https://github.com/threefoldtech/tcprouter
down to earth tcprouter with TLS support based on SNI
https://github.com/threefoldtech/tcprouter
proxy router tcpproxy tls
Last synced: about 2 months ago
JSON representation
down to earth tcprouter with TLS support based on SNI
- Host: GitHub
- URL: https://github.com/threefoldtech/tcprouter
- Owner: threefoldtech
- License: apache-2.0
- Created: 2019-05-30T21:33:27.000Z (almost 6 years ago)
- Default Branch: master
- Last Pushed: 2023-10-12T02:57:23.000Z (over 1 year ago)
- Last Synced: 2024-06-19T10:14:05.757Z (11 months ago)
- Topics: proxy, router, tcpproxy, tls
- Language: Go
- Size: 6.41 MB
- Stars: 7
- Watchers: 3
- Forks: 1
- Open Issues: 9
-
Metadata Files:
- Readme: README.md
- License: LICENSE
- Codeowners: CODEOWNERS
Awesome Lists containing this project
README
# tcprouter
A down to earth tcp router based on traefik tcp streaming and supports multiple backends using [valkyrie](https://github.com/abronan/valkeyrie)
## Build
```
git clone https://github.com/threefoldtech/tcprouter
make
```This will generate two binaries in bin dir
- `trs`: tcp router server
- `trc`: tcp router client## Running
Example configuration file
```toml
[server]
addr = "0.0.0.0" # listening address for all entrypoints (http, https, tcp router client)
port = 443 # TLS listening port
httpport = 80 # HTTP listening port[server.dbbackend] # configuration for the redis backend
type = "redis"
addr = "127.0.0.1"
port = 6379
refresh = 10 # make the tcp router poll for new configuration every 10 seconds[server.services]
[server.services."mydomain.com"]
addr = "172.217.19.46"
tlsport = 443
httpport = 80
```then `trs -config router.toml`
Please notice if you are using low numbered port like 80 or 443 you can use sudo or setcap before running the binary.
- `sudo setcap CAP_NET_BIND_SERVICE=+eip trs`### router.toml
We have two 3 sections so far
#### [server]
```toml
[server]
addr = "0.0.0.0"
port = 443
httpport = 80
```in `[server]` section we define the listening interface/port the tcprouter intercepting: typically that's 443 for TLS connections.
#### [server.dbbackend]
```toml
[server.dbbackend]
type = "redis"
addr = "127.0.0.1"
port = 6379
refresh = 10
```in `server.dbbackend` we define the backend kv store and its connection information `addr,port` and how often we want to reload the data from the kv store using `refresh` key in seconds.
#### [server.services]
```toml
[server.services]
[server.services."mydomain.com"]
addr = "172.217.19.46"
tlsport = 443
httpport = 80
```Services are static configuration that are hardcoded in the configuration file instead of coming from the database backend.
In this example the request for domain `mydomain.com` will be forwarded to the backend server at `172.217.19.46:443` for TLS traffic and `172.217.19.46:80` for non TLS traffic.## Data representation in KV
```shell
127.0.0.1:6379> KEYS *
1) "/tcprouter/services/www.bing.com"
2) "/tcprouter/services/www.google.com"
3) "/tcprouter/services/www.facebook.com"127.0.0.1:6379> get /tcprouter/services/www.google.com
"{\"Key\":\"tcprouter/services/www.google.com\",\"Value\":\"eyJhZGRyIjogIjE3Mi4yMTcuMTkuNDYiLCAiaHR0cHBvcnQiIDgwLCAidGxzcG9ydCI6IDQ0M30=\",\"LastIndex\":75292246}"
```### Decoding data from python
```ipython
In [64]: res = r.get("/tcprouter/service/www.google.com")
In [65]: decoded = json.loads(res)
In [66]: decoded
Out[66]:
{'Key': '/tcprouter/service/www.google.com',
'Value': 'eyJhZGRyIjogIjE3Mi4yMTcuMTkuNDYiLCAiaHR0cHBvcnQiIDgwLCAidGxzcG9ydCI6IDQ0M30='}
````Value` payload is base64 encoded because of how golang is marshaling.
```ipython
In [67]: base64.b64decode(decoded['Value'])
Out[67]: b'{"addr": "172.217.19.46", "httpport" 80, "tlsport": 443}'
```## Examples
### Go
This example can be found at [examples/main.go](./examples/main.go)
```go
package mainimport (
"encoding/json"
"log"
"time""github.com/abronan/valkeyrie"
"github.com/abronan/valkeyrie/store""github.com/abronan/valkeyrie/store/redis"
)func init() {
redis.Register()
}type Service struct {
Addr string `json:"addr"`
SNI string `json:"sni"`
Name string `json:"bing"`
}func main() {
// Initialize a new store with redis
kv, err := valkeyrie.NewStore(
store.REDIS,
[]string{"127.0.0.1:6379" },
&store.Config{
ConnectionTimeout: 10 * time.Second,
},
)
if err != nil {
log.Fatal("Cannot create store redis")
}
google := &Service{Addr:"172.217.19.46:443", SNI:"www.google.com", Name:"google"}
encGoogle, _ := json.Marshal(google)
bing := &Service{Addr:"13.107.21.200:443", SNI:"www.bing.com", Name:"bing"}
encBing, _ := json.Marshal(bing)kv.Put("/tcprouter/services/google", encGoogle, nil)
kv.Put("/tcprouter/services/bing", encBing, nil)
}
```### Python
```python
import base64
import json
import redisr = redis.Redis()
def create_service(name, sni, addr):
service = {}
service['Key'] = '/tcprouter/service/{}'.format(name)
record = {"addr":addr, "sni":sni, "name":name}
json_dumped_record_bytes = json.dumps(record).encode()
b64_record = base64.b64encode(json_dumped_record_bytes).decode()
service['Value'] = b64_record
r.set(service['Key'], json.dumps(service))create_service('facebook', "www.facebook.com", "102.132.97.35:443")
create_service('google', 'www.google.com', '172.217.19.46:443')
create_service('bing', 'www.bing.com', '13.107.21.200:443')
```If you want to test that locally you can modify `/etc/hosts`
```shell
127.0.0.1 www.google.com
127.0.0.1 www.bing.com
127.0.0.1 www.facebook.com
```So your browser go to your `127.0.0.1:443` on requesting google or bing.
## CATCH_ALL
to add a global `catch all` service
`python3 create_service.py CATCH_ALL 'CATCH_ALL' '127.0.0.1:9092'`
## Reverse tunneling
TCP router also support to forward connection to a server that is hidden behind NAT. The way it works is on the hidden client side,
a small client runs and opens a connection to the tcp router server. The client sends a secret during an handshake with the server to authenticate the connection.The server then keeps the connection opens and is able to forward incoming public traffic to the open connection. This is specially useful if there is no way for the tcp router server to open a connection to the backend. Usually because of NAT.

### example
Fist create the configuration on the server side. The only required field in the configuration is the secret for the client connection:
```toml
[server.services]
[server.services."mydomain.com"]
clientsecret = "TB2pbZ5FR8GQZp9W2z97jBjxSgWgQKaQTxEgrZNBa4pEFzv3PJcRVEtG2a5BU9qd"
```Second starts the tcp router client and make it opens a connection to the tcp router server:
The following command will connect the the server located at `tcprouter-1.com`, forward traffic for `mydomain.com` to the local application running at `localhost:8080` and send the response back.`trc -local localhost:8080 -remote tcprouter-1.com -secret TB2pbZ5FR8GQZp9W2z97jBjxSgWgQKaQTxEgrZNBa4pEFzv3PJcRVEtG2a5BU9qd`
To forward tls traffic to a difference port than none-tls traffic add the `--local-tls` flag
`trc -local localhost:8080 -local-tls localhost:443 -remote tcprouter-1.com -secret TB2pbZ5FR8GQZp9W2z97jBjxSgWgQKaQTxEgrZNBa4pEFzv3PJcRVEtG2a5BU9qd`