gdr / tuntox (public) (License: GPLv3) (since 2017-01-24) (hash sha1)
Tunnel TCP connections over the Tox protocol

/README.md (ac7877e3aa526eaef260811746f9962f6b3a3df7) (6184 bytes) (mode 100644) (type blob)

## Introduction

Tuntox is a program which forwards TCP connections over the [Tox](https://tox.chat/) protocol. This allows low-latency access to distant machines behind a NAT you can't control or with a dynamic IP address.

Tuntox is a single binary which may run in client mode or server mode. As a rule of thumb, run the server on the remote machine you want to access and the client on your local computer from which you want to access the server.

**Tuntox is in early work in progress stage**. It won't kill your goats but it may segfault, leak memory or have security issues (although I tried to make it rather secure). 

If you don't know what Tox is - it's an instant messenger protocol which is fully P2P, supports audio/video calls and file transfers. Unlike Skype it's fully open and unlike, say, XMPP - the calls and file transfers actually work P2P. Check out https://tox.chat/ and download a client when you have a chance.

[![Coverity Scan Build Status](https://scan.coverity.com/projects/5690/badge.svg)](https://scan.coverity.com/projects/5690) [![Travis Build Status](https://travis-ci.org/gjedeer/tuntox.svg?branch=master)](https://travis-ci.org/gjedeer/tuntox) 

## Binary

Get the binaries from Releases tab on github. Just download the correct file for your architecture, execute chmod +x and you're done. The binaries are signed with my PGP key, [11C1 B15A 5D5D D662 E469 928A EBDA 6B97 4ED3 D2B7](https://keys.openpgp.org/search?q=11C1B15A5D5DD662E469928AEBDA6B974ED3D2B7).

If you miss the times when men wrote their own device drivers, see BUILD.md.

## Running the server

Run the Tuntox server on a laptop which connects via 3G, on your home computer behind six NATs or on your Raspberry Pi. No ports need to be forwarded to its public IP - the machine will be accessible via the Tox overlay network.

    ./tuntox

runs the server in the foreground. When the server starts, it will print its Tox ID to the output - note it, you will need it later to access the machine from outside.

If you terminate the server (Ctrl-C) and start again, it will generate a new Tox ID and you'll need to write it down again. It kind of defeats the purpose, so you'll want to help the server store its Tox ID somewhere. By default it saves a file in /etc/tuntox/, so if you create this directory and chown it so that it's accessible to tuntox, it will have a fixed Tox ID. 

Alternatively you may use the -C switch instead:

    ./tuntox -C /path/to/the/config/directory/

To daemonize on startup, add -D:

    /path/to/tuntox -D

Or, if you run something like supervisord or systemd, you're welcome to contribute a configuration file for the system of your choice (see #3, #4, #6). There's absolutely no need to run the server as root.

## Client

So, the laptop now has the Tuntox server installed. How do you connect to it?

	./tuntox -i <ToxID> -L 2222:127.0.0.1:22

where `<ToxID>` is the ID you noted down when setting up the server. You didn't forget to write it down, did you?

After you run this command, open a second terminal window and execute:

	ssh -p 2222 myuser@localhost

Magic, port 2222 on your localhost is now the SSH server on the machine which runs the Tuntox server.

The -L switch works (almost) the same way it does in SSH. For the uninitiated, -L A:B:C means "forward port C on ip B to port A on localhost". Unlike SSH, you can't use hostnames for B (unless you link the binary dynamically).

Alternatively, SSH ProxyCommand mode works too:

	ssh -o ProxyCommand='./tuntox -i <ToxID> -W localhost:22' gdr@localhost

Fun stuff: [VPN over Tox](VPN.md)

Client can be ran as a regular non-root user, [unless A < 1024](https://www.linuxquestions.org/linux/articles/Technical/Why_can_only_root_listen_to_ports_below_1024) ("A" is the local port). There's a [workaround](http://unix.stackexchange.com/a/10737) available.

## Security / threat model

**TUNTOX IS NOT SECURE WITHOUT THE -s SWITCH.** Supply *-s yourpassword* both on the server and the client, and you will be fine. This switch is introduced in 0.0.4, codename "Mr. Lahey's Got My Porno Tape!". Even better, run `TUNTOX_SHARED_SECRET=yourpassword tuntox ...` on both sides.

The Tuntox server generates a new Tox ID on every startup, or saves its private key in a file. Anyone who wants to connect to this server needs its Tox ID, which consists of the publicly-known pubkey and a secret 32-bit "antispam" value. Then, the client sends a shared secret which is then compared to the secred supplied on server's command line. If they don't match, friend request is left unanswered.

Therefore, posession of the server's Tox ID and a secret should be considered equivalent to posession of an Unix account with SSH access. Tuntox does not implement remote shell capability, but it is possible that it's exploitable.

PSK authentication is optional but recommended - it's only enabled when -s switch is present on server side or the TUNTOX_SHARED_SECRET environment variable is set. PSK is sent as Tox friend request message - as far as the author understands libtoxcore code, it's encrypted using server's public EC key.

The Tuntox Server can optionally allow only whitelisted ToxIDs. Supply *-i yourallowedtoxid* one time or more to add a ToxID to the whitelist. Note: The default client behavior is to generate a new ToxID for every run (because author thinks it's a nice privacy feature). You will want to use the -C switch in client to force reading a saved identity from tox_save.

Tuntox is piggybacking on the Tox protocol, which itself has not been audited by security researchers. Tox crypto has been implemented with libsodium (which is based on Bernstein's NaCl) and thus uses the ecliptic curve 25519 for key exchange and salsa20 for stream encryption. According to the author's best knowledge, libsodium makes it as hard as possible to get crypto wrong, but we don't know until Tox has been audited.

## FAQ

[yes, there is one](FAQ.md)

## License

Sorry about GPLv3 - both toxcore and utox (from which I borrowed some code) are GPLv3.

Thank you to the toxcore and utox developers without whom this program would never exist.

Thank you Mr_4551 for your help and motivation.


Mode Type Size Ref File
100644 blob 268 272c4eb3ad3672621962ce38f8c7472336729ec3 .gitignore
100644 blob 0 e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 .sonarcloud.properties
100644 blob 2088 300c5a7e37f67cb8cdd88261756a10be561d51c5 .travis.yml
100644 blob 1934 9b63571486cca0d558fb18d7826e84f8983217de BUILD.md
100644 blob 890 6a32bd94ed7175124e4abdfec44db695f222584c Dockerfile
100644 blob 5516 15426e21574a20e0391b016ea554e1f198d13025 FAQ.md
100644 blob 36522 d6af5d577e5ccb42e451bffdb59696ae1b8078ab LICENSE.md
100644 blob 1332 67eff94b8d8f56754f643ac90cd76bd0517006b8 Makefile
100644 blob 652 6a0550489a8718388bef0ef61e36f6a0a9d8bfdf Makefile.mac
100644 blob 6184 ac7877e3aa526eaef260811746f9962f6b3a3df7 README.md
100644 blob 1989 f1c8658a62d5be3c1726843db101a54df9c52f47 VPN.md
100644 blob 939 d4c2844167d0a3bbe01f06adc650e28ae6d79690 bitbucket-pipelines.yml
100644 blob 77769 3063f74e9864b29839928800f1cfb0469ee74990 cJSON.c
100644 blob 15829 92907a2cd38b1e1f2e099e5cbe2f5c557b70b07b cJSON.h
100644 blob 25342 8a02c93007264707d6f308be119270c7117ae104 client.c
100644 blob 759 be68f25ae57282e30acf01fd0eb619763045dc1e client.h
040000 tree - 8242200a82b7b6d771a336c7c81b4f76b8e7be84 debian
100644 blob 3695 9d240e23d50d3a7bd69552eb243e686fdbe4c5b8 generate_tox_bootstrap.py
100644 blob 467 b5da76802ae2be17bf221890db7e7c0b230beffa gitversion.c
100644 blob 62 747e06d3c602915452532d540ee9817776f236c5 gitversion.h
100644 blob 3141 31244349cd221b4e8931f612b3325ae59faa58cb log.c
100644 blob 892 bcd4c9bb1af0a1f1c44b1e7a36c3a5971ba73b34 log.h
100644 blob 169 57385c284c57ab99d21bd53c270ebc04ecd19d31 mach.h
100644 blob 53579 6857bd39f91a9d49c2ac9d5c9487a5d92fd8e407 main.c
100644 blob 4500 af9f47a54f870914913329ad162b730ea3c73aa1 main.h
100755 blob 791 d4c9730c37f222ed6390eacbd1effb9a640dcdcb multiarch-build.sh
040000 tree - 9ea39ebb6fd8fb34f1a28a69d445d099d5001a37 screenshots
040000 tree - b412cd72eccd06bedcb8f98492901c638dd0010b scripts
100644 blob 33976 bc6bd24abe31cc08ec749f9a1eb89a141bcfce58 tox_bootstrap.h
100644 blob 3272 61c6bc0d273f973522940ef64982f8c7a1781973 tox_bootstrap_json.c
100644 blob 124 f6479b9112cbf5aab844fb733a3ab7d9f9a683b0 tox_bootstrap_json.h
100644 blob 12536 75e9dc5ed9399120416e8da5f24d1ccde41cf901 utarray.h
100644 blob 61492 7205c67efa27c66884c8d4d1c8a105d4854a0548 uthash.h
100644 blob 5406 cdf3ddcf61249fbfa406ac648b1d8cc6c3d9dd89 util.c
100644 blob 893 33e1cb381b18a34d413d7379121f9a8e584eaf53 util.h
100644 blob 55882 b5f3f04c104785a57d8280c37c1b19b36068e56e utlist.h
100644 blob 11555 867442c843dbe6bf096a488e3ce9ec6323809f7f utstring.h
Hints:
Before first commit, do not forget to setup your git environment:
git config --global user.name "your_name_here"
git config --global user.email "your@email_here"

Clone this repository using HTTP(S):
git clone https://rocketgit.com/user/gdr/tuntox

Clone this repository using ssh (do not forget to upload a key first):
git clone ssh://rocketgit@ssh.rocketgit.com/user/gdr/tuntox

Clone this repository using git:
git clone git://git.rocketgit.com/user/gdr/tuntox

You are allowed to anonymously push to this repository.
This means that your pushed commits will automatically be transformed into a merge request:
... clone the repository ...
... make some changes and some commits ...
git push origin main