Pages

Friday, 27 October 2017

glider

glider is a forward proxy with multiple protocols support, and also a dns forwarding server with ipset management features(like dnsmasq).


Build Status Go Report Card GitHub tag GitHub release
glider is a forward proxy with multiple protocols support, and also a dns forwarding server with ipset management features(like dnsmasq).
we can set up local listeners as proxy servers, and forward requests to internet via forwarders.
                |Forwarder ----------------->|         
   Listener --> |                            | Internet
                |Forwarder --> Forwarder->...| 

Features

Listen(local proxy server):
  • Socks5 proxy
  • Http proxy
  • SS proxy
  • Linux transparent proxy(iptables redirect)
  • TCP tunnel
  • DNS Tunnel(udp2tcp)
Forward(upstream proxy server):
  • Socks5 proxy
  • Http proxy
  • SS proxy
DNS Forwarding Server(udp2tcp):
  • Listen on UDP and forward dns requests to remote dns server in TCP via forwarders
  • Specify different upstream dns server based on destinations(in rule file)
  • Tunnel mode: forward to a fixed upstream dns server
  • Add resolved IPs to proxy rules
  • Add resolved IPs to ipset
Ipset Management:
  • Add ip/cidrs from rule files on startup
  • Add resolved ips for domains from rule files by dns forwarding server
General:
  • Http and socks5 on the same port
  • Forward chain
  • HA or RR strategy for multiple forwarders
  • Periodical proxy checking
  • Rule proxy based on destinations: Config Examples
TODO:
  •  UDP over TCP Tunnel (client <-udp-> uottun <-tcp-> ss <-udp-> target)
  •  Transparent UDP proxy (linux tproxy)
  •  TUN/TAP device support
  •  Code refactoring: support proxy registering so it can be pluggable
  •  Conditional compilation so we can abandon needless proxy type and get a smaller binary size
  •  IPv6 support
  •  SSH tunnel support

Install

Binary:
Go Get (requires Go 1.9+ ):
go get -u github.com/nadoo/glider
ArchLinux:
sudo pacman -S glider

Run

command line:
glider -listen :8443 -verbose
config file:
glider -config CONFIGPATH
command line with config file:
glider -config CONFIGPATH -listen :8080 -verbose

Usage

glider v0.3.1 usage:
  -checkduration int
        proxy check duration(seconds) (default 30)
  -checkwebsite string
        proxy check HTTP(NOT HTTPS) website address, format: HOST[:PORT], default port: 80 (default "www.apple.com")
  -config string
        config file path
  -forward value
        forward url, format: SCHEMA://[USER|METHOD:PASSWORD@][HOST]:PORT[,SCHEMA://[USER|METHOD:PASSWORD@][HOST]:PORT]
  -listen value
        listen url, format: SCHEMA://[USER|METHOD:PASSWORD@][HOST]:PORT
  -rulefile value
        rule file path
  -strategy string
        forward strategy, default: rr (default "rr")
  -verbose
        verbose mode

Available Schemas:
  mixed: serve as a http/socks5 proxy on the same port. (default)
  ss: ss proxy
  socks5: socks5 proxy
  http: http proxy
  redir: redirect proxy. (used on linux as a transparent proxy with iptables redirect rules)
  tcptun: a simple tcp tunnel
  dnstun: listen on udp port and forward all dns requests to remote dns server via forwarders(tcp)

Available schemas for different modes:
  listen: mixed ss socks5 http redir tcptun dnstun
  forward: ss socks5 http

Available methods for ss:
  AEAD_AES_128_GCM AEAD_AES_192_GCM AEAD_AES_256_GCM AEAD_CHACHA20_POLY1305 AES-128-CFB AES-128-CTR AES-192-CFB AES-192-CTR AES-256-CFB AES-256-CTR CHACHA20-IETF XCHACHA20
  NOTE: chacha20-ietf-poly1305 = AEAD_CHACHA20_POLY1305

Available forward strategies:
  rr: Round Robin mode
  ha: High Availability mode

Config file format(see `glider.conf.example` as an example):
  # COMMENT LINE
  KEY=VALUE
  KEY=VALUE
  # KEY equals to command line flag name: listen forward strategy...

Examples:
  glider -config glider.conf
    -run glider with specified config file.

  glider -config glider.conf -rulefile office.rule -rulefile home.rule
    -run glider with specified global config file and rule config files.

  glider -listen :8443
    -listen on :8443, serve as http/socks5 proxy on the same port.

  glider -listen ss://AEAD_CHACHA20_POLY1305:pass@:8443
    -listen on 0.0.0.0:8443 as a ss server.

  glider -listen socks5://:1080 -verbose
    -listen on :1080 as a socks5 proxy server, in verbose mode.

  glider -listen http://:8080 -forward socks5://127.0.0.1:1080
    -listen on :8080 as a http proxy server, forward all requests via socks5 server.

  glider -listen redir://:1081 -forward ss://method:pass@1.1.1.1:8443
    -listen on :1081 as a transparent redirect server, forward all requests via remote ss server.

  glider -listen tcptun://:80=2.2.2.2:80 -forward ss://method:pass@1.1.1.1:8443
    -listen on :80 and forward all requests to 2.2.2.2:80 via remote ss server.

  glider -listen socks5://:1080 -listen http://:8080 -forward ss://method:pass@1.1.1.1:8443
    -listen on :1080 as socks5 server, :8080 as http proxy server, forward all requests via remote ss server.

  glider -listen redir://:1081 -listen dnstun://:53=8.8.8.8:53 -forward ss://method:pass@server1:port1,ss://method:pass@server2:port2
    -listen on :1081 as transparent redirect server, :53 as dns server, use forward chain: server1 -> server2.

  glider -listen socks5://:1080 -forward ss://method:pass@server1:port1 -forward ss://method:pass@server2:port2 -strategy rr
    -listen on :1080 as socks5 server, forward requests via server1 and server2 in roundrbin mode.

Advanced Usage

Service

Links

  • go-ss2: ss protocol support
  • conflag: command line and config file parse support
  • ArchLinux: a great linux distribution with glider pre-built package

from https://github.com/nadoo/glider
---------


发现一个转换工具glider,能够将Socks5转成 SS



在局域网PC装上SS-H和Glider,通过Glider将ss-h的socks5转换成 SS、HTTP、Socks5,
这时候PC就成了一个SS服务器,局域网里的手机就能用SS/SSR客户端 全局翻墙了
(也可以在PC上用SS客户端请求这个本地的SS服务器,实现负载均衡?)
dasda

glider参考配置: https://github.com/onplus/shadowsocks-heroku/files/1384805/glider.zip

listen=:8443
listen=ss://AES-128-CFB:1234@:8449
forward=socks5://127.0.0.1:1080

verbose=True
strategy=rr
checkwebsite=www.microsoft.com
checkduration=30
# Setup a dns forwarding server
#dns=:53
# global remote dns server (you can specify different dns server in rule file)
#dnsserver=8.8.8.8:53
from https://github.com/onplus/shadowsocks-heroku/issues/47

No comments:

Post a Comment