hellvesper / udptunnel

Automatically exported from code.google.com/p/udptunnel
GNU General Public License v3.0
0 stars 0 forks source link

=============================================================================

UDPTUNNEL README

Author: Daniel Meekins Contact: dmeekins - gmail

Copyright (C) 2009 Daniel Meekins

=============================================================================

This project tunnels TCP data through a UDP tunnel. The executable can act as the server or client. The server acts as a proxy for the client, listening on a specified UDP port and creating a connection to a TCP server that the client specifies. The client listens on a TCP port, acting as the server that some TCP client connects to. The client recevies any TCP data on that port and sends the data to the udpserver, which sends it to the TCP connection it made with the desired TCP server.


1.) Building

On *nix systems in Makefile, make sure that the correct value is set for the "OS" variable. Then just run 'make'.

On Windows, if using GCC in Cygwin, make sure the "OS" variable is set to CYGWIN in Makefile and run 'make'.

If using the VC++ compiler (cl.exe), make sure to be in the "Visual Studio Command Prompt", or at least have all the environment variables set correctly, then run 'nmake.exe /f Makefile.Win32'. Also make sure the location of WS2_32.Lib is specified correctly fo the LIBS variable (if building for x64, set path to the 64-bit version of WS2_32.Lib).


2.) Running

usage: ./udptunnel [-v] [-6] <-s|-c> -c client mode (default)

: [local host] -s server mode : [host] port [acl ...] acl: [s=,][d=,][dp=,][a=allow|deny] -6 use IPv6 -v show some debugging output (use up to 3 for increaing levels) -h show this junks and exit To run the server: udptunnel -s [-6] [host] port [acl ...] where the port is a UDP port to listen for messages from the udpclient and host is the address to listen on. Use the -6 option to listen on IPv6 addresses. After the port, the rest of the arguments are the access control list, with comma-separated parameters for each entry. Access can be control based on the source IP, destination IP, source port, and destination port. A catch-all entry is added at the end of every list that allows everything. To deny anything that doesn't match your entries, put "a=deny" as the last entry. In a Window's shell, each acl entry needs double quotes (") around them. Server Examples: udptunnel -s 4444 udptunnel -s -6 2001::10:3 4444 udptunnel -s 4444 d=10.0.0.1,dport=80,a=deny dport=80,a=allow a=deny To run the client: udptunnel -c [-6] [local host] local host/port - Host and port for the TCP server to listen on. If the host isn't supplied, it will listen on all available addresses. proxy host/port - Host and port that udpserver is listening on. remote host/port - Host and port to forward the received TCP data to. The host is relative to the proxy machine (e.g. specifiying 127.0.0.1 is the proxy machine itself). Use the -6 option to listen and connect using IPv6 addresses. Example for tunneling ssh data through the tunnel between two computers with IP addresses 192.168.1.2 (client) and 192.168.1.1 (server): server# ./udptunnel -s 192.168.1.1 4444 client# ./udptunnel -c 127.0.0.1 3333 192.168.1.1 4444 127.0.0.1 22 client# ssh -p 3333 user@127.0.0.1 This code has been tested and works on Linux, Solaris 10 x86, and Cygwin (but requires the IPv6 extension - http://win6.jp/Cygwin/index.html). Please send any bugs or issues to the contact listed above.