Go to file
2019-10-25 21:57:38 +08:00
.idea add 2018-12-22 16:42:45 +08:00
cmd add 2019-10-25 20:42:51 +08:00
.gitignore Initial commit 2018-12-16 12:02:09 +08:00
client.go add 2019-10-25 21:57:38 +08:00
framemgr.go add 2019-10-24 21:57:03 +08:00
gen.bat add 2019-10-22 09:39:20 +08:00
LICENSE Initial commit 2018-12-16 12:02:09 +08:00
msg.pb.go add 2019-10-25 21:42:02 +08:00
msg.proto add 2019-10-25 21:42:02 +08:00
network.png Add files via upload 2018-12-19 16:45:56 +08:00
pingtunnel_test.go add 2019-10-24 21:42:46 +08:00
pingtunnel.go add 2019-10-25 21:31:04 +08:00
README.md update 2019-01-08 11:15:28 +08:00
server.go add 2019-10-25 21:57:38 +08:00
show.png Add files via upload 2018-12-23 13:16:14 +08:00

Pingtunnel

pingtunnel是把udp流量伪装成icmp流量进行转发的工具类似于kcptun。用于突破网络封锁或是绕过WIFI网络的登陆验证。可以与kcptun很方便的结合使用。
Pingtunnel is a tool that advertises udp traffic as icmp traffic for forwarding, similar to kcptun. Used to break through the network blockade, or to bypass the WIFI network login verification. Can be combined with kcptun very convenient. image

Sample

如把本机的:4455的UDP流量转发到www.yourserver.com:4455For example, the UDP traffic of the machine: 4545 is forwarded to www.yourserver.com:4455:

  • 在www.yourserver.com的服务器上用root权限运行。Run with root privileges on the server at www.yourserver.com
sudo ./pingtunnel -type server
  • 在你本地电脑上用管理员权限运行。Run with administrator privileges on your local computer
pingtunnel.exe -type client -l :4455 -s www.yourserver.com -t www.yourserver.com:4455
  • 如果看到客户端不停的ping、pong日志输出说明工作正常。If you see the client ping, pong log output, it means normal work
ping www.xx.com 2018-12-23 13:05:50.5724495 +0800 CST m=+3.023909301 8 0 1997 2
pong from xx.xx.xx.xx 210.8078ms

注意

对于某些网络,比如长城宽带、宽带通,需要特殊处理才能正常工作。方法是

  • 关闭服务器的系统ping例如
echo 1 > /proc/sys/net/ipv4/icmp_echo_ignore_all 
  • 客户端添加catch参数用来主动抓取服务器回包100就是每秒主动抓100个包
pingtunnel.exe -type client -l :4455 -s www.yourserver.com -t www.yourserver.com:4455 -catch 100
  • 这个是在某开放wifi上利用shadowsocks、kcptun、pingtunnel绕过验证直接上网可以看到wifi是受限的但是仍然可以通过远程访问网络ip地址显示是远程服务器的地址因为他没有禁ping image

Usage

通过伪造ping把udp流量通过远程服务器转发到目的服务器上。用于突破某些运营商封锁UDP流量。
By forging ping, the udp traffic is forwarded to the destination server through the remote server. Used to break certain operators to block UDP traffic.

Usage:

pingtunnel -type server

pingtunnel -type client -l LOCAL_IP:4455 -s SERVER_IP -t SERVER_IP:4455

-type     服务器或者客户端
          client or server

-l        本地的地址,发到这个端口的流量将转发到服务器
          Local address, traffic sent to this port will be forwarded to the server

-s        服务器的地址,流量将通过隧道转发到这个服务器
          The address of the server, the traffic will be forwarded to this server through the tunnel

-t        远端服务器转发的目的地址,流量将转发到这个地址
          Destination address forwarded by the remote server, traffic will be forwarded to this address

-timeout  本地记录连接超时的时间,单位是秒
          The time when the local record connection timed out, in seconds

-sproto   客户端发送ping协议的协议默认是13
          The protocol that the client sends the ping. The default is 13.

-rproto   客户端接收ping协议的协议默认是14
          The protocol that the client receives the ping. The default is 14.

-catch    主动抓模式每秒从服务器主动抓多少个reply包默认0
          Active capture mode, how many reply packets are actively captured from the server per second, default 0

-key      设置的密码默认0
          Set password, default 0