gdr / tuntox (public) (License: GPLv3) (since 2017-01-24) (hash sha1)
Tunnel TCP connections over the Tox protocol
List of commits:
Subject Hash Author Date (UTC)
Update README.md 24a0f954ce773571aff6562084553028c8352142 GDR! 2016-10-04 08:16:39
Whitelist debug statement a971c172985088d38297ed30318910144140a44b GDR! 2016-06-08 20:36:52
Coverity fix b081686b05931064b4f9a26621d77a5d43941832 GDR! 2016-06-08 15:28:41
Fixed default value for server whitelist mode e682a05cf64ea85e30cb88a089fe220c2081e5da GDR! 2016-06-08 15:16:25
Documentation for #14 e9393fb439f94461fdc665eb85af54f156e5be75 GDR! 2016-06-07 20:00:13
"Whitelist clients by pubkeys" mode, re-request friends 1013b2aaeafa9112849df4e08bcced23cbd91fdf GDR! 2016-06-07 19:52:48
Remove FDs of closed tunnels from fdset 816245f429145052b8908d500c64d372fc8c2972 GDR! 2016-06-07 18:42:45
Mention toxvpn c2a78f48bd44613162a6e3c1d02cb53266611936 GDR! 2016-05-05 17:55:59
ProxyCommand explained c17be222aa46a4cf1a9d19c0ae767697ad585fd3 GDR! 2016-05-05 17:50:05
Visible ToxID 4f38371fd72ba889e39805b76a1a2402194b5398 GDR! 2016-05-05 17:46:06
Tuntox does fork! 0d1230def56597b25bcd731346794058c66d3e7c GDR! 2016-05-05 17:45:25
Tox.chat 2 90990f49bda18d06c89fca0495b39726bd55a076 GDR! 2016-05-05 17:43:58
Tox.chat 5b921bc92cf04773f8e5b08120e5850156fbb580 GDR! 2016-05-05 17:43:11
Possible fix for Issue #16 cc633e9ad431850d298638dbcdcbf1e8a4dfdeb1 GDR! 2016-05-05 17:39:42
Fix build on non-mac platforms 981501cf1e19d07a11e28cff99b9cd7c7b1d0b1d GDR! 2015-09-17 08:30:57
* fix: Possibility to compile on Mac OS platform 199787953243d91449ac5f4a5ac16edc2497e438 Dawid 'nCore' Opis 2015-09-16 18:14:03
remove tox.im because it's evil b57ae8b86109e6fe6f626d03ddeca79539d07822 GrayHatter 2015-08-08 00:45:31
Update README.md 9226aa00b30e7af7a0122b0772cc3e20ae5b49d0 GDR! 2015-07-14 12:57:55
CID 122512 (#1 of 1): Resource leak (RESOURCE_LEAK)11. leaked_storage: 5d9e9c5d9078d8d1987375e972282220d50b9328 GDR! 2015-07-08 10:04:52
off_by_one: Testing whether handle sockfd is strictly greater than zero a6d788c45764afb4d172dd3c75dfe593b85b5dab GDR! 2015-07-08 10:02:12
Commit 24a0f954ce773571aff6562084553028c8352142 - Update README.md
Author: GDR!
Author date (UTC): 2016-10-04 08:16
Committer name: GitHub
Committer date (UTC): 2016-10-04 08:16
Parent(s): a971c172985088d38297ed30318910144140a44b
Signer:
Signing key:
Signing status: N
Tree: 08f56e4474675bbc3e34db6a814d9019e4b91ff2
File Lines added Lines deleted
README.md 3 1
File README.md changed (mode: 100644) (index c39c82c..cd38142)
... ... To daemonize on startup, add -D:
34 34
35 35 /path/to/tuntox -D /path/to/tuntox -D
36 36
37 Or, if you run something like supervisord or systemd, you're welcome to contribute a configuration file for the system of your choice (see #3, #4, #6)
37 Or, if you run something like supervisord or systemd, you're welcome to contribute a configuration file for the system of your choice (see #3, #4, #6). There's absolutely no need to run the server as root.
38 38
39 39 ## Client ## Client
40 40
 
... ... Alternatively, SSH ProxyCommand mode works too:
58 58
59 59 Fun stuff: [VPN over Tox](VPN.md) Fun stuff: [VPN over Tox](VPN.md)
60 60
61 Client can be ran as a regular non-root user, [unless A < 1024](https://www.linuxquestions.org/linux/articles/Technical/Why_can_only_root_listen_to_ports_below_1024) ("A" is the local port). There's a [workaround](http://unix.stackexchange.com/a/10737) available.
62
61 63 ## Security / threat model ## Security / threat model
62 64
63 65 **TUNTOX IS NOT SECURE WITHOUT THE -s SWITCH.** Supply *-s yourpassword* both on the server and the client, and you will be fine. This switch is introduced in 0.0.4, codename "Mr. Lahey's Got My Porno Tape!". **TUNTOX IS NOT SECURE WITHOUT THE -s SWITCH.** Supply *-s yourpassword* both on the server and the client, and you will be fine. This switch is introduced in 0.0.4, codename "Mr. Lahey's Got My Porno Tape!".
Hints:
Before first commit, do not forget to setup your git environment:
git config --global user.name "your_name_here"
git config --global user.email "your@email_here"

Clone this repository using HTTP(S):
git clone https://rocketgit.com/user/gdr/tuntox

Clone this repository using ssh (do not forget to upload a key first):
git clone ssh://rocketgit@ssh.rocketgit.com/user/gdr/tuntox

Clone this repository using git:
git clone git://git.rocketgit.com/user/gdr/tuntox

You are allowed to anonymously push to this repository.
This means that your pushed commits will automatically be transformed into a merge request:
... clone the repository ...
... make some changes and some commits ...
git push origin main