A Tunnel which Turns UDP Traffic into Encrypted UDP/FakeTCP/ICMP Traffic by using Raw Socket,helps you Bypass UDP FireWalls(or Unstable UDP Environment)
I have already implemented the SPA feature for tcp that the issue i created : https://github.com/wangyu-/udp2raw/issues/506
It just add a new tcp option(233) with a check sum(timestamp + key_string) in SYN packet.
And the server will check the 233 tcp option's check sum.
when server start with --tcp-spa
./udp2raw -s -l 192.168.56.12:61103 -r 202.104.30.208:61103 -a --tcp-spa
client with --tcp-spa will be accept
./udp2raw -c -l 192.168.56.10:61103 -r 192.168.56.12:61103 -a --tcp-spa
client without --tcp-spa will be drop
./udp2raw -c -l 192.168.56.10:61103 -r 192.168.56.12:61103 -a
when server start without --tcp-spa
client with or without --tcp-spa will both be accept
Hi Wang
I have already implemented the SPA feature for tcp that the issue i created : https://github.com/wangyu-/udp2raw/issues/506 It just add a new tcp option(233) with a check sum(timestamp + key_string) in SYN packet. And the server will check the 233 tcp option's check sum.
when server start with --tcp-spa ./udp2raw -s -l 192.168.56.12:61103 -r 202.104.30.208:61103 -a --tcp-spa client with --tcp-spa will be accept ./udp2raw -c -l 192.168.56.10:61103 -r 192.168.56.12:61103 -a --tcp-spa client without --tcp-spa will be drop ./udp2raw -c -l 192.168.56.10:61103 -r 192.168.56.12:61103 -a
when server start without --tcp-spa client with or without --tcp-spa will both be accept