blob: eefe08970a401b19d5de53cafc443b0d602a3744 (
plain) (
blame)
| 1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
 | hacking quicktun through socks4a:
  i've never actually tested this. but it should "just work"
  with minimal shit. if it's really that bad you can complain to
  /relayhell/d3v11.
depends:
  quicktun.raw, socat, daemontools,
  a lot of fucking patience
env:
  $DEBUG
    1 for debugging, 0 for quiet
  $TUN_MODE
    this should always be 1
  $PROTOCOL
    raw, nacl0, nacltai supported
  $INTERFACE
    named interface of your tunnel
  $REMOTE_FLOAT
    peer one should set REMOTE_FLOAT = 0
    peer two should set REMOTE_FLOAT = 1
  $PRIVATE_KEY
    your private key, necessary for nacl0 and nacltai
  $PUBLIC_KEY
    peer's public key, necessary for nacl0 or nacltai
  $LOCAL_ADDRESS
    quicktun.* will bind here
  $LOCAL_PORT
    quicktun.* will bind here
  $REMOTE_ADDRESS
    quicktun.socks4a listens here on UDP
  $REMOTE_PORT
    quicktun.socks4a listens here on UDP
  $DST_ADDRESS
    REAL REMOTE_ADDRESS
  $DST_PORT
    REAL REMOTE_PORT
  $SOCKS_ADDRESS
    listening address of the socks4a proxy
  $SOCKS_PORT
    listening port of the socks4a proxy
 |