pingtunnel/README.md

70 lines
3.6 KiB
Markdown
Raw Normal View History

2018-12-20 10:09:16 +03:00
# Pingtunnel
2018-12-20 09:58:07 +03:00
pingtunnel是把udp流量伪装成icmp流量进行转发的工具类似于kcptun。用于突破网络封锁或是绕过WIFI网络的登陆验证。可以与kcptun很方便的结合使用。
<br />Pingtunnel is a tool that advertises udp traffic as icmp traffic for forwarding, similar to kcptun. Used to break through the network blockade, or to bypass the WIFI network login verification. Can be combined with kcptun very convenient.
2018-12-19 11:47:45 +03:00
![image](network.png)
2018-12-20 10:09:16 +03:00
# Sample
如把本机的:4455的UDP流量转发到www.yourserver.com:4455For example, the UDP traffic of the machine: 4545 is forwarded to www.yourserver.com:4455:
* 在www.yourserver.com的服务器上用root权限运行。Run with root privileges on the server at www.yourserver.com
```
sudo ./pingtunnel -type server
```
* 在你本地电脑上用管理员权限运行。Run with administrator privileges on your local computer
```
pingtunnel.exe -type client -l :4455 -s www.yourserver.com -t www.yourserver.com:4455
```
2018-12-23 08:09:33 +03:00
* 如果看到客户端不停的ping、pong日志输出说明工作正常。If you see the client ping, pong log output, it means normal work
```
ping www.xx.com 2018-12-23 13:05:50.5724495 +0800 CST m=+3.023909301 8 0 1997 2
pong from xx.xx.xx.xx 210.8078ms
```
2019-10-27 15:03:55 +03:00
* 如果想转发tcp流量只需要在客户端加上-tcp的参数。If you want to forward tcp traffic, you only need to add the -tcp parameter to the client.
2018-12-23 08:09:33 +03:00
```
2019-10-27 15:03:55 +03:00
pingtunnel.exe -type client -l :4455 -s www.yourserver.com -t www.yourserver.com:4455 -tcp 1
2018-12-23 08:09:33 +03:00
```
2018-12-20 10:09:16 +03:00
# Usage
2019-10-27 15:03:55 +03:00
通过伪造ping把tcp/udp流量通过远程服务器转发到目的服务器上。用于突破某些运营商封锁TCP/UDP流量。
By forging ping, the tcp/udp traffic is forwarded to the destination server through the remote server. Used to break certain operators to block TCP/UDP traffic.
2018-12-19 11:47:04 +03:00
2019-10-27 15:03:55 +03:00
Usage:
2018-12-18 10:37:25 +03:00
pingtunnel -type server
2019-10-27 15:03:55 +03:00
pingtunnel -type client -l LOCAL_IP:4455 -s SERVER_IP -t SERVER_IP:4455 -tcp 1
2018-12-18 10:37:25 +03:00
-type 服务器或者客户端
client or server
-l 本地的地址,发到这个端口的流量将转发到服务器
Local address, traffic sent to this port will be forwarded to the server
-s 服务器的地址,流量将通过隧道转发到这个服务器
The address of the server, the traffic will be forwarded to this server through the tunnel
-t 远端服务器转发的目的地址,流量将转发到这个地址
Destination address forwarded by the remote server, traffic will be forwarded to this address
2019-10-27 15:03:55 +03:00
-timeout 本地记录连接超时的时间单位是秒默认60s
The time when the local record connection timed out, in seconds, 60 seconds by default
2018-12-19 10:50:50 +03:00
2019-10-27 15:03:55 +03:00
-key 设置的密码默认0
Set password, default 0
2018-12-19 10:50:50 +03:00
2019-10-27 15:03:55 +03:00
-tcp 设置是否转发tcp默认0
Set the switch to forward tcp, the default is 0
2018-12-23 02:19:19 +03:00
2019-10-27 15:03:55 +03:00
-tcp_bs tcp的发送接收缓冲区大小默认10MB
Tcp send and receive buffer size, default 10MB
2019-01-08 06:15:28 +03:00
2019-10-27 15:03:55 +03:00
-tcp_mw tcp的最大窗口默认10000
The maximum window of tcp, the default is 10000
-tcp_rst tcp的超时发送时间默认400ms
Tcp timeout resend time, default 400ms
-tcp_gz 当数据包超过这个大小tcp将压缩数据0表示不压缩默认0
Tcp will compress data when the packet exceeds this size, 0 means no compression, default 0
-nolog 不写日志文件只打印标准输出默认0
Do not write log files, only print standard output, default 0 is off