- cross-posted to:
- selfhost@lemmy.ml
- opensource@lemmy.ml
- cross-posted to:
- selfhost@lemmy.ml
- opensource@lemmy.ml
Hi guys, I wanted to share a project I’ve been working on called xSpa. It’s an implementation of Single Packet Authorization that works at the XDP level.
I built this because I wanted something faster and more DDoS-resilient than traditional port-knocking or SPA tools that rely on userspace processing or iptables. Here, the “drop-all” logic happens right at the driver level.
Key bits:
L1 verification (SipHash) in kernel space.
L2 (ChaCha20-Poly1305) in Go userspace.
It uses the eBPF ring buffer for communication.
This is my first Go project and my first shot at Open Source. I’m still a bit of a noob when it comes to kernel-level programming, so I’d love to get some feedback on the architecture and security. If anyone has time to check the code, I’d love to hear your thoughts on how to make it better.



You mean, you don’t use “init” for all your commits?
caught me! still learning the ‘professional’ way to do things. at least it’s better than ‘fix1’, ‘fix2’, ‘asdfgh’…
“Be sure to commit with a descriptive message after each change”
Assuming you didn’t one-and-done this. Please tell me you didn’t.
I got in the zone :)