mirror of
https://github.com/wangyu-/udp2raw.git
synced 2025-02-08 16:19:35 +08:00
Updated run udp2raw with non root account (markdown)
parent
50148df1a8
commit
20013a05d5
@ -3,14 +3,17 @@ It's not security secure to run udp2raw with root. This page demonstrates how to
|
|||||||
You must have `setcap` as a prerequisite. `setcap` is shipped with most desktop linux distributions by defualt. But its seems to be missing on OpenWRT/LEDE.
|
You must have `setcap` as a prerequisite. `setcap` is shipped with most desktop linux distributions by defualt. But its seems to be missing on OpenWRT/LEDE.
|
||||||
|
|
||||||
```
|
```
|
||||||
|
# grant udp2raw CAP_NET_RAW permission
|
||||||
sudo setcap cap_net_raw+ep udp2raw_amd64
|
sudo setcap cap_net_raw+ep udp2raw_amd64
|
||||||
|
|
||||||
./udp2raw_amd64 -s -l0.0.0.0:4096 -r 127.0.0.1:7777 -k "passwd" --raw-mode faketcp -g #use -g option instead of -a, then udp2raw will generate a iptables rule for you
|
# run udp2raw with -g option instead of -a, then udp2raw will generate a iptables rule for you
|
||||||
|
./udp2raw_amd64 -s -l0.0.0.0:4096 -r 127.0.0.1:7777 -k "passwd" --raw-mode faketcp -g
|
||||||
|
|
||||||
sudo iptables -I INPUT -p tcp -m tcp --dport 4096 -j DROP # add the generated iptables rule manually
|
# add the generated iptables rule manually
|
||||||
|
sudo iptables -I INPUT -p tcp -m tcp --dport 4096 -j DROP
|
||||||
./udp2raw_amd64 -s -l0.0.0.0:4096 -r 127.0.0.1:7777 -k "passwd" --raw-mode faketcp #then run udp2raw without -g option
|
|
||||||
|
|
||||||
|
#then run udp2raw without -g option
|
||||||
|
./udp2raw_amd64 -s -l0.0.0.0:4096 -r 127.0.0.1:7777 -k "passwd" --raw-mode faketcp
|
||||||
```
|
```
|
||||||
|
|
||||||
It works for both client and server.
|
It works for both client and server.
|
Loading…
x
Reference in New Issue
Block a user