#tcp-udp #dns-server #tcp #dns #udp #tunnel #tls

bin+lib tunneler

Tunnel TCP or UDP traffic over TCP, (mutual) TLS or DNS (authoritative server or direct connection)

5 releases (3 breaking)

0.4.1 Oct 15, 2021
0.4.0 Oct 13, 2021
0.3.0 Sep 22, 2021
0.2.0 Sep 3, 2021
0.1.0 Aug 6, 2021

#45 in #tunnel

MIT license

155KB
3.5K SLoC

Rust 3K SLoC Python 661 SLoC // 0.0% comments Shell 120 SLoC

Tunneler

This repo contains client and server that allow you to tunnel TCP and UDP traffic over other network protocols.

Currently, supported tunnels are:

  • DNS (authoritative server or direct connection)
  • TLS (mutual authentication)
  • TCP

Main tool is written in Rust and end-to-end tests are written in Python.

Installation

Option 1: client and server docker images

docker pull ghcr.io/dlemel8/tunneler-server:latest
docker pull ghcr.io/dlemel8/tunneler-client:latest

Option 2: compile from source code

cargo --version || curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh
cargo build --release

There is also a docker file if you prefer to build a local docker image

Usage

Option 1: client and server docker images

docker run -e LOCAL_PORT=45301 \
           -e REMOTE_PORT=5201 \
           -e REMOTE_ADDRESS=localhost \
           -e TUNNELED_TYPE=udp \
           --rm -p 45301:45301 ghcr.io/dlemel8/tunneler-server:latest tcp

Option 2: locally compiled binary

./target/release/client \
  --tunneled-type tcp \
  --remote-address 1.1.1.1 \
  --remote-port 53 \
  --log-level debug \
  dns \
  --read-timeout-in-milliseconds 100 \
  --idle-client-timeout-in-milliseconds 30000

Run docker image or compiled binary with --help for more information

Testing

Run Unit Tests

cargo test --all-targets

Run End-to-End Tests

python3 -m pip install -r e2e_tests/requirements.txt
PYTHONPATH=. python3 -m pytest -v

Examples

This repo contains a few server deployment examples using Docker Compose:

  • Speed Test - iperf3 server exposed via all supported tunnels, allow you to compare tunnels speed.
  • Authoritative DNS - Redis server exposed via DNS tunnel on port UDP/53. Since tunnel does not verify clients, Redis authentication is needed.
  • Pipeline - Redis server exposed via TLS tunnel that itself exposed via DNS tunnel. Since tunnel does verify clients, Redis authentication is not used.

You can run each example locally or deploy it using Terraform and Ansible. See more information here.

Architecture

Architecture Each executable contains 2 components communicating via a channel of client streams (a tuple of bytes reader and writer):

  • Client Listener binds a socket and convert incoming and outgoing traffic to a new stream.
  • Client Tunneler translate stream reader and writer to the tunnel protocol.
  • Server Untunneler binds a socket according to tunnel protocol and translate tunneled traffic back to original stream.
  • Server Forwarder converts stream writer and reader back to traffic.

TCP based traffic is trivially converted to stream. UDP based traffic conversion depends on the tunnel protocol.

UDP based traffic also need a way to identify existing clients to continue their sessions. The solution is an in-memory Clients Cache that maps an identifier of the client to its stream.

Protocols

Tunneled UDP

In order to convert UDP traffic to a stream, a 2 bytes size header (in big endian) precedes each packet payload.

UDP Listener uses incoming packet peer address as a key to its Clients Cache.

DNS tunneling

We have a few challenges here:

  • DNS payload must be alphanumeric.
  • Every message requires a response before we can send next message.
  • Each DNS query uses randomized source port and transaction ID, so we can't use them as Client Cache key.

To solve those challenges, each client session starts with generating a random Client ID (4 alphanumeric chars). Client reads data to tunnel and run it via a pipeline of encoders:

  • Data is encoded in hex.
  • Client ID is appended.
  • Client suffix is appended. In case the server is running on your authoritative DNS server, suffix is ".<your domain>".

Encoded data is then used as the name of a TXT DNS query.

If you own an authoritative DNS server, client can send the request to a recursive DNS resolver. Resolver will get your IP from your domain name registrar and forward the request to your IP. Another option (faster but more obvious to any traffic analyzer) is configuring client to send the request directly to your IP (on port UDP/53 or any other port server is listening to).

Server decodes data (ignoring any non client traffic) and uses Client ID as a key to its Clients Cache.

In order to handle large server responses and empty TCP ACKs, read timeout is used in both client and server. If read timeout is expired, empty message will be sent. Both client and server use idle timeout to stop forwarding and cleanup local resources.

TLS tunneling

To implement mutual authentication, we use a private Certificate Authority:

  • A self-signed CA certificate is generated from a private key.
  • Server private key is randomly generated and its public part is used in a certificate signed by the CA certificate.
  • Client private key is randomly generated and its public part is used in a certificate signed by the CA certificate.

Both client and server are configured to use their key and certificate in TLS handshake. The CA certificate is used as root certificate.

Since Server Name Indication extension is used, client is requesting a specific server name and server is serving its certificate only if that name was requested. The server name must also be part of the certificate, for example as a Subject Alternative Name.

Dependencies

~23–36MB
~654K SLoC