The Demo OpenNHP Protected Server
Hiding Protocol
1) The Protected Server is by default "Invisible" to Unauthenticated Users
By default, any attempt to connect to the protected server will result in a TIME OUT error, as all ports are closed, making the server appear offline and effectively "invisible."
2) Port Scanning Also Returns TIME OUT
Port scanning the server will also return a TIME OUT error. All ports appear closed to unauthorized scanners. Try it yourself with an online port scanner:
3) Authenticate with Login Webpage or StealthDNS App
Use the Login Webpage or StealthDNS App to authenticate with the NHP server. After successful login, you can access the protected server.
4) Access Granted After Authentication
After successful NHP authentication, the protected server becomes accessible. You can now see the protected content that was previously invisible.
Hiding Application Server Ports
Before NHP, all server ports are exposed. After NHP, they become completely invisible.
Application Server Ports Visible
$ nmap -sS -p 1-65535 server.example.com
✗ All ports visible to attackers
✗ Attack surface fully exposed
✗ Vulnerable to port scanning
All Ports Hidden from Unauthorized
$ nmap -sS -p 1-65535 server.example.com
✓ All ports invisible to attackers
✓ Zero attack surface exposure
✓ Only authenticated users can access
How NHP Works
The authentication-before-connection paradigm in action.
Complete Invisibility
Protected resources have no public presence. DNS returns NXDOMAIN, ports appear closed, and IP addresses are unknown. To unauthorized observers, the service doesn't exist.
Cryptographic Knock
Authorized clients send an encrypted "knock" packet using the Noise Protocol Framework. This proves their identity without revealing the service's existence to observers.
Mutual Authentication
Both client and server authenticate each other using modern asymmetric cryptography. No shared secrets, no MITM vulnerability, no replay attacks.
Time-Limited Access
Upon successful authentication, the client receives temporary access. Firewall rules are dynamically created and automatically expire, minimizing exposure.
Benchmark Results
NHP delivers high performance with minimal latency overhead.
| Operation | Throughput | Latency |
|---|---|---|
| Authentication | 10K req/s | < 10ms |
| Port Hiding | 100K req/s | < 1ms |
| DNS Resolution | 50K req/s | < 5ms |
*Tested on AWS t3.xlarge instance
Integrate OpenNHP into Your Applications
Choose the right SDK based on your application type: native client apps or web applications.
Client App Integration (Desktop & Mobile)
StealthDNS is an open-source example application that demonstrates how to integrate the OpenNHP SDK into native desktop and mobile applications. By studying its source code, you can learn:
- ✓ How to initialize the NHP-Agent in your application
- ✓ How to perform cryptographic knock requests to NHP-Server
- ✓ How to handle authentication and access tokens
- ✓ How to access protected resources after NHP authorization
Web App Integration (JavaScript SDK)
OpenNHP JavaScript Agent is the official SDK for integrating NHP authentication into web applications. It provides a lightweight, browser-compatible solution for web-based access to NHP-protected resources.
- ✓ Pure JavaScript implementation for browser environments
- ✓ Seamless integration with existing web frameworks
- ✓ NHP authentication flow and connection status visualization
- ✓ Works with any backend protected by OpenNHP
Ready to Hide Your Infrastructure?
Deploy OpenNHP and make your services invisible to attackers.