gdr / tuntox (public) (License: GPLv3) (since 2017-01-24) (hash sha1)
Tunnel TCP connections over the Tox protocol
List of commits:
Subject Hash Author Date (UTC)
Bare bones documentation aada851bb2c5576ba9afb1a486ea4b01e0c05ac3 GDR! 2014-12-11 18:30:14
Initial commit 4c36e3b71adab6e9f3f08fda3b5c7bf5714ef201 GDR! 2014-12-11 13:27:41
Server state loading/saving 7cb0f811c9a573342ec390080ac67e640d0f2e30 GDR! 2014-11-26 12:55:12
Multi-connection support client-side. 16add85eb81629b07dd7bdb04fbe30be1410cc83 GDR! 2014-11-25 22:09:45
TCP works, yay c311fb3bdd2c26c347c2dd734f97003ac0538037 GDR! 2014-11-16 02:54:56
creating tunnels half-made 9b523f2b826dea54613f2eac78f754c9772841b6 GDR! 2014-11-15 19:14:53
builds well 3b42ed1ca1be6d1c8f14606befee8b8deae64ac8 GDR! 2014-11-10 18:05:14
makefile f877c04fdb45aebff081df4ed1b7fea9bd293fa5 GDR! 2014-11-09 16:24:12
Commit aada851bb2c5576ba9afb1a486ea4b01e0c05ac3 - Bare bones documentation
Author: GDR!
Author date (UTC): 2014-12-11 18:30
Committer name: GDR!
Committer date (UTC): 2014-12-11 18:30
Parent(s): 6309f33775840f21b85051a46d14a1b67d9a9415
Signer:
Signing key:
Signing status: N
Tree: 93349a6011bf069e72ca8f691b49cb07d04ef5f1
File Lines added Lines deleted
BUILD.md 7 0
README.md 59 0
File BUILD.md added (mode: 100644) (index 0000000..c0d340c)
1 * Install libsodium http://doc.libsodium.org/installation/README.html
2 * Install libtoxcore (libtoxav and the DNS client are not required) https://github.com/irungentoo/toxcore/blob/master/INSTALL.md
3 * git clone https://github.com/gjedeer/tuntox.git
4 * cd tuntox
5 * make
6
7 The makefile creates a static binary by default. If you're not a fan of static binaries, remove "-static" from LDFLAGS. One reason to do so may be if you'd like to resolve hostnames on the tuntox server (invoke client with -L 80:reddit.com:80 instead of -L 80:198.41.208.138:80). Static linking breaks hostname resolution, but IMHO the pros overweight the cons.
File README.md added (mode: 100644) (index 0000000..a3c35e3)
1 ## Introduction
2
3 Tuntox is a program which forwards TCP connections over the [Tox](https://tox.im/) protocol. This allows low-latency access to distant machines behind a NAT you can't control or with a dynamic IP address.
4
5 Tuntox is a single binary which may run in client mode or server mode. As a rule of thumb, run the server on the remote machine you want to access and the client on your local computer from which you want to access the server.
6
7 **Tuntox is an early work in progress program**. It won't kill your goats but it may segfault, leak memory or have security issues (although I tried to make it rather secure). It won't be as fast as it could be because of the tremendous amount of debug output.
8
9 If you don't know what Tox is - it's an instant messenger protocol which is fully P2P, supports audio/video calls and file transfers. Unlike Skype it's fully open and unlike, say, XMPP - the calls and file transfers actually work. Go download a client from http://utox.org/ or read more at https://tox.im/
10
11 ## Binary
12
13 Get the binaries from Releases tab on github. Just download the correct file for your architecture, execute chmod +x and you're done. The binaries are signed with my PGP key, [11C1 B15A 5D5D D662 E469 928A EBDA 6B97 4ED3 D2B7](https://keybase.io/gdr).
14
15 ## Running the server
16
17 Run the Tuntox server on a laptop which connects via 3G, on your home computer behind six NATs or on your Raspberry Pi. No ports need to be forwarded to its public IP - the machine will be accessible via the Tox overlay network.
18
19 ./tuntox
20
21 runs the server in the foreground. When the server starts, it will print its Tox ID to the output - note it, you will need it later to access the machine from outside.
22
23 If you terminate the server (Ctrl-C) and start again, it will generate a new Tox ID and you'll need to write it down again. It kind of defeats the purpose, so you'll want to help the server store its Tox ID somewhere. By default it saves a file in /etc/tuntox/, so if you create this directory and chown it so that it's accessible to tuntox, it will have a fixed Tox ID.
24
25 Alternatively you may use the -C switch instead:
26
27 ./tuntox -C /path/to/the/config/directory/
28
29 Tuntox currently does not fork, so if you want it to run at system startup, add something like this to /etc/rc.local:
30
31 /path/to/tuntox &
32
33 Or, if you run something like supervisord or systemd, you're welcome to contribute a configuration file for the system of your choice (see #3, #4, #6)
34
35 ## Client
36
37 So, the laptop now has the Tuntox server installed. How do you connect to it?
38
39 ./tuntox -i <ToxID> -L 2222:127.0.0.1:22
40
41 where <ToxID> is the ID you noted down when setting up the server. You didn't forget to write it down, did you?
42
43 After you run this command, open a second terminal window and execute:
44
45 ssh -p 2222 myuser@localhost
46
47 Magic, port 2222 on your localhost is now the SSH server on the machine which runs the Tuntox server.
48
49 The -L switch works (almost) the same way it does in SSH. For the uninitiated, -L A:B:C means "forward port C on ip B to port A on localhost". Unlike SSH, you can't use hostnames for B (unless you link the binary dynamically).
50
51 ## Security / threat model
52
53 The Tuntox server generates a new Tox ID on every startup, or saves its private key in a file. Anyone who wants to connect to this server needs its Tox ID, which consists of the publicly-known pubkey and a secret 32-bit "antispam" value. Anyone with access to the full Tox ID is automatically accepted with no further authorization and can forward ports (or exploit buffer overflows :).
54
55 Therefore, posession of the server's Tox ID should be considered equivalent to posession of an Unix account with SSH access.
56
57 Currently there are no measures for preventing brute force attacks against the 32-bit antispam value that the author is aware of. They may or may not be released by the libtoxcore team and are not in the scope of this tool.
58
59 Tuntox is piggybacking on the Tox protocol, which itself has not been audited by security researchers. Tox crypto has been implemented with libsodium (which is based on Bernstein's NaCl) and thus uses the ecliptic curve 25519 for key exchange and salsa20 for stream encryption. According to the author's best knowledge, libsodium makes it as hard as possible to get crypto wrong, but we don't know until Tox has been audited.
Hints:
Before first commit, do not forget to setup your git environment:
git config --global user.name "your_name_here"
git config --global user.email "your@email_here"

Clone this repository using HTTP(S):
git clone https://rocketgit.com/user/gdr/tuntox

Clone this repository using ssh (do not forget to upload a key first):
git clone ssh://rocketgit@ssh.rocketgit.com/user/gdr/tuntox

Clone this repository using git:
git clone git://git.rocketgit.com/user/gdr/tuntox

You are allowed to anonymously push to this repository.
This means that your pushed commits will automatically be transformed into a merge request:
... clone the repository ...
... make some changes and some commits ...
git push origin main