The Demo OpenNHP Protected Server

https://acdemo.opennhp.org

🎭
UNAUTHORIZED
User
👤
AUTHORIZED
User
Invisible & Blocked
Visible & Allowed
🛡️
NHP
Network-infrastructure
Hiding Protocol
🖥️
Protected
Server
acdemo.opennhp.org

1) The Protected Server is by default "Invisible" to Unauthenticated Users

By default, any attempt to connect to the protected server will result in a TIME OUT error, as all ports are closed, making the server appear offline and effectively "invisible."

Try accessing the protected server at:

🚀 Try Access: https://acdemo.opennhp.org NHP Demo - Server Invisible to Unauthenticated Users

2) Port Scanning Also Returns TIME OUT

Port scanning the server will also return a TIME OUT error. All ports appear closed to unauthorized scanners. Try it yourself with an online port scanner:

3) Authenticate with Login Webpage or StealthDNS App

Use the Login Webpage or StealthDNS App to authenticate with the NHP server. After successful login, you can access the protected server.

4) Access Granted After Authentication

After successful NHP authentication, the protected server becomes accessible. You can now see the protected content that was previously invisible.

AUTHENTICATED ✓ Access Granted
NHP Demo - Access Granted After Authentication
Port Hiding

Hiding Application Server Ports

Before NHP, all server ports are exposed. After NHP, they become completely invisible.

BEFORE NHP ⚠️ Exposed

Application Server Ports Visible

$ nmap -sS -p 1-65535 server.example.com
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
443/tcp open https
3306/tcp open mysql
8080/tcp open http-proxy

All ports visible to attackers
Attack surface fully exposed
Vulnerable to port scanning

AFTER NHP 🛡️ Protected

All Ports Hidden from Unauthorized

$ nmap -sS -p 1-65535 server.example.com
PORT STATE SERVICE
All 65535 scanned ports are filtered
Host seems down or heavily firewalled.
No ports visible to unauthorized scanners.

All ports invisible to attackers
Zero attack surface exposure
Only authenticated users can access

Process

How NHP Works

The authentication-before-connection paradigm in action.

Step 1

Complete Invisibility

Protected resources have no public presence. DNS returns NXDOMAIN, ports appear closed, and IP addresses are unknown. To unauthorized observers, the service doesn't exist.

Step 2

Cryptographic Knock

Authorized clients send an encrypted "knock" packet using the Noise Protocol Framework. This proves their identity without revealing the service's existence to observers.

Step 3

Mutual Authentication

Both client and server authenticate each other using modern asymmetric cryptography. No shared secrets, no MITM vulnerability, no replay attacks.

Step 4

Time-Limited Access

Upon successful authentication, the client receives temporary access. Firewall rules are dynamically created and automatically expire, minimizing exposure.

Performance

Benchmark Results

NHP delivers high performance with minimal latency overhead.

Operation Throughput Latency
Authentication 10K req/s < 10ms
Port Hiding 100K req/s < 1ms
DNS Resolution 50K req/s < 5ms

*Tested on AWS t3.xlarge instance

Integration

Integrate OpenNHP into Your Applications

Choose the right SDK based on your application type: native client apps or web applications.

🖥️

Client App Integration (Desktop & Mobile)

StealthDNS is an open-source example application that demonstrates how to integrate the OpenNHP SDK into native desktop and mobile applications. By studying its source code, you can learn:

  • How to initialize the NHP-Agent in your application
  • How to perform cryptographic knock requests to NHP-Server
  • How to handle authentication and access tokens
  • How to access protected resources after NHP authorization
🌐

Web App Integration (JavaScript SDK)

OpenNHP JavaScript Agent is the official SDK for integrating NHP authentication into web applications. It provides a lightweight, browser-compatible solution for web-based access to NHP-protected resources.

  • Pure JavaScript implementation for browser environments
  • Seamless integration with existing web frameworks
  • NHP authentication flow and connection status visualization
  • Works with any backend protected by OpenNHP
📖 OpenNHP SDK Documentation

Ready to Hide Your Infrastructure?

Deploy OpenNHP and make your services invisible to attackers.