Update README.md

This commit is contained in:
zhao xin 2019-10-27 20:03:55 +08:00 committed by GitHub
parent 2495f2290f
commit ae787b421e
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -17,31 +17,20 @@ pingtunnel.exe -type client -l :4455 -s www.yourserver.com -t www.yourserver.com
ping www.xx.com 2018-12-23 13:05:50.5724495 +0800 CST m=+3.023909301 8 0 1997 2
pong from xx.xx.xx.xx 210.8078ms
```
# 注意
对于某些网络,比如长城宽带、宽带通,需要特殊处理才能正常工作。方法是
* 关闭服务器的系统ping例如
* 如果想转发tcp流量只需要在客户端加上-tcp的参数。If you want to forward tcp traffic, you only need to add the -tcp parameter to the client.
```
echo 1 > /proc/sys/net/ipv4/icmp_echo_ignore_all
pingtunnel.exe -type client -l :4455 -s www.yourserver.com -t www.yourserver.com:4455 -tcp 1
```
* 客户端添加catch参数用来主动抓取服务器回包100就是每秒主动抓100个包
```
pingtunnel.exe -type client -l :4455 -s www.yourserver.com -t www.yourserver.com:4455 -catch 100
```
* 这个是在某开放wifi上利用shadowsocks、kcptun、pingtunnel绕过验证直接上网可以看到wifi是受限的但是仍然可以通过远程访问网络ip地址显示是远程服务器的地址因为他没有禁ping
![image](show.png)
# Usage
通过伪造ping把tcp/udp流量通过远程服务器转发到目的服务器上。用于突破某些运营商封锁TCP/UDP流量。
By forging ping, the tcp/udp traffic is forwarded to the destination server through the remote server. Used to break certain operators to block TCP/UDP traffic.
通过伪造ping把udp流量通过远程服务器转发到目的服务器上。用于突破某些运营商封锁UDP流量。
By forging ping, the udp traffic is forwarded to the destination server through the remote server. Used to break certain operators to block UDP traffic.
Usage:
Usage:
pingtunnel -type server
pingtunnel -type client -l LOCAL_IP:4455 -s SERVER_IP -t SERVER_IP:4455
pingtunnel -type client -l LOCAL_IP:4455 -s SERVER_IP -t SERVER_IP:4455 -tcp 1
-type 服务器或者客户端
client or server
@ -55,17 +44,26 @@ pingtunnel.exe -type client -l :4455 -s www.yourserver.com -t www.yourserver.com
-t 远端服务器转发的目的地址,流量将转发到这个地址
Destination address forwarded by the remote server, traffic will be forwarded to this address
-timeout 本地记录连接超时的时间,单位是秒
The time when the local record connection timed out, in seconds
-sproto 客户端发送ping协议的协议默认是13
The protocol that the client sends the ping. The default is 13.
-rproto 客户端接收ping协议的协议默认是14
The protocol that the client receives the ping. The default is 14.
-catch 主动抓模式每秒从服务器主动抓多少个reply包默认0
Active capture mode, how many reply packets are actively captured from the server per second, default 0
-timeout 本地记录连接超时的时间单位是秒默认60s
The time when the local record connection timed out, in seconds, 60 seconds by default
-key 设置的密码默认0
Set password, default 0
Set password, default 0
-tcp 设置是否转发tcp默认0
Set the switch to forward tcp, the default is 0
-tcp_bs tcp的发送接收缓冲区大小默认10MB
Tcp send and receive buffer size, default 10MB
-tcp_mw tcp的最大窗口默认10000
The maximum window of tcp, the default is 10000
-tcp_rst tcp的超时发送时间默认400ms
Tcp timeout resend time, default 400ms
-tcp_gz 当数据包超过这个大小tcp将压缩数据0表示不压缩默认0
Tcp will compress data when the packet exceeds this size, 0 means no compression, default 0
-nolog 不写日志文件只打印标准输出默认0
Do not write log files, only print standard output, default 0 is off