Skip to content

Security Tools

🛡️ Enterprise-Grade Security and Authentication Infrastructure

The security tools in Kodachi OS provide comprehensive protection through multi-layered defense mechanisms, emergency response capabilities, and continuous system integrity monitoring. These production-ready binaries form the backbone of system security, offering everything from panic modes to cryptographic verification.

Core Architecture Principles - Verified

Defense in Depth: Multiple layers of security from authentication to emergency response

Zero-Trust Authentication: Comprehensive auth system with heartbeat monitoring

Forensic Resistance: Multi-pass secure wiping, memory cleaning, emergency data destruction

Continuous Verification: Real-time integrity monitoring and compliance checking


🛡️ Binary Categories and Requirements

Core Security Tools

Binary Primary Function Commands Requires Auth Requires Sudo Auto-Start
health-control Emergency kill switches and panic modes 186 Yes Yes (system ops) Called by other binaries
integrity-check Cryptographic system integrity verification 8 No No No
online-auth Secure authentication and heartbeat monitoring 14 No Yes (system-wide) No (manual start)

🛡️ Inter-Binary Dependencies Matrix

Binary Communication Flow

Service Calls These Binaries Called By These Binaries
health-control logs-hook, online-auth, routing-switch dns-switch, online-info-switch
integrity-check logs-hook None
online-auth logs-hook, permission-guard, global-launcher ip-fetch, tor-switch, routing-switch, dns-switch, dns-leak, health-control, online-info-switch

Critical Service Dependencies

Dependency Type Description Affected Services
Authentication Chain Services requiring online-auth for operation Most network and system services
Logging Infrastructure All services use logs-hook for centralized logging ALL security binaries
Emergency Response Services that can trigger health-control dns-switch, online-info-switch
Permission Management Services managed by online-auth permission-guard, global-launcher

🛡️ System Requirements and Permissions

Privilege Escalation Requirements

Operation Type Required Permissions Affected Binaries
Emergency Operations sudo/root health-control (kill switches, panic modes)
Authentication Management sudo/root online-auth (system-wide operations)
Read-Only Verification Standard user integrity-check

Service Daemon Capabilities

Service Daemon Mode Command Purpose
online-auth Heartbeat daemon authenticate --keep-alive Maintains authentication session
health-control On-demand Called by services Emergency response
integrity-check Scheduled/Manual check_all System verification

🛡️ Key Capabilities Overview

Emergency Response System (health-control - 186 commands)

Capability Feature Description
Kill Switch System Emergency protocol 4-stage emergency protocol (arm → disarm → status → activate)
Three-Level Panic Modes Soft panic Network termination + system lock
Three-Level Panic Modes Medium panic Network + process termination + data clearing
Three-Level Panic Modes Hard panic Network + process + RAM wipe + complete shutdown
Data Destruction DoD 5220.22-M pattern Military-grade 3-pass overwrite pattern
Data Destruction Gutmann method 35-pass secure deletion algorithm
Data Destruction Random overwrite Cryptographically secure random data wiping
Data Destruction Zero overwrite Complete zeroing of target data
Data Destruction Verification system Post-wipe verification and confirmation
Data Destruction Scheduled destruction Automated timed data destruction
Hardware Security Hardware RNG verification Random number generator validation
Hardware Security Entropy pool monitoring System entropy source monitoring
Hardware Security Cold boot defense Memory protection against cold boot attacks
Hardware Security Boot chain verification Secure boot integrity checking
Network Emergency Controls Instant termination Immediate network connection shutdown
Network Emergency Controls Interface kill switches Per-interface emergency controls
Network Emergency Controls Internet blocking System-wide internet access control
Network Emergency Controls Recovery mechanisms Network restoration and recovery tools

System Integrity Verification (integrity-check - 8 commands)

Feature Description
Hash-Based Verification SHA256 integrity checking for critical files
Signature Validation Cryptographic signature verification
Version Monitoring Package version tracking against repositories
Configuration Auditing Config file integrity verification
Comprehensive Checking All-in-one system verification
Audit Trail Detailed logging of all integrity checks

Authentication Infrastructure (online-auth - 14 commands)

Component Functionality
Session Management Secure login/logout with keep-alive options
Heartbeat Monitoring Automatic session maintenance
API Key Management Secure synchronization and validation
User Classification VIP/premium user detection
Group Management User group identification
Permission Guard Integration Automated permission monitoring
Global Launcher Control Service deployment management

🛡️ Common Workflows

Initial Security Setup

# Authenticate and verify status
sudo ./online-auth authenticate --keep-alive
./online-auth check-login

# Perform initial integrity check
./integrity-check generate  # Create baseline
./integrity-check check_all  # Verify system

# Configure emergency response
sudo ./health-control kill-switch-arm
sudo ./health-control panic-profile --set medium

Continuous Security Monitoring

# Authentication with keep-alive
sudo ./online-auth authenticate --keep-alive

# Regular integrity checks
./integrity-check check_all --json

# Monitor system health
sudo ./health-control net-check
sudo ./health-control hardware-rng-verify

Emergency Response Procedures

# Quick privacy mode
sudo ./health-control panic-soft
sudo ./health-control wipe-browser-data

# Network isolation
sudo ./health-control block-internet
sudo ./health-control kill-network-interface eth0

# Complete lockdown
sudo ./health-control panic-hard

Data Protection Operations

# Secure file wiping
sudo ./health-control wipe-file /sensitive/data --pattern gutmann
sudo ./health-control wipe-verify /sensitive/data

# Batch operations
sudo ./health-control wipe-batch --list /tmp/files_to_wipe.txt

# Scheduled wiping
sudo ./health-control wipe-schedule --daily --path /tmp/

🛡️ Performance Metrics

Metric Value Description
Total Commands 236 Across all security binaries
Response Time < 100ms For critical operations
Memory Usage < 100MB Combined for all services
CPU Usage < 5% During active monitoring
Reliability 99.99% Service uptime

🛡️ Security Implementation Details

Authentication Flow

  1. Initial authentication: sudo ./online-auth authenticate --keep-alive
  2. Status verification: ./online-auth check-login
  3. Heartbeat maintenance: Auto-maintained with --keep-alive flag
  4. Service usage: Authenticated services verify automatically
  5. Session termination: ./online-auth logout

Emergency Response Levels

Level Trigger Actions Recovery
Level 1 Suspicious activity Alert + log Automatic
Level 2 Confirmed threat Soft panic Manual recovery
Level 3 System compromise Medium panic Recovery mode
Level 4 Critical breach Hard panic Full reinstall

Data Destruction Standards

Pattern Passes Standard Use Case
DoD 5220.22-M 3 US Military General sensitive data
Gutmann 35 Maximum security Highly classified
Random 1-7 Configurable Quick wipe
Zeros 1 Fast wipe Non-sensitive

🛡️ Integration Points

The security tools integrate seamlessly with:

Integration Type Services/Systems
Network Services tor-switch, routing-switch, dns-switch
System Services logs-hook, permission-guard
Infrastructure global-launcher, deps-checker
Kernel Modules Security frameworks, audit system
Hardware TPM, hardware RNG, secure boot

🛡️ Security Considerations

Important Security Notice

These tools provide powerful capabilities that should be used responsibly. Emergency response features can cause data loss and system unavailability. Always maintain secure backups and test emergency procedures in controlled environments.

Best Practices

Practice Description
Regular Verification Run integrity checks daily
Emergency Preparedness Test panic modes quarterly
Authentication Management Rotate credentials regularly
Audit Review Check logs weekly
Update Policies Keep security policies current

Compliance Features

Feature Description
Audit Trails Complete logging of all operations
Forensic Readiness Evidence preservation capabilities
Regulatory Support Configurable retention policies
Incident Response Automated response procedures

🛡️ Troubleshooting

Common Issues

Issue Solution Prevention
Authentication failure Check network, verify credentials Use keep-alive mode
Integrity check fails Review changes, update baseline Regular updates
Panic mode triggered Follow recovery procedure Configure thresholds
Kill switch stuck Use force recovery Test regularly

Recovery Procedures

# Recover from soft panic
sudo ./health-control panic-recover

# Restore network after kill switch
sudo ./health-control recover-internet

# Reset authentication
sudo ./online-auth logout
sudo ./online-auth authenticate --force

🛡️ System Information

Component Version Build Date License
health-control 9.0.1 2025-09-18 Proprietary
integrity-check 9.0.1 2025-09-18 Proprietary
online-auth 9.0.1 2025-09-18 Proprietary
Documentation 9.0.1 2025-09-19 © 2025 Linux Kodachi
Back to top