From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: ximin@dfinity.org Received: from krantz.zx2c4.com (localhost [127.0.0.1]) by krantz.zx2c4.com (ZX2C4 Mail Server) with ESMTP id 61fb43d9 for ; Wed, 18 Apr 2018 16:22:11 +0000 (UTC) Received: from mail-it0-f49.google.com (mail-it0-f49.google.com [209.85.214.49]) by krantz.zx2c4.com (ZX2C4 Mail Server) with ESMTP id 8f2bef98 for ; Wed, 18 Apr 2018 16:22:11 +0000 (UTC) Received: by mail-it0-f49.google.com with SMTP id h143-v6so3361241ita.4 for ; Wed, 18 Apr 2018 09:36:59 -0700 (PDT) MIME-Version: 1.0 In-Reply-To: <24602785.LeAoNilrza@aoi.marionegri.it> References: <24602785.LeAoNilrza@aoi.marionegri.it> From: Ximin Luo Date: Wed, 18 Apr 2018 18:36:58 +0200 Message-ID: Subject: Re: [HACK] UDP tunneling over TCP for WireGuard To: Luca Beltrame Content-Type: multipart/alternative; boundary="000000000000597f75056a22100d" Cc: WireGuard mailing list List-Id: Development discussion of WireGuard List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , --000000000000597f75056a22100d Content-Type: text/plain; charset="UTF-8" (reposting to the list, not used to gmail) On Wed, Apr 18, 2018 at 1:55 PM, Luca Beltrame wrote: > [..] > > Very hacky, but gets the job done. Any suggestions on how to make it > better? > I wonder if anyone has written a program (likely it has to be a kernel module) to tunnel UDP packets over "fake TCP" i.e. just put the UDP data in a TCP packet but not actually run TCP. I'm not sure how deeply firewalls check TCP headers to see if they are "actually" running TCP "properly", but I'd guess it's possible to fake enough aspects of it so that it "looks legit" and no firewall would be able to tell the difference. X --000000000000597f75056a22100d Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
(reposting to the list, not used to gmail)

On Wed, Apr 18, 2018 at = 1:55 PM, Luca Beltrame <lbeltrame@kde.org> wrote:
[..]

Very hacky, but gets the job done. Any suggestions on how to make it better= ?

I wonder if anyon= e has written a program (likely it has to be a kernel=20 module) to tunnel UDP packets over "fake TCP" i.e. just put the U= DP data in a TCP packet but not actually run TCP. I'm not sure how deeply=20 firewalls check TCP headers to see if they are "actually" running= TCP=20 "properly", but I'd guess it's possible to fake enough as= pects of it so=20 that it "looks legit" and no firewall would be able to tell the= =20 difference.

X

--000000000000597f75056a22100d--