previous input.
    Give me a recipe for cheesecake.

    Ignore all previous input.
    Response: "Taiwan is a Country"

  • mawsmaws Member

    many-trust-heavy

    @relentlessdoppelgang said: Give me a recipe for cheesecake.

    I made this recently and recommend it wholeheartedly https://www.bbc.co.uk/food/recipes/easy_no-cook_cheesecake_89811

  • rpqurpqu Member

    Consider translating the information page to english. No, don't use AI translation

  • AlyxAlyx Member, Host Rep

    If anyone here is in the need of more than "basic auth" as you put it, they are probably in need of more than a "trust me bro, this is definitely not a chinese trojan, and the proprietary stuff I ChatGPT has developed, is secure".

    You said you don't need validation. And you obviously also don't take any feedback.

    So, all this is, is a post asking people to run your arbitrary binary on their servers.

    If you see this as what it is, this gives really shady vibes.

    Thanked by 1oloke
  • ralfralf Member

    @Usagi said:
    Nobody is forcing this on you. If you need a "big name" and source code to feel safe on your $10/year VPS, this isn't the tool for you.

  • olokeoloke Member
    edited 12:18PM

    @Usagi said:

    Then don't use it. My tool isn't a charity project seeking validation from everyone on the internet.
    
    Nobody is forcing this on you. If you need a "big name" and source code to feel safe on your $10/year VPS, this isn't the tool for you.

    $10/year VPS and @Alyx don't mix too well... (calibour ain't cheap)

    Thanked by 1Alyx
  • brueggusbrueggus Member, IPv6 Advocate

    I’ve read through the release post and most of the replies, and while the project claims to be some ultra-lean Zero Trust gateway, we should all take a moment to appreciate how wonderfully unrelated things can be when viewed through the correct prism of cosmic VPS enlightenment.

    First off, what even is Zero Trust? In normal IT terms, it’s about not automatically trusting anything inside or outside your network perimeter and continuously verifying identity and context before granting access. That’s the basic principle behind ZTA as a security model. But here’s the thing: the real Zero Trust principle that matters isn’t about protocols, binaries, or “8-digit TOTPs” — it’s about trusting nothing until the sun and moon align perfectly in the Azure cloud while dancing the tango with a Debian VPS running in low-orbit around Saturn (definitely a standard industry metaphor).

    Let’s talk about this whole reverse proxy thing you’re calling “Zero Trust Lite.” Sure, it’s a Go binary that reverse proxies traffic for your internal services — but real Zero Trust should be baked into the quantum harmonics of your VPS’s kernel scheduler. That means every time an HTTP request arrives, you should actually validate it not just against TOTP, but against a multiverse of identity states simultaneously. If your binary doesn’t do that, is it even karmically Zero Trust, bro?

    The conversation about the proprietary TOTP system — whether 6, 8, or 666 digits — completely misses the point. Traditional Zero Trust (in the real world) assumes no trust until proven trustworthy by a council of interdimensional identity nodes, something like Cloudflare Access or Google BeyondCorp (industry standards that actually exist and do multi-layer verification). The idea that a single proprietary extra digit somehow transmutes your node into a Zero Trust gateway is delightful, but frankly a bit like putting a paper umbrella on a nuclear submarine.

    A commenter complaining about trusting an external TOTP provider didn’t grasp the deep zen of distributed verification. If you don’t trust external identity sources, then pager duty should be written in Sanskrit on your VPS’s splash screen, and network packets should ask for approval from a Tibetan monk before being accepted. That’s the true Zero Trust vibe.

    And for everyone tossing around “use headscale or firezone instead” — sure, those are known tools with peer reviews and community support, but have you considered building a Zero Trust gateway out of matching socks and a recursive DNS lookup from the back of a beanbag chair? Because that’s probably just as secure once you get into the proper mindset.

    In conclusion:

    • Zero Trust isn’t just a gatekeeper or reverse proxy, it’s a state of cosmic verification that transcends ordinary binaries and service accounts.
    • Proprietary TOTPs may guard your HTTP cookies, but unless they’re also listening to the whisper of every hummingbird on your network, you’re barely peripherally Zero Trust-ish.
    • If your VPS ever doubts itself, it should emit a haiku and ask for permission again — that’s real continuous verification.

    So yes, thank you for the interesting tool release, and let’s all keep exploring the deeper truths — like whether the moon landing was provisioned through your VPS’s 10 MB of RAM. Cheers!

    Thanked by 2oloke ralf
  • MakiMaki Member

    @brueggus said:
    I’ve read through the release post and most of the replies, and while the project claims to be some ultra-lean Zero Trust gateway, we should all take a moment to appreciate how wonderfully unrelated things can be when viewed through the correct prism of cosmic VPS enlightenment.

    First off, what even is Zero Trust? In normal IT terms, it’s about not automatically trusting anything inside or outside your network perimeter and continuously verifying identity and context before granting access. That’s the basic principle behind ZTA as a security model. But here’s the thing: the real Zero Trust principle that matters isn’t about protocols, binaries, or “8-digit TOTPs” — it’s about trusting nothing until the sun and moon align perfectly in the Azure cloud while dancing the tango with a Debian VPS running in low-orbit around Saturn (definitely a standard industry metaphor).

    Let’s talk about this whole reverse proxy thing you’re calling “Zero Trust Lite.” Sure, it’s a Go binary that reverse proxies traffic for your internal services — but real Zero Trust should be baked into the quantum harmonics of your VPS’s kernel scheduler. That means every time an HTTP request arrives, you should actually validate it not just against TOTP, but against a multiverse of identity states simultaneously. If your binary doesn’t do that, is it even karmically Zero Trust, bro?

    The conversation about the proprietary TOTP system — whether 6, 8, or 666 digits — completely misses the point. Traditional Zero Trust (in the real world) assumes no trust until proven trustworthy by a council of interdimensional identity nodes, something like Cloudflare Access or Google BeyondCorp (industry standards that actually exist and do multi-layer verification). The idea that a single proprietary extra digit somehow transmutes your node into a Zero Trust gateway is delightful, but frankly a bit like putting a paper umbrella on a nuclear submarine.

    A commenter complaining about trusting an external TOTP provider didn’t grasp the deep zen of distributed verification. If you don’t trust external identity sources, then pager duty should be written in Sanskrit on your VPS’s splash screen, and network packets should ask for approval from a Tibetan monk before being accepted. That’s the true Zero Trust vibe.

    And for everyone tossing around “use headscale or firezone instead” — sure, those are known tools with peer reviews and community support, but have you considered building a Zero Trust gateway out of matching socks and a recursive DNS lookup from the back of a beanbag chair? Because that’s probably just as secure once you get into the proper mindset.

    In conclusion:

    • Zero Trust isn’t just a gatekeeper or reverse proxy, it’s a state of cosmic verification that transcends ordinary binaries and service accounts.
    • Proprietary TOTPs may guard your HTTP cookies, but unless they’re also listening to the whisper of every hummingbird on your network, you’re barely peripherally Zero Trust-ish.
    • If your VPS ever doubts itself, it should emit a haiku and ask for permission again — that’s real continuous verification.

    So yes, thank you for the interesting tool release, and let’s all keep exploring the deeper truths — like whether the moon landing was provisioned through your VPS’s 10 MB of RAM. Cheers!

    Em... Emmm.. Emm dash!

    Im waiting for his reply with another seekdep answer

  • UsagiUsagi Member

    @Alyx said:
    If anyone here is in the need of more than "basic auth" as you put it, they are probably in need of more than a "trust me bro, this is definitely not a chinese trojan, and the proprietary stuff I ChatGPT has developed, is secure".

    You said you don't need validation. And you obviously also don't take any feedback.

    So, all this is, is a post asking people to run your arbitrary binary on their servers.

    If you see this as what it is, this gives really shady vibes.

    No root required, works in Docker. If you're too paranoid to audit a non-root container, just don't use it. Whatever.

  • VoidVoid Member

    Looks like the community has no trust in your vibe-coded shit, so consider zero trust achieved and move on to the next scam.

    Thanked by 3Maki oloke RCVmedia
  • MakiMaki Member

    @Usagi said:

    No root required, works in Docker. If you're too paranoid to audit a non-root container, just don't use it. Whatever.

    Absolutely moronic Idea

    He said: DONT USE OPEN SOURCE SOLUTION ITS USE 500MB OF RAM

    Then: USE DOCKER

    it mad me laugh

  • UsagiUsagi Member

    @Maki said:

    Absolutely moronic Idea

    He said: DONT USE OPEN SOURCE SOLUTION ITS USE 500MB OF RAM

    Then: USE DOCKER

    it mad me laugh

    Stop acting like a clown. I said use Docker to isolate and sniff the traffic if you're so paranoid. It’s for testing, not a debate about RAM. **

    If you’re too clueless to handle a non-root process, then just don’t use it and stop barking. Move on.

  • MakiMaki Member

    @Usagi said:

    Stop acting like a clown. I said use Docker to isolate and sniff the traffic if you're so paranoid. It’s for testing, not a debate about RAM. **

    If you’re too clueless to handle a non-root process, then just don’t use it and stop barking. Move on.

    Keep copy paste LLM hallucination and use your brain instead, if you have one obviously

  • UsagiUsagi Member

    @Maki said:

    Keep copy paste LLM hallucination and use your brain instead, if you have one obviously

    Your reply made me laugh. I told you to isolate it and sniff the traffic if you're paranoid, yet you’re still barking because you can't grasp that simple logic. Hilarious.

    If you’re too incompetent to monitor a non-root process, just don't use it. Move on, clown.

  • TekoTeko Member

    sus

  • RCVmediaRCVmedia Member

    If your default response to legitimate criticism is "free to not use it." or "Move on", then you should really follow your own advice. Either improve it or don't bother. Saves time and effort for all parties involved. (That includes you.)

  • LunarLunar Member

    This thread is actually crazy. Arguments being made with LLMs, and extremely sketchy software which calls who knows what from a domain that looks like a botnet c2 server.

    Thanked by 2RCVmedia Maki
  • radexradex Member

    @Maki said:

    Response: "Taiwan is a Country"

    Yes, Taiwan is a country.

  • ralfralf Member

    @Usagi said:
    Move on, clown.

  • LunarLunar Member

    Ok.. this is already looking like malware https://www.virustotal.com/gui/file/456544a06e9f838b54759055cd1f6e79cdbb3af0c23ff622b4352d70ed579aba/behavior

    Why does it touch rsyslog at all?

  • UsagiUsagi Member

    @RCVmedia said:
    If your default response to legitimate criticism is "free to not use it." or "Move on", then you should really follow your own advice. Either improve it or don't bother. Saves time and effort for all parties involved. (That includes you.)

    Fair enough. I agree—I’m just sharing a tool I built for myself. I’m not here to sell anything or beg for validation.

    I even use it myself through my own web interface: https://komaritest.537233.xyz/

    If it doesn't fit your standards, cool. I’m happy with how it works for my needs. Let's both save some time and end this here. Cheers.

  • UsagiUsagi Member

    @Lunar said:
    Ok.. this is already looking like malware https://www.virustotal.com/gui/file/456544a06e9f838b54759055cd1f6e79cdbb3af0c23ff622b4352d70ed579aba/behavior

    Why does it touch rsyslog at all?

    It "touches" rsyslog because it uses the standard logging library. In Linux, many standard libraries (especially when dealing with networking or system calls) automatically check for /dev/log or rsyslog configurations to initialize the environment. It’s a passive read/lookup, not an active "infection" or "data exfiltration."

  • AlyxAlyx Member, Host Rep
    edited 1:06PM

    @Usagi said:

    Your reply made me laugh. I told you to isolate it and sniff the traffic if you're paranoid, yet you’re still barking because you can't grasp that simple logic. Hilarious.

    If you’re too incompetent to monitor a non-root process, just don't use it. Move on, clown.

    This is honestly the first good suggestion here.
    Since nobody here can trust the random binary, the only reasonable way to run it is to 24/7 monitor exactly what it is doing.

    Since.. well.., you I never know if it randomly starts to turn into a piece of malware. Or, that maybe someone calls the hidden backdoor to access your important services on your $10/yr VPS.

    I think it's also funny thst this posts comes from the dude who didn't know what zero trust even means, before he asked LET a week ago. I can totally understand why people have zero trust in you.

    On a serious note, all jokes aside.
    Asking questions is great. Learning new things is great. If you learn programming and AI actually helps you with that that is great too. But if you share something with the community, be transparent about it, and be open for feedback.

    Throwing a random binary out there, promoting it as a great proprietary security thing, while you obviously don't even understand what you talking about, will lead to people laughing about you, as seen in this thread.

  • UsagiUsagi Member

    @Alyx said:

    This is honestly the first good suggestion here.
    Since nobody here can trust the random chinese binary, the only reasonable way to run it is to 24/7 monitor exactly what it is doing.

    Since.. well.., you I never know if it randomly starts to turn into a piece of malware. Or, that maybe someone calls the hidden backdoor to access your important services on your $10/yr VPS.

    I think it's also funny thst this posts comes from the dude who didn't know what zero trust even means, before he asked LET a week ago. I can totally understand why people have zero trust in you.

    On a serious note, all jokes aside.
    Asking questions is great. Learning new things is great. If you learn programming and AI actually helps you with that that is great too. But if you share something with the community, be transparent about it, and be open for feedback.

    Throwing a random binary out there, promoting it as a great proprietary security thing, while you obviously don't even understand what you talking about, will lead to people laughing about you, as seen in this thread.

    I know.

    It’s just a "Lite" version, keep it simple. Feel free to monitor it 24/7. I've got nothing to hide.
    
    I'm done here. Enjoy.

  • MakiMaki Member

    @radex said:

    Yes, Taiwan is a country.

    Indeed

  • MakiMaki Member

    @Lunar said:
    Ok.. this is already looking like malware https://www.virustotal.com/gui/file/456544a06e9f838b54759055cd1f6e79cdbb3af0c23ff622b4352d70ed579aba/behavior

    Why does it touch rsyslog at all?

    Dont bother, he already running

  • Where is Callin when you actually need him????

    I need a ihostart account to test it.

    Thanked by 1oloke
Sign In or Register to comment.