mirror of
https://github.com/dndx/phantun.git
synced 2025-09-16 04:04:29 +08:00
Compare commits
7 Commits
Author | SHA1 | Date | |
---|---|---|---|
|
99bff568f6 | ||
|
91ad2c03a1 | ||
|
581d80d08c | ||
|
55da4d6a62 | ||
|
bb859be6b6 | ||
|
8d315ea4e7 | ||
|
21eabe8b82 |
27
README.md
27
README.md
@@ -2,6 +2,9 @@
|
|||||||
|
|
||||||
A lightweight and fast UDP to TCP obfuscator.
|
A lightweight and fast UDP to TCP obfuscator.
|
||||||
|
|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
Table of Contents
|
Table of Contents
|
||||||
=================
|
=================
|
||||||
|
|
||||||
@@ -32,7 +35,7 @@ Table of Contents
|
|||||||
|
|
||||||
# Latest release
|
# Latest release
|
||||||
|
|
||||||
[v0.3.0](https://github.com/dndx/phantun/releases/tag/v0.3.0)
|
[v0.3.1](https://github.com/dndx/phantun/releases/tag/v0.3.1)
|
||||||
|
|
||||||
# Overview
|
# Overview
|
||||||
|
|
||||||
@@ -52,6 +55,10 @@ connection from the perspective of firewalls/NAT devices.
|
|||||||
Phantun means Phantom TUN, as it is an obfuscator for UDP traffic that does just enough work
|
Phantun means Phantom TUN, as it is an obfuscator for UDP traffic that does just enough work
|
||||||
to make it pass through stateful firewall/NATs as TCP packets.
|
to make it pass through stateful firewall/NATs as TCP packets.
|
||||||
|
|
||||||
|
Phantun is written in 100% safe Rust. It has been optimized extensively to scale well on multi-core
|
||||||
|
systems and has no issue saturating all available CPU resources on a fast connection.
|
||||||
|
See the [Performance](#performance) section for benchmarking results.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
# Usage
|
# Usage
|
||||||
@@ -218,18 +225,20 @@ RUST_LOG=info /usr/local/bin/phantun_client --local 127.0.0.1:1234 --remote exam
|
|||||||
Phantun aims to keep tunneling overhead to the minimum. The overhead compared to a plain UDP packet
|
Phantun aims to keep tunneling overhead to the minimum. The overhead compared to a plain UDP packet
|
||||||
is the following:
|
is the following:
|
||||||
|
|
||||||
Standard UDP packet: 20 byte IP header + 8 byte UDP header = 28 bytes
|
**Standard UDP packet:** `20 byte IP header + 8 byte UDP header = 28 bytes`
|
||||||
|
|
||||||
Phantun obfuscated UDP packet: 20 byte IP header + 20 byte TCP header = 40 bytes
|
**Obfuscated packet:** `20 byte IP header + 20 byte TCP header = 40 bytes`
|
||||||
|
|
||||||
|
|
||||||
Note that Phantun does not add any additional header other than IP and TCP headers in order to pass through
|
Note that Phantun does not add any additional header other than IP and TCP headers in order to pass through
|
||||||
stateful packet inspection!
|
stateful packet inspection!
|
||||||
|
|
||||||
Phantun's additional overhead: 12 bytes. I other words, when using Phantun, the usable payload for
|
Phantun's additional overhead: `12 bytes`. I other words, when using Phantun, the usable payload for
|
||||||
UDP packet is reduced by 12 bytes. This is the minimum overhead possible when doing such kind
|
UDP packet is reduced by 12 bytes. This is the minimum overhead possible when doing such kind
|
||||||
of obfuscation.
|
of obfuscation.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
[Back to TOC](#table-of-contents)
|
[Back to TOC](#table-of-contents)
|
||||||
|
|
||||||
## MTU calculation for WireGuard
|
## MTU calculation for WireGuard
|
||||||
@@ -237,14 +246,20 @@ of obfuscation.
|
|||||||
For people who use Phantun to tunnel [WireGuard®](https://www.wireguard.com) UDP packets, here are some guidelines on figuring
|
For people who use Phantun to tunnel [WireGuard®](https://www.wireguard.com) UDP packets, here are some guidelines on figuring
|
||||||
out the correct MTU to use for your WireGuard interface.
|
out the correct MTU to use for your WireGuard interface.
|
||||||
|
|
||||||
|
```
|
||||||
WireGuard MTU = Interface MTU - IP header (20 bytes) - TCP header (20 bytes) - WireGuard overhead (32 bytes)
|
WireGuard MTU = Interface MTU - IP header (20 bytes) - TCP header (20 bytes) - WireGuard overhead (32 bytes)
|
||||||
|
```
|
||||||
|
|
||||||
For example, for a Ethernet interface with 1500 bytes MTU, the WireGuard interface MTU should be set as:
|
For example, for a Ethernet interface with 1500 bytes MTU, the WireGuard interface MTU should be set as:
|
||||||
|
|
||||||
|
```
|
||||||
1500 - 20 - 20 - 32 = 1428 bytes
|
1500 - 20 - 20 - 32 = 1428 bytes
|
||||||
|
```
|
||||||
|
|
||||||
The resulted Phantun TCP data packet will be 1500 bytes which does not exceed the
|
The resulted Phantun TCP data packet will be 1500 bytes which does not exceed the
|
||||||
interface MTU of 1500.
|
interface MTU of 1500. Please note it is strongly recommended to use the same interface
|
||||||
|
MTU for both ends of a WireGuard tunnel, or unexected packet loss may occur and these issues are
|
||||||
|
generally very hard to troubleshoot.
|
||||||
|
|
||||||
[Back to TOC](#table-of-contents)
|
[Back to TOC](#table-of-contents)
|
||||||
|
|
||||||
@@ -303,7 +318,7 @@ Here is a quick overview of comparison between those two to help you choose:
|
|||||||
| UDP over UDP obfuscation | ❌ | ✅ |
|
| UDP over UDP obfuscation | ❌ | ✅ |
|
||||||
| Multi-threaded | ✅ | ❌ |
|
| Multi-threaded | ✅ | ❌ |
|
||||||
| Throughput | Better | Good |
|
| Throughput | Better | Good |
|
||||||
| Raw IP mode | TUN interface | Raw sockets + BPF |
|
| L4 IP mode | TUN interface | Raw sockets + BPF |
|
||||||
| Tunneling MTU overhead | 12 bytes | 44 bytes |
|
| Tunneling MTU overhead | 12 bytes | 44 bytes |
|
||||||
| Seprate TCP connections for each UDP connection | Client/Server | Server only |
|
| Seprate TCP connections for each UDP connection | Client/Server | Server only |
|
||||||
| Anti-replay, encryption | ❌ | ✅ |
|
| Anti-replay, encryption | ❌ | ✅ |
|
||||||
|
@@ -1,6 +1,6 @@
|
|||||||
[package]
|
[package]
|
||||||
name = "fake-tcp"
|
name = "fake-tcp"
|
||||||
version = "0.3.0"
|
version = "0.3.1"
|
||||||
edition = "2021"
|
edition = "2021"
|
||||||
authors = ["Datong Sun <dndx@idndx.com>"]
|
authors = ["Datong Sun <dndx@idndx.com>"]
|
||||||
license = "MIT OR Apache-2.0"
|
license = "MIT OR Apache-2.0"
|
||||||
@@ -22,3 +22,4 @@ rand = { version = "0.8", features = ["small_rng"] }
|
|||||||
log = "0.4"
|
log = "0.4"
|
||||||
internet-checksum = "0.2"
|
internet-checksum = "0.2"
|
||||||
tokio-tun = "0.5"
|
tokio-tun = "0.5"
|
||||||
|
flume = "0.10"
|
||||||
|
@@ -53,14 +53,14 @@ use std::net::{Ipv4Addr, SocketAddrV4};
|
|||||||
use std::sync::atomic::{AtomicU32, Ordering};
|
use std::sync::atomic::{AtomicU32, Ordering};
|
||||||
use std::sync::{Arc, RwLock};
|
use std::sync::{Arc, RwLock};
|
||||||
use tokio::sync::broadcast;
|
use tokio::sync::broadcast;
|
||||||
use tokio::sync::mpsc::{self, Receiver, Sender};
|
use tokio::sync::mpsc;
|
||||||
use tokio::sync::Mutex as AsyncMutex;
|
|
||||||
use tokio::time;
|
use tokio::time;
|
||||||
use tokio_tun::Tun;
|
use tokio_tun::Tun;
|
||||||
|
|
||||||
const TIMEOUT: time::Duration = time::Duration::from_secs(1);
|
const TIMEOUT: time::Duration = time::Duration::from_secs(1);
|
||||||
const RETRIES: usize = 6;
|
const RETRIES: usize = 6;
|
||||||
const MPSC_BUFFER_LEN: usize = 512;
|
const MPMC_BUFFER_LEN: usize = 512;
|
||||||
|
const MPSC_BUFFER_LEN: usize = 128;
|
||||||
const MAX_UNACKED_LEN: u32 = 128 * 1024 * 1024; // 128MB
|
const MAX_UNACKED_LEN: u32 = 128 * 1024 * 1024; // 128MB
|
||||||
|
|
||||||
#[derive(Hash, Eq, PartialEq, Clone, Debug)]
|
#[derive(Hash, Eq, PartialEq, Clone, Debug)]
|
||||||
@@ -79,17 +79,17 @@ impl AddrTuple {
|
|||||||
}
|
}
|
||||||
|
|
||||||
struct Shared {
|
struct Shared {
|
||||||
tuples: RwLock<HashMap<AddrTuple, Sender<Bytes>>>,
|
tuples: RwLock<HashMap<AddrTuple, flume::Sender<Bytes>>>,
|
||||||
listening: RwLock<HashSet<u16>>,
|
listening: RwLock<HashSet<u16>>,
|
||||||
tun: Vec<Arc<Tun>>,
|
tun: Vec<Arc<Tun>>,
|
||||||
ready: Sender<Socket>,
|
ready: mpsc::Sender<Socket>,
|
||||||
tuples_purge: broadcast::Sender<AddrTuple>,
|
tuples_purge: broadcast::Sender<AddrTuple>,
|
||||||
}
|
}
|
||||||
|
|
||||||
pub struct Stack {
|
pub struct Stack {
|
||||||
shared: Arc<Shared>,
|
shared: Arc<Shared>,
|
||||||
local_ip: Ipv4Addr,
|
local_ip: Ipv4Addr,
|
||||||
ready: Receiver<Socket>,
|
ready: mpsc::Receiver<Socket>,
|
||||||
}
|
}
|
||||||
|
|
||||||
pub enum State {
|
pub enum State {
|
||||||
@@ -102,7 +102,7 @@ pub enum State {
|
|||||||
pub struct Socket {
|
pub struct Socket {
|
||||||
shared: Arc<Shared>,
|
shared: Arc<Shared>,
|
||||||
tun: Arc<Tun>,
|
tun: Arc<Tun>,
|
||||||
incoming: AsyncMutex<Receiver<Bytes>>,
|
incoming: flume::Receiver<Bytes>,
|
||||||
local_addr: SocketAddrV4,
|
local_addr: SocketAddrV4,
|
||||||
remote_addr: SocketAddrV4,
|
remote_addr: SocketAddrV4,
|
||||||
seq: AtomicU32,
|
seq: AtomicU32,
|
||||||
@@ -126,14 +126,14 @@ impl Socket {
|
|||||||
remote_addr: SocketAddrV4,
|
remote_addr: SocketAddrV4,
|
||||||
ack: Option<u32>,
|
ack: Option<u32>,
|
||||||
state: State,
|
state: State,
|
||||||
) -> (Socket, Sender<Bytes>) {
|
) -> (Socket, flume::Sender<Bytes>) {
|
||||||
let (incoming_tx, incoming_rx) = mpsc::channel(MPSC_BUFFER_LEN);
|
let (incoming_tx, incoming_rx) = flume::bounded(MPMC_BUFFER_LEN);
|
||||||
|
|
||||||
(
|
(
|
||||||
Socket {
|
Socket {
|
||||||
shared,
|
shared,
|
||||||
tun,
|
tun,
|
||||||
incoming: AsyncMutex::new(incoming_rx),
|
incoming: incoming_rx,
|
||||||
local_addr,
|
local_addr,
|
||||||
remote_addr,
|
remote_addr,
|
||||||
seq: AtomicU32::new(0),
|
seq: AtomicU32::new(0),
|
||||||
@@ -187,8 +187,7 @@ impl Socket {
|
|||||||
pub async fn recv(&self, buf: &mut [u8]) -> Option<usize> {
|
pub async fn recv(&self, buf: &mut [u8]) -> Option<usize> {
|
||||||
match self.state {
|
match self.state {
|
||||||
State::Established => {
|
State::Established => {
|
||||||
let mut incoming = self.incoming.lock().await;
|
self.incoming.recv_async().await.ok().and_then(|raw_buf| {
|
||||||
incoming.recv().await.and_then(|raw_buf| {
|
|
||||||
let (_v4_packet, tcp_packet) = parse_ipv4_packet(&raw_buf);
|
let (_v4_packet, tcp_packet) = parse_ipv4_packet(&raw_buf);
|
||||||
|
|
||||||
if (tcp_packet.get_flags() & tcp::TcpFlags::RST) != 0 {
|
if (tcp_packet.get_flags() & tcp::TcpFlags::RST) != 0 {
|
||||||
@@ -231,7 +230,7 @@ impl Socket {
|
|||||||
info!("Sent SYN + ACK to client");
|
info!("Sent SYN + ACK to client");
|
||||||
}
|
}
|
||||||
State::SynReceived => {
|
State::SynReceived => {
|
||||||
let res = time::timeout(TIMEOUT, self.incoming.lock().await.recv()).await;
|
let res = time::timeout(TIMEOUT, self.incoming.recv_async()).await;
|
||||||
if let Ok(buf) = res {
|
if let Ok(buf) = res {
|
||||||
let buf = buf.unwrap();
|
let buf = buf.unwrap();
|
||||||
let (_v4_packet, tcp_packet) = parse_ipv4_packet(&buf);
|
let (_v4_packet, tcp_packet) = parse_ipv4_packet(&buf);
|
||||||
@@ -275,7 +274,7 @@ impl Socket {
|
|||||||
info!("Sent SYN to server");
|
info!("Sent SYN to server");
|
||||||
}
|
}
|
||||||
State::SynSent => {
|
State::SynSent => {
|
||||||
match time::timeout(TIMEOUT, self.incoming.lock().await.recv()).await {
|
match time::timeout(TIMEOUT, self.incoming.recv_async()).await {
|
||||||
Ok(buf) => {
|
Ok(buf) => {
|
||||||
let buf = buf.unwrap();
|
let buf = buf.unwrap();
|
||||||
let (_v4_packet, tcp_packet) = parse_ipv4_packet(&buf);
|
let (_v4_packet, tcp_packet) = parse_ipv4_packet(&buf);
|
||||||
@@ -426,7 +425,7 @@ impl Stack {
|
|||||||
shared: Arc<Shared>,
|
shared: Arc<Shared>,
|
||||||
mut tuples_purge: broadcast::Receiver<AddrTuple>,
|
mut tuples_purge: broadcast::Receiver<AddrTuple>,
|
||||||
) {
|
) {
|
||||||
let mut tuples: HashMap<AddrTuple, Sender<Bytes>> = HashMap::new();
|
let mut tuples: HashMap<AddrTuple, flume::Sender<Bytes>> = HashMap::new();
|
||||||
|
|
||||||
loop {
|
loop {
|
||||||
let mut buf = BytesMut::with_capacity(MAX_PACKET_LEN);
|
let mut buf = BytesMut::with_capacity(MAX_PACKET_LEN);
|
||||||
@@ -450,7 +449,7 @@ impl Stack {
|
|||||||
|
|
||||||
let tuple = AddrTuple::new(local_addr, remote_addr);
|
let tuple = AddrTuple::new(local_addr, remote_addr);
|
||||||
if let Some(c) = tuples.get(&tuple) {
|
if let Some(c) = tuples.get(&tuple) {
|
||||||
if c.send(buf).await.is_err() {
|
if c.send_async(buf).await.is_err() {
|
||||||
trace!("Cache hit, but receiver already closed, dropping packet");
|
trace!("Cache hit, but receiver already closed, dropping packet");
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -469,7 +468,7 @@ impl Stack {
|
|||||||
if let Some(c) = sender {
|
if let Some(c) = sender {
|
||||||
trace!("Storing connection information into local tuples");
|
trace!("Storing connection information into local tuples");
|
||||||
tuples.insert(tuple, c.clone());
|
tuples.insert(tuple, c.clone());
|
||||||
c.send(buf).await.unwrap();
|
c.send_async(buf).await.unwrap();
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
BIN
images/packet-headers.png
Normal file
BIN
images/packet-headers.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 30 KiB |
@@ -1,6 +1,6 @@
|
|||||||
[package]
|
[package]
|
||||||
name = "phantun"
|
name = "phantun"
|
||||||
version = "0.3.1"
|
version = "0.3.2"
|
||||||
edition = "2021"
|
edition = "2021"
|
||||||
authors = ["Datong Sun <dndx@idndx.com>"]
|
authors = ["Datong Sun <dndx@idndx.com>"]
|
||||||
license = "MIT OR Apache-2.0"
|
license = "MIT OR Apache-2.0"
|
||||||
|
Reference in New Issue
Block a user