glider/README.md

349 lines
12 KiB
Markdown
Raw Normal View History

# [glider](https://github.com/nadoo/glider)
[![Build Status](https://img.shields.io/travis/nadoo/glider.svg?style=flat-square)](https://travis-ci.org/nadoo/glider)
[![Go Report Card](https://goreportcard.com/badge/github.com/nadoo/glider?style=flat-square)](https://goreportcard.com/report/github.com/nadoo/glider)
2017-09-11 00:25:57 +08:00
[![GitHub tag](https://img.shields.io/github/tag/nadoo/glider.svg?style=flat-square)](https://github.com/nadoo/glider/releases)
[![GitHub release](https://img.shields.io/github/release/nadoo/glider.svg?style=flat-square)](https://github.com/nadoo/glider/releases)
2017-09-03 01:05:56 +08:00
glider is a forward proxy with multiple protocols support, and also a dns forwarding server with ipset management features(like dnsmasq).
2017-07-13 21:55:41 +08:00
2017-09-03 01:05:56 +08:00
we can set up local listeners as proxy servers, and forward requests to internet via forwarders.
2018-08-01 00:47:43 +08:00
```bash
|Forwarder ----------------->|
2017-07-23 01:57:05 +08:00
Listener --> | | Internet
2018-08-01 00:47:43 +08:00
|Forwarder --> Forwarder->...|
2017-07-23 01:57:05 +08:00
```
2017-07-27 01:22:56 +08:00
## Features
2018-08-01 00:47:43 +08:00
2018-01-22 00:40:04 +08:00
Listen (local proxy server):
2018-08-01 00:47:43 +08:00
2018-01-20 23:27:22 +08:00
- Socks5 proxy(tcp&udp)
- Http proxy(tcp)
- SS proxy(tcp&udp)
2017-07-27 01:22:56 +08:00
- Linux transparent proxy(iptables redirect)
- TCP tunnel
2018-01-20 23:27:22 +08:00
- UDP tunnel
2018-01-20 22:13:04 +08:00
- UDP over TCP tunnel
- TLS, use it together with above proxy protocols(tcp)
- Unix domain socket, use it together with above proxy protocols(tcp)
2018-12-12 21:40:31 +08:00
- KCP protocol, use it together with above proxy protocols(tcp)
2017-09-03 01:05:56 +08:00
2018-01-22 00:40:04 +08:00
Forward (local proxy client/upstream proxy server):
2018-08-01 00:47:43 +08:00
2018-01-22 23:24:33 +08:00
- Socks5 proxy(tcp&udp)
2018-01-20 23:27:22 +08:00
- Http proxy(tcp)
- SS proxy(tcp&udp&uot)
2018-05-17 10:16:00 +08:00
- SSR proxy(tcp)
2018-07-05 20:44:19 +08:00
- VMess proxy(tcp)
- TLS, use it together with above proxy protocols(tcp)
2018-07-22 20:02:50 +08:00
- Websocket, use it together with above proxy protocols(tcp)
- Unix domain socket, use it together with above proxy protocols(tcp)
2018-12-12 21:40:31 +08:00
- KCP protocol, use it together with above proxy protocols(tcp)
- Simple-Obfs, use it together with above proxy protocols(tcp)
2017-07-27 01:22:56 +08:00
2018-01-22 00:40:04 +08:00
DNS Forwarding Server (udp2tcp):
2018-08-01 00:47:43 +08:00
2017-09-03 01:05:56 +08:00
- Listen on UDP and forward dns requests to remote dns server in TCP via forwarders
- Specify different upstream dns server based on destinations(in rule file)
- Tunnel mode: forward to a fixed upstream dns server
- Add resolved IPs to proxy rules
- Add resolved IPs to ipset
2018-08-01 00:47:43 +08:00
- DNS cache
- Custom dns record
2017-09-03 01:05:56 +08:00
2018-09-04 20:26:40 +08:00
IPSet Management (Linux kernel version >= 2.6.32):
2018-08-01 00:47:43 +08:00
2017-09-03 01:05:56 +08:00
- Add ip/cidrs from rule files on startup
- Add resolved ips for domains from rule files by dns forwarding server
2017-09-03 01:05:56 +08:00
2017-07-27 01:22:56 +08:00
General:
2018-08-01 00:47:43 +08:00
- Http and socks5 on the same port
2018-09-04 20:26:40 +08:00
- Forwarder chain
- RR/HA/LHA/DH strategy for multiple forwarders
2017-07-27 01:22:56 +08:00
- Periodical proxy checking
2017-08-31 00:08:22 +08:00
- Rule proxy based on destinations: [Config Examples](config/examples)
2018-08-21 07:57:21 +08:00
- Send requests from specific ip/interface
2017-07-30 10:57:24 +08:00
TODO:
2018-08-01 00:47:43 +08:00
- [ ] IPv6 support in ipset manager
- [ ] Transparent UDP proxy (iptables tproxy)
2018-07-03 00:31:43 +08:00
- [ ] Performance tuning
- [ ] TUN/TAP device support
2018-08-01 00:47:43 +08:00
- [ ] SSH tunnel support (maybe)
2017-07-27 01:22:56 +08:00
2017-07-13 21:55:41 +08:00
## Install
2018-08-01 00:47:43 +08:00
Binary:
2017-07-21 18:58:51 +08:00
- [https://github.com/nadoo/glider/releases](https://github.com/nadoo/glider/releases)
2017-07-13 21:55:41 +08:00
2018-07-16 15:08:43 +08:00
Go Get (requires **Go 1.10+** ):
2018-08-01 00:47:43 +08:00
2017-07-21 18:58:51 +08:00
```bash
go get -u github.com/nadoo/glider
```
2018-08-01 00:47:43 +08:00
ArchLinux:
2017-07-21 18:58:51 +08:00
```bash
sudo pacman -S glider
```
## Run
2018-08-01 00:47:43 +08:00
2017-07-29 18:15:22 +08:00
command line:
2018-08-01 00:47:43 +08:00
2017-07-21 18:58:51 +08:00
```bash
glider -listen :8443 -verbose
```
2017-07-29 18:15:22 +08:00
config file:
2018-08-01 00:47:43 +08:00
2017-07-21 18:58:51 +08:00
```bash
glider -config CONFIGPATH
```
2017-07-13 21:55:41 +08:00
2017-07-29 18:15:22 +08:00
command line with config file:
2018-08-01 00:47:43 +08:00
2017-07-29 18:15:22 +08:00
```bash
glider -config CONFIGPATH -listen :8080 -verbose
```
2017-07-13 21:55:41 +08:00
## Usage
2018-08-01 00:47:43 +08:00
2017-07-13 21:55:41 +08:00
```bash
2018-12-12 21:40:31 +08:00
glider v0.6.10 usage:
2017-07-18 19:25:54 +08:00
-checkduration int
proxy check interval(seconds) (default 30)
-checkwebsite string
proxy check HTTP(NOT HTTPS) website address, format: HOST[:PORT], default port: 80 (default "www.apple.com")
2017-07-18 19:25:54 +08:00
-config string
config file path
2018-01-20 23:27:22 +08:00
-dns string
2018-11-28 23:28:32 +08:00
local dns server listen address
2018-08-27 00:01:09 +08:00
-dnsalwaystcp
always use tcp to query upstream dns servers no matter there is a forwarder or not
-dnsmaxttl int
maximum TTL value for entries in the CACHE(seconds) (default 1800)
-dnsminttl int
minimum TTL value for entries in the CACHE(seconds)
2018-08-01 00:36:11 +08:00
-dnsrecord value
custom dns record, format: domain/ip
2018-01-20 23:27:22 +08:00
-dnsserver value
2018-11-28 23:28:32 +08:00
remote dns server address
-dnstimeout int
timeout value used in multiple dnsservers switch(seconds) (default 3)
2017-07-18 19:25:54 +08:00
-forward value
2018-06-03 13:54:16 +08:00
forward url, format: SCHEME://[USER|METHOD:PASSWORD@][HOST]:PORT?PARAMS[,SCHEME://[USER|METHOD:PASSWORD@][HOST]:PORT?PARAMS]
-interface string
source ip or source interface
2017-07-18 19:25:54 +08:00
-listen value
2018-06-03 13:54:16 +08:00
listen url, format: SCHEME://[USER|METHOD:PASSWORD@][HOST]:PORT?PARAMS
-maxfailures int
max failures to change forwarder status to disabled (default 3)
-rulefile value
rule file path
2018-01-20 23:27:22 +08:00
-rules-dir string
rule file folder
2017-07-18 19:25:54 +08:00
-strategy string
2017-07-13 21:55:41 +08:00
forward strategy, default: rr (default "rr")
2017-07-18 19:25:54 +08:00
-verbose
verbose mode
2017-07-13 21:55:41 +08:00
2018-06-03 13:54:16 +08:00
Available Schemes:
2017-07-13 21:55:41 +08:00
mixed: serve as a http/socks5 proxy on the same port. (default)
ss: ss proxy
socks5: socks5 proxy
http: http proxy
2018-05-20 16:59:48 +08:00
ssr: ssr proxy
2018-07-05 20:44:19 +08:00
vmess: vmess proxy
2018-07-24 00:54:38 +08:00
tls: tls transport
ws: websocket transport
2017-07-13 21:55:41 +08:00
redir: redirect proxy. (used on linux as a transparent proxy with iptables redirect rules)
redir6: redirect proxy(ipv6)
2018-01-20 23:31:36 +08:00
tcptun: tcp tunnel
udptun: udp tunnel
uottun: udp over tcp tunnel
unix: unix domain socket
2018-12-12 21:40:31 +08:00
kcp: kcp protocol
simple-obfs: simple-obfs protocol
2017-07-13 21:55:41 +08:00
2018-06-03 13:54:16 +08:00
Available schemes for different modes:
2018-12-12 21:40:31 +08:00
listen: mixed ss socks5 http redir redir6 tcptun udptun uottun tls unix kcp
forward: ss socks5 http ssr vmess tls ws unix kcp simple-bfs
2018-05-17 10:16:00 +08:00
2018-06-03 13:54:16 +08:00
SS scheme:
2018-05-17 10:16:00 +08:00
ss://method:pass@host:port
2017-07-13 21:55:41 +08:00
Available methods for ss:
2018-09-02 22:16:24 +08:00
AEAD Ciphers:
AEAD_AES_128_GCM AEAD_AES_192_GCM AEAD_AES_256_GCM AEAD_CHACHA20_POLY1305 AEAD_XCHACHA20_POLY1305
Stream Ciphers:
AES-128-CFB AES-128-CTR AES-192-CFB AES-192-CTR AES-256-CFB AES-256-CTR CHACHA20-IETF XCHACHA20 CHACHA20 RC4-MD5
Alias:
chacha20-ietf-poly1305 = AEAD_CHACHA20_POLY1305, xchacha20-ietf-poly1305 = AEAD_XCHACHA20_POLY1305
2017-07-13 21:55:41 +08:00
2018-06-03 13:54:16 +08:00
SSR scheme:
2018-05-17 10:16:00 +08:00
ssr://method:pass@host:port?protocol=xxx&protocol_param=yyy&obfs=zzz&obfs_param=xyz
2018-07-05 20:44:19 +08:00
VMess scheme:
vmess://[security:]uuid@host:port?alterID=num
2018-07-05 20:44:19 +08:00
Available securities for vmess:
2018-07-11 08:34:15 +08:00
none, aes-128-gcm, chacha20-poly1305
2018-11-28 23:28:32 +08:00
TLS client scheme:
2018-07-11 08:34:15 +08:00
tls://host:port[?skipVerify=true]
2018-11-28 23:28:32 +08:00
Proxy over tls client:
2018-07-24 00:45:41 +08:00
tls://host:port[?skipVerify=true],scheme://
2018-07-11 08:34:15 +08:00
tls://host:port[?skipVerify=true],http://[user:pass@]
tls://host:port[?skipVerify=true],socks5://[user:pass@]
tls://host:port[?skipVerify=true],vmess://[security:]uuid@?alterID=num
2018-07-05 20:44:19 +08:00
2018-11-28 23:28:32 +08:00
TLS server scheme:
tls://host:port?cert=PATH&key=PATH
Proxy over tls server:
tls://host:port?cert=PATH&key=PATH,scheme://
tls://host:port?cert=PATH&key=PATH,http://
tls://host:port?cert=PATH&key=PATH,socks5://
tls://host:port?cert=PATH&key=PATH,ss://method:pass@
2018-07-22 20:02:50 +08:00
Websocket scheme:
ws://host:port[/path]
2018-08-01 00:36:11 +08:00
Websocket with a specified proxy protocol:
2018-07-24 00:54:38 +08:00
ws://host:port[/path],scheme://
2018-07-22 20:02:50 +08:00
ws://host:port[/path],http://[user:pass@]
ws://host:port[/path],socks5://[user:pass@]
ws://host:port[/path],vmess://[security:]uuid@?alterID=num
2018-08-01 00:36:11 +08:00
TLS and Websocket with a specified proxy protocol:
2018-07-24 00:45:41 +08:00
tls://host:port[?skipVerify=true],ws://[@/path],scheme://
2018-07-22 20:02:50 +08:00
tls://host:port[?skipVerify=true],ws://[@/path],http://[user:pass@]
tls://host:port[?skipVerify=true],ws://[@/path],socks5://[user:pass@]
tls://host:port[?skipVerify=true],ws://[@/path],vmess://[security:]uuid@?alterID=num
Unix domain socket scheme:
unix://path
2018-12-12 21:40:31 +08:00
KCP scheme:
kcp://CRYPT:KEY@host:port[?dataShards=NUM&parityShards=NUM]
Available crypt types for KCP:
none, sm4, tea, xor, aes, aes-128, aes-192, blowfish, twofish, cast5, 3des, xtea, salsa20
Simple-Obfs scheme:
simple-obfs://host:port[?type=TYPE&host=HOST&uri=URI&ua=UA]
Available types for simple-obfs:
http, tls
2018-08-01 00:36:11 +08:00
DNS forwarding server:
dns=:53
dnsserver=8.8.8.8:53
dnsserver=1.1.1.1:53
dnsrecord=www.example.com/1.2.3.4
dnsrecord=www.example.com/2606:2800:220:1:248:1893:25c8:1946
2017-07-13 21:55:41 +08:00
Available forward strategies:
rr: Round Robin mode
ha: High Availability mode
lha: Latency based High Availability mode
dh: Destination Hashing mode
Forwarder option scheme: FORWARD_URL#OPTIONS
priority: set the priority of that forwarder, default:0
2018-08-20 00:17:16 +08:00
interface: set local interface or ip address used to connect remote server
-
Examples:
socks5://1.1.1.1:1080#priority=100
vmess://[security:]uuid@host:port?alterID=num#priority=200
vmess://[security:]uuid@host:port?alterID=num#priority=200&interface=192.168.1.99
vmess://[security:]uuid@host:port?alterID=num#priority=200&interface=eth0
2017-07-13 21:55:41 +08:00
2017-07-23 01:46:06 +08:00
Config file format(see `glider.conf.example` as an example):
# COMMENT LINE
KEY=VALUE
KEY=VALUE
# KEY equals to command line flag name: listen forward strategy...
2017-07-13 21:55:41 +08:00
Examples:
2017-07-18 19:25:54 +08:00
glider -config glider.conf
-run glider with specified config file.
glider -config glider.conf -rulefile office.rule -rulefile home.rule
-run glider with specified global config file and rule config files.
2017-07-18 19:25:54 +08:00
glider -listen :8443
2017-07-13 21:55:41 +08:00
-listen on :8443, serve as http/socks5 proxy on the same port.
2017-07-18 19:25:54 +08:00
glider -listen ss://AEAD_CHACHA20_POLY1305:pass@:8443
2017-07-29 18:15:22 +08:00
-listen on 0.0.0.0:8443 as a ss server.
2017-07-13 21:55:41 +08:00
2017-07-18 19:25:54 +08:00
glider -listen socks5://:1080 -verbose
2017-07-13 21:55:41 +08:00
-listen on :1080 as a socks5 proxy server, in verbose mode.
glider -listen tls://:443?cert=crtFilePath&key=keyFilePath,http:// -verbose
-listen on :443 as a https proxy server.
2017-07-18 19:25:54 +08:00
glider -listen http://:8080 -forward socks5://127.0.0.1:1080
2017-07-13 21:55:41 +08:00
-listen on :8080 as a http proxy server, forward all requests via socks5 server.
glider -listen redir://:1081 -forward ss://method:pass@1.1.1.1:8443
2017-07-13 21:55:41 +08:00
-listen on :1081 as a transparent redirect server, forward all requests via remote ss server.
2018-05-22 12:19:57 +08:00
glider -listen redir://:1081 -forward "ssr://method:pass@1.1.1.1:8444?protocol=a&protocol_param=b&obfs=c&obfs_param=d"
2018-05-17 10:16:00 +08:00
-listen on :1081 as a transparent redirect server, forward all requests via remote ssr server.
glider -listen redir://:1081 -forward "tls://1.1.1.1:443,vmess://security:uuid@?alterID=10"
2018-07-24 00:45:41 +08:00
-listen on :1081 as a transparent redirect server, forward all requests via remote tls+vmess server.
glider -listen redir://:1081 -forward "ws://1.1.1.1:80,vmess://security:uuid@?alterID=10"
-listen on :1081 as a transparent redirect server, forward all requests via remote ws+vmess server.
2018-07-05 20:44:19 +08:00
glider -listen tcptun://:80=2.2.2.2:80 -forward ss://method:pass@1.1.1.1:8443
2017-07-13 21:55:41 +08:00
-listen on :80 and forward all requests to 2.2.2.2:80 via remote ss server.
2018-01-20 23:27:22 +08:00
glider -listen udptun://:53=8.8.8.8:53 -forward ss://method:pass@1.1.1.1:8443
-listen on :53 and forward all udp requests to 8.8.8.8:53 via remote ss server.
glider -listen uottun://:53=8.8.8.8:53 -forward ss://method:pass@1.1.1.1:8443
-listen on :53 and forward all udp requests via udp over tcp tunnel.
glider -listen socks5://:1080 -listen http://:8080 -forward ss://method:pass@1.1.1.1:8443
2017-07-13 21:55:41 +08:00
-listen on :1080 as socks5 server, :8080 as http proxy server, forward all requests via remote ss server.
2018-08-01 00:36:11 +08:00
glider -listen redir://:1081 -dns=:53 -dnsserver=8.8.8.8:53 -forward ss://method:pass@server1:port1,ss://method:pass@server2:port2
2017-07-13 21:55:41 +08:00
-listen on :1081 as transparent redirect server, :53 as dns server, use forward chain: server1 -> server2.
2017-07-18 19:25:54 +08:00
glider -listen socks5://:1080 -forward ss://method:pass@server1:port1 -forward ss://method:pass@server2:port2 -strategy rr
2018-02-25 12:31:48 +08:00
-listen on :1080 as socks5 server, forward requests via server1 and server2 in round robin mode.
2018-08-01 00:36:11 +08:00
glider -verbose -dns=:53 -dnsserver=8.8.8.8:53 -dnsrecord=www.example.com/1.2.3.4
-listen on :53 as dns server, forward dns requests to 8.8.8.8:53, return 1.2.3.4 when resolving www.example.com.
2017-07-13 21:55:41 +08:00
```
2017-09-16 23:10:10 +08:00
## Advanced Usage
2018-08-01 00:47:43 +08:00
2017-09-03 01:05:56 +08:00
- [ConfigFile](config)
- [glider.conf.example](config/glider.conf.example)
- [office.rule.example](config/rules.d/office.rule.example)
- [Examples](config/examples)
2017-09-04 00:21:12 +08:00
- [transparent proxy with dnsmasq](config/examples/8.transparent_proxy_with_dnsmasq)
- [transparent proxy without dnsmasq](config/examples/9.transparent_proxy_without_dnsmasq)
2017-07-13 21:55:41 +08:00
## Service
2018-08-01 00:47:43 +08:00
- systemd: [https://github.com/nadoo/glider/blob/master/systemd/](https://github.com/nadoo/glider/blob/master/systemd/)
2017-07-14 11:20:02 +08:00
2017-07-18 19:45:35 +08:00
## Links
2018-08-01 00:47:43 +08:00
2017-07-21 18:58:51 +08:00
- [conflag](https://github.com/nadoo/conflag): command line and config file parse support
2017-07-23 01:46:06 +08:00
- [ArchLinux](https://www.archlinux.org/packages/community/x86_64/glider): a great linux distribution with glider pre-built package