Skip to content

Enterprise-Grade Privacy and Security

Welcome to Kodachi Security Binaries

A collection of high-performance Rust-based security tools that form the backbone of Linux Kodachi's privacy and anonymity infrastructure. These production-ready binaries provide enterprise-level security features for advanced privacy protection and system hardening.

Core Architecture Principles

Zero-Trust Architecture: Authentication-first design with granular authorization and certificate pinning

Memory-Safe Implementation: Rust-first design with comprehensive error handling and rigorous safety practices

Modular Design: Independent services with shared libraries through cli-core, auth-shared, and logs-hook

Forensic Resistance: Multi-pass secure wiping, memory cleaning, emergency data destruction capabilities


🛡️ Binary Categories and Requirements

Network and Privacy Tools

Binary Primary Function Requires Auth Requires Sudo Auto-Start
tor-switch Advanced Tor network orchestration (70+ commands) Mixed (73%) Yes (iptables/nftables) No
routing-switch Multi-protocol routing (12 protocols) Mixed (61%) Yes (network config) No
ip-fetch Secure IP geolocation with multi-source verification Mixed (8%) No (sudo only for system changes) No
dns-switch DNS management with 50+ secure resolver options Mixed (44%) Yes (system DNS) No
dns-leak Real-time DNS leak detection and analysis Mixed (25%) No No

System Security and Protection

Binary Primary Function Requires Auth Requires Sudo Auto-Start
health-control Emergency kill switches and panic modes Mixed (61%) Yes (system ops) No
integrity-check Cryptographic system integrity verification No No No
permission-guard Real-time permission monitoring and enforcement No No No
online-auth Secure authentication and heartbeat monitoring No Yes (system-wide) No (manual start)

Infrastructure and Management

Binary Primary Function Requires Auth Requires Sudo Auto-Start
logs-hook Centralized secure logging infrastructure No No Auto-integrated by all
deps-checker Dependency validation and security auditing No No No
global-launcher System-wide binary deployment manager No No No
online-info-switch Online information hub and RSS feeds Mixed (58%) No No

🛡️ Inter-Binary Dependencies Matrix

Binary Communication Flow

Service Calls These Binaries Called By These Binaries
online-auth logs-hook Authentication required by: ip-fetch, tor-switch, routing-switch, dns-switch, dns-leak, health-control, online-info-switch
logs-hook None Integrated by all services for centralized logging
ip-fetch logs-hook, online-auth, routing-switch tor-switch, routing-switch, dns-switch, dns-leak
tor-switch logs-hook, online-auth, ip-fetch routing-switch
routing-switch logs-hook, online-auth, tor-switch, ip-fetch health-control, ip-fetch
dns-switch logs-hook, online-auth, ip-fetch None
dns-leak logs-hook, online-auth, ip-fetch None
health-control logs-hook, online-auth, routing-switch dns-switch, online-info-switch
integrity-check logs-hook None
permission-guard logs-hook Can be used alongside online-auth for permission checks
deps-checker logs-hook None
global-launcher logs-hook Can be orchestrated by online-auth for deployments
online-info-switch logs-hook, online-auth, health-control None

Critical Service Dependencies

Dependency Type Description Affected Services
Authentication Chain Services requiring valid authentication before operation ip-fetch, tor-switch, routing-switch, dns-switch, dns-leak, health-control, online-info-switch
Logging Infrastructure All services use logs-hook for centralized logging ALL binaries
IP Verification Services that call ip-fetch for network testing tor-switch, routing-switch, dns-switch, dns-leak
System Management Services that may interact with online-auth permission-guard, global-launcher

🛡️ Authentication Requirements Matrix

Authentication Quick Reference (Sorted by Command Count)

Service Total Auth No Auth Auth Level Primary Use Case
health-control 186 114 72 ██████░░░░ Emergency kill switches, panic modes, system hardening
tor-switch 108 79 29 ███████░░░ Tor network orchestration with 70+ management commands
dns-switch 25 11 14 ████░░░░░░ DNS server management with 50+ resolver options
routing-switch 18 11 7 ██████░░░░ Multi-protocol network routing configuration
online-auth 14 8 6 ██████░░░░ Authentication service and heartbeat monitoring
ip-fetch 13 1 12 █░░░░░░░░░ IP geolocation (auth only for bulk operations)
online-info-switch 12 7 5 ██████░░░░ Online information hub and RSS feeds
integrity-check 7 0 7 ░░░░░░░░░░ System integrity verification
dns-leak 4 1 3 ███░░░░░░░ DNS leak detection
permission-guard 4 0 4 ░░░░░░░░░░ Permission monitoring
deps-checker 4 0 4 ░░░░░░░░░░ Dependency validation
global-launcher 3 0 3 ░░░░░░░░░░ Binary deployment management
logs-hook 3 0 3 ░░░░░░░░░░ Centralized logging

Legend

Symbol Description
Auth Required Commands requiring valid authentication via online-auth
No Auth Commands that can run without authentication
Emergency Bypass Some services in health-control have emergency bypass commands for critical recovery

Authentication Dashboard

Key Insights

Overview Statistics

Total Commands 401
Auth Required 232 (57.9%)
No Auth 169 (42.1%)
Total Binaries 13

🔴 Highest Authentication

tor-switch 73% (79/108)
health-control 61% (114/186)
routing-switch 61% (11/18)

🟢 No Authentication Required

✓ integrity-check 7 cmds
✓ permission-guard 4 cmds
✓ deps-checker 4 cmds
✓ global-launcher 3 cmds
✓ logs-hook 3 cmds

Command Distribution

Top 3 binaries 79%
Average per binary 31 cmds
Median auth rate 25%

Binary Authentication Overview

health-control
186
61% auth
tor-switch
108
73% auth
dns-switch
25
44% auth
routing-switch
18
61% auth
online-auth
14
57% auth
ip-fetch
13
8% auth
online-info-switch
12
58% auth
integrity-check
7
0% auth
dns-leak
4
25% auth
permission-guard
4
0% auth
deps-checker
4
0% auth
global-launcher
3
0% auth
logs-hook
3
0% auth

Authentication Patterns by Service Type

Pattern Services Description
No Authentication logs-hook, global-launcher, deps-checker, permission-guard, integrity-check No auth-shared library usage
Mixed Authentication online-info-switch, dns-leak, routing-switch, ip-fetch, dns-switch, tor-switch, health-control Selective command authentication
Bulk Operations Auth ip-fetch Only bulk/multi operations require auth
Emergency Bypass health-control Critical recovery commands bypass auth
Special Provider online-auth Authentication provider service

Service-Specific Authentication Details


logs-hook

Total Commands: 3 | Auth Required: 0 | No Auth: 3

Commands Requiring Authentication Commands Without Authentication
logmaintenance rotatemaintenance wipe

global-launcher

Total Commands: 3 | Auth Required: 0 | No Auth: 3

Commands Requiring Authentication Commands Without Authentication
deployverifycleanup

deps-checker

Total Commands: 4 | Auth Required: 0 | No Auth: 4

Commands Requiring Authentication Commands Without Authentication
checkscanverifyreport

permission-guard

Total Commands: 4 | Auth Required: 0 | No Auth: 4

Commands Requiring Authentication Commands Without Authentication
watchconfigscanstatus

dns-leak

Total Commands: 4 | Auth Required: 1 | No Auth: 3

Commands Requiring Authentication Commands Without Authentication
test discoverreportresults

integrity-check

Total Commands: 7 | Auth Required: 0 | No Auth: 7

Commands Requiring Authentication Commands Without Authentication
generatecheck_allcheck_integritycheck_signaturescheck_versioncheck_configview_logs

online-info-switch

Total Commands: 12 | Auth Required: 7 | No Auth: 5

Commands Requiring Authentication Commands Without Authentication
set-onlineset-offlineset-autoclear-cachetest-connectivityrsspaste statuscheckinfolistfreshness

ip-fetch

Total Commands: 13 | Auth Required: 1 | No Auth: 12

Commands Requiring Authentication Commands Without Authentication
verify-multi fetchplain-ipauth-statusdebug-authtest-alltest-fallbackrandomtordnsgeocheck-torcache

online-auth

Total Commands: 14 | Auth Required: 8 | No Auth: 6

Commands Requiring Authentication Commands Without Authentication
sync-api-keyauthenticatelogoutsend-heartbeatsend-heartbeat-with-retrystart-heartbeatstop-heartbeatget-card check-logincheck-if-blockedget-idscheck-all-statuscheck-heartbeatwhich-group

routing-switch

Total Commands: 18 | Auth Required: 11 | No Auth: 7

Commands Requiring Authentication Commands Without Authentication
connecttest-protocolbenchmarkauto-selectexport-configshowconfigshowconfigurlshowconfigqrvalidate-qrtor-dns-infovps-info statusdns-infolist-protocolsdisconnectresetcleanuprecover

dns-switch

Total Commands: 25 | Auth Required: 11 | No Auth: 14

Commands Requiring Authentication Commands Without Authentication
switchrandomdnscrypt-setdnscrypt-restartpihole-enablepihole-passwordpihole-resethealthfetchfetch-countclean-duplicates fallbackdnscrypt-removepihole-disablefetch-dns-from-cardcleanbackuprestore-defaultrestore-backupdnscryptpiholestatuslistcounthelp

tor-switch

Total Commands: 108 | Auth Required: 79 | No Auth: 29

Commands Requiring Authentication Commands Without Authentication
start_torstop_torrestart_torcreate_instancedelete_instancedelete_all_instancesstart_instancestop_instancerestart_instancestart_all_instancesstop_all_instancesrestart_all_instancesset_default_instancerename_instanceclone_instancecreate_multiple_instancesset_exit_nodeset_exit_node_allset_exclude_nodeset_exclude_node_allclear_exit_nodeclear_exit_node_allnew_tor_circuitnew_tor_circuit_allreload_tor_configreload_tor_config_allbackup_configbackup_config_allrestore_configrestore_config_allgenerate_new_tor_passwordgenerate_new_tor_password_allclean_torrc_customclean_torrc_custom_allauto_ip_changestop_auto_ip_changeupdate_ip_timerupdate_ip_all_timerremove_ip_timerremove_ip_all_timergenerate_haproxy_confighaproxy_starthaproxy_stopset_load_balancing_modeset_instance_weighttorrify_system_iptables_load_balancedtorrify_system_nftables_load_balancedtorrify_system_iptablestorrify_system_nftablestorrify_system_dnstorrify_system_iptables_dnstorrify_system_nftables_dnsstart_tor_dns_iptablesstart_tor_dns_nftablesdetorrify_system_iptablesdetorrify_system_nftablesdetorrify_system_iptables_dnsdetorrify_system_nftables_dnsstop_tor_dns_iptablesstop_tor_dns_nftablescleanupclean_orphan_servicesrefresh_authflush_iptablesflush_nftablesvalidate_torrcvalidate_torrc_allverify_tor_dnsverify_tor_dns_allverify_tor_dns_directverify_tor_dns_portverify_authset_tor_bridgeset_tor_bridge_allclear_tor_bridgeclear_tor_bridge_allenable_tor_logsdisable_tor_logsview_tor_logs check_torcheck_tor_alltorverifytor_statustor_status_allget_tor_statusget_tor_status_allget_tor_custom_statusget_instance_pidwhich_is_activelist_instanceslist_haproxy_modeshaproxy_statusdisplay_load_balancing_configlist_iptableslist_nftableslist_ip_timerslist_torrclineslist_torrclines_allshow_torrc_customshow_torrc_custom_allget_instance_portget_control_portget_socks_portcheck_instance_statuscheck_bridgescheck_bridges_allmonitor_bandwidth

health-control

Total Commands: 186 | Auth Required: 114 | No Auth: 72

Commands Requiring Authentication Commands Without Authentication
block-internetkill-networkkill-network-interfacekill-processset-timezonesync-timezonechange-hostnameset-default-hostnameset-random-hostnameset-custom-hostnameset-random-hostname-categoryset-random-timezonemac-change-allmac-force-changemac-change-specificoffline-bluetoothoffline-wifioffline-usb-storageoffline-webcamoffline-microphoneoffline-system-logsoffline-cupsoffline-network-manageroffline-num-lockoffline-cmd-historyoffline-auto-loginoffline-screen-lockoffline-fd-limitoffline-net-optimizeoffline-bbroffline-if-speedoffline-avahioffline-modem-manageroffline-sshoffline-apacheoffline-nginxoffline-dockeroffline-mysqloffline-postgresqlsecurity-hardensecurity-recoversecurity-resetmonitoring-enablemonitoring-disableipv6-disableipv6-enabletirdad-enabletirdad-disableram-wipeswap-encryptswap-decryptluks-nukeluks-manageluks-removeluks-nuke-advancedluks-manage-advancedcreate-persistencecontainer-createcontainer-mountcontainer-unmountmemory-cleanmemory-force-cleanmemory-wipememory-wipe-processswap-configuredisable-swapenable-swapram-wipe-enableram-wipe-disableswap-enableswap-disableusbguard-enableusbguard-disableusb-policyusb-whiteliststorage-wipestorage-encryptencryption-tunekill-switch-armkill-switch-activatekloak-enablekloak-disablekloak-configurekloak-event-modeaide-updateaide-initaide-reinitaide-scan-dirauto-updates-enableauto-updates-disablesystem-maintenance-enablesystem-maintenance-disablepassword-policy-enablepassword-policy-disableuser-security-enableuser-security-disabletwo-factor-enabletwo-factor-disablecheck-and-install-dopackage-cleanupclear-cachecoldboot-defense-enablecoldboot-defense-disablememory-limits unblock-internetrecover-internetmac-reset-allkill-switch-disarmpanic-softpanic-mediumpanic-hardpanic-profilepanic-recovercreate-recovery-pointwipe-filewipe-directorywipe-logswipe-batchwipe-browser-datawipe-free-spacewipe-patternwipe-schedulewipe-verifynotifyplay-soundnet-checknet-check-httplist-ipslist-domainsget-hostnameget-logged-usershow-timezoneshow-remote-timezonelist-timezoneslist-hostnamesmac-show-interfacesmac-show-macsmac-active-interfacesecurity-statusipv6-statustirdad-statusram-wipe-statusdisk-encryption-statusswap-statusoffline-info-systemoffline-info-hardwareoffline-info-processoffline-info-securityoffline-info-networkoffline-info-useroffline-info-storageoffline-info-servicesoffline-info-allsecurity-scoresecurity-reportscoring-profilesecurity-historyrootkit-scanrootkit-scan-enhancedlynis-auditlynis-statusclamav-scansystem-auditinternet-statuskill-switch-statusencryption-statususb-listmemory-statsauto-updates-statussystem-maintenance-statuspassword-policy-statususer-security-statustwo-factor-statuskloak-statuskloak-statsaide-checkusb-monitorusb-historyhardware-rng-verifyentropy-statusboot-integrity-checkswap-encrypt-statuscheck-and-installsecurity-verifysecurity-remediate

Authentication Workflow

# 1. Initial Authentication
sudo ./online-auth authenticate --keep-alive

# 2. Verify Authentication
./online-auth check-login

# 3. Use Authenticated Services
sudo ./tor-switch start_tor              # Requires auth (all tor-switch commands)
sudo ./health-control block-internet     # Requires auth
./ip-fetch plain-ip                      # No auth needed

# 4. Emergency Operations (No Auth Required)
./health-control panic-soft              # Emergency bypass
./routing-switch disconnect              # Emergency recovery

# 5. Logout When Complete
./online-auth logout

Authentication Implementation Summary

Services With Authentication Requirements

Service Authentication Level Details
health-control Mixed Authentication 114 commands require auth, 72 emergency bypasses
tor-switch Mixed Authentication 79 commands require auth, 29 don't
dns-switch Mixed Authentication 11 commands require auth, 14 don't
online-info-switch Mixed Authentication 7 commands require auth, 5 don't
routing-switch Mixed Authentication 11 commands require auth, 7 emergency/status don't
online-auth Special Provider 8 commands require auth, 6 status don't
ip-fetch Selective Authentication Only 1 bulk operation requires auth, 12 don't
dns-leak Selective Authentication Only test command requires auth, 3 don't

Services NOT Using auth-shared Library

Service Authentication Details
logs-hook No Authentication Logging service - operates independently
global-launcher No Authentication Service launcher - no auth integration
deps-checker No Authentication Dependency checker - read-only operations
permission-guard No Authentication Permission monitor - operates independently
integrity-check No Authentication Integrity verification - no auth needed

Special Authentication Components

Component Role Purpose
online-auth Authentication Provider Primary authentication service managing sessions
auth-shared Authentication Library Shared library providing auth functionality to services
KODACHI_CALLING_SERVICE Environment Variable Service identity verification mechanism

🛡️ System Requirements and Permissions

Privilege Escalation Requirements

Operation Type Required Permissions Affected Binaries
Network Configuration sudo/root tor-switch (iptables/nftables), routing-switch, dns-switch
System Security sudo/root health-control (network/MAC/hostname operations)
Authentication Management sudo/root online-auth (system-wide operations)
Read-Only Operations Standard user ip-fetch, dns-leak, integrity-check, logs-hook

Service Daemon Capabilities

Service Daemon Mode Command Purpose
online-auth Heartbeat daemon online-auth authenticate --keep-alive Maintains authentication session
logs-hook Integrated by all services Automatic Centralized logging for all operations
global-launcher Service management Standalone Binary deployment and management

🛡️ Key Capabilities Overview

Advanced Network Operations

Feature Capability Details
Tor Operations 70+ Commands Complete control over instances, circuits, and exit nodes
Load Balancing Native Kernel-Level Traffic distribution across multiple Tor instances
Protocol Support 12 Protocols OpenVPN, WireGuard, Tor, Shadowsocks, V2Ray, Xray variants, and more
DNS Resolvers 50+ Options DNSCrypt, DoT, DoH, Pi-hole integration

Security and Protection

Feature Implementation Purpose
Emergency Kill Switch health-control kill-network Instant network termination
Panic System 3 Levels (Soft/Medium/Hard) Progressive data destruction
Data Wiping Multi-pass shredding Secure deletion with verification
MAC Randomization Auto/Manual modes Hardware address anonymization
Hostname Management Random generation System identity protection

System Integration

Aspect Approach Benefit
Memory Safety Rust-first implementation Robust error handling, no crashes
Performance Optimized binaries Fast response for critical operations
Output Format JSON-first design Easy automation and scripting
Path Detection Dynamic resolution Works on any Linux environment
Containment Execution folder only Enhanced security isolation

🛡️ Common Workflows

Network Anonymization Setup

# Authenticate and configure Tor
sudo ./online-auth authenticate
sudo ./tor-switch start_tor
sudo ./tor-switch torrify_system_nftables  # Prefer nftables (modern)
# sudo ./tor-switch torrify_system_iptables  # Alternative: iptables (legacy)
./ip-fetch fetch  # Fetch current IP info through Tor (ISP/ASN shows Tor exit node)

Multi-Protocol Routing

# Connect through various protocols
sudo ./routing-switch connect openvpn
sudo ./routing-switch connect shadowsocks
sudo ./routing-switch connect wireguard
sudo ./routing-switch status  # Check active routing
sudo ./routing-switch list-protocols  # List available protocols with scores
sudo ./routing-switch disconnect  # Disconnect current protocol

Security Hardening

# System hardening workflow
sudo ./health-control set-random-hostname
sudo ./health-control mac-change-all
sudo ./permission-guard scan
./integrity-check check_integrity --json

DNS Configuration

# Secure DNS setup
sudo ./dns-switch switch --category encrypted  # Use encrypted DNS
./dns-leak discover --json  # Discover and analyze DNS configuration
sudo ./dns-switch random --type encrypted --count 3  # Use random encrypted resolvers

Emergency Response

# Quick privacy mode
sudo ./health-control panic-soft
sudo ./tor-switch restart_tor  # Get new Tor circuit

# Complete shutdown
sudo ./health-control kill-network
sudo ./health-control wipe-logs

🛡️ Performance Metrics

Metric Value Description
Binary Count 13 Complete security suite
Total Size ~130MB All binaries combined
Protocol Support 12 Routing protocols supported
DNS Resolvers 50+ Available DNS options
Tor Commands 70+ Tor management operations

🛡️ Documentation Structure

User Guides

Category Description
Network Tools Detailed guides for network and anonymization tools
Security Tools Comprehensive security and authentication documentation
Protection Tools System protection and monitoring guides
Infrastructure Tools Service infrastructure and management documentation

API Reference

Reference Description
Binary Reference Complete command-line API documentation for all binaries

🛡️ Security Considerations

Important Security Notice

These tools provide powerful capabilities that should be used responsibly and in accordance with local laws and regulations. Kodachi OS and its binaries are designed for legitimate privacy protection and security testing purposes only.

Security Implementation Details

Feature Implementation
Authentication Services use KODACHI_CALLING_SERVICE environment variable for identity
Certificate Pinning TLS 1.3 with pinned certificates for network operations
Error Handling Comprehensive error propagation without crashes
Audit Trail All operations logged through centralized logs-hook service

Example JSON error response structure:

{
  "status": "error",
  "error": {
    "code": "AUTH_FAILED",
    "message": "Authentication required",
    "details": "Service requires valid authentication token",
    "timestamp": "2025-09-19T10:00:00Z"
  }
}

Authentication Flow

Step Command Purpose
1 sudo ./online-auth authenticate --keep-alive Initial authentication with keep-alive
2 ./online-auth check-login Check authentication status
3 Service usage Authenticated services automatically verify before execution
4 ./online-auth logout Logout when finished

🛡️ System Information

Component Version Build Date License
Kodachi OS 9.0.1 2025 Proprietary
Rust Binaries 9.0.1 2025-09-18 Proprietary
Documentation 9.0.1 2025-09-19 © 2025 Linux Kodachi
Author Warith Al Maawali - All Rights Reserved

Back to top