Iodine / tunneling Besoin d'aide

Utilisateur anonyme -  
 Utilisateur anonyme -
Bonjour,

j'essaie de crée une connexion entre mon taf ( ordi portable en WIFI ) et un ordinateur FIXE chez moi à la maison

les 2 ordis sont sous VISTA 32

je voudrais crée un tunnel via un soft qui s'appelle Iodine

je vous mets le readme :

This is a piece of software that lets you tunnel IPv4 data through a DNS
server. 

This can be usable in different situations where internet access is 
firewalled, 
but DNS queries are allowed.




QUICKSTART:



Try it out within your own LAN! Follow these simple steps:


- On your server, run: ./iodined -f 10.0.0.1 test.asdf
  
 (If you already use the 10.0.0.0 network, use another internal net like 
  172.16.0.0)

- Enter a password


- On the client, run: ./iodine -f 192.168.0.1 test.asdf
  (Replace 192.168.0.1 with the server's ip address)

- Enter the same password


- Now the client has the tunnel ip 10.0.0.2 and the server has 10.0.0.1


- Try pinging each other through the tunnel
- Done! :)


To actually use it through a relaying nameserver, see below.




HOW TO USE:


------------



Server side:
 
------------

To use this tunnel, you need control over a real domain (like mytunnel.com),
and a server with a public IP number.

If the server already runs a DNS
server, change the listening port and then use the -b option to let 
iodined forward the DNS 
requests. 

Then, delegate a subdomain 
(say, tunnel1.mytunnel.com) to the server. If you use BIND for the domain, 

add these lines to the zone file:

 tunnel1host IN A 10.15.213.99 
tunnel1 IN NS tunnel1host.mytunnel.com.



Do not use CNAME instead of A above.
If your server has a dynamic IP, 

use a dynamic dns provider:
 tunnel1 IN NS tunnel1host.mydyndnsprovider.com



Now any DNS querys for domains ending with tunnel1.mytunnnel.com will be sent
to your server. 

Start iodined on the server. 

The first argument is the tunnel
IP address (like 192.168.99.1) 

and the second is the assigned domain (in this
case tunnel1.mytunnel.com). 

The -f argument will keep iodined running in the
 foreground, which helps when testing. 

iodined will start a virtual interface,
and also start listening for DNS queries on UDP port 53. 

Either enter a 
password on the commandline (-P pass) or after the server has started. 

Now 
everything is ready for the client.



------------
Client side:
------------

All the setup is done, just start iodine. 

It takes up to two arguments, 

the
first is the local relaying DNS server (optional) and 

the second is the domain
used (tunnel1.mytunnnel.com). 

If DNS queries are allowed to any computer, you
can use the tunnel endpoint 

(example: 10.15.213.99 or tunnel1host.mytunnel.com)
as the first argument. 

The tunnel interface will get an IP close to the servers
(in this case 192.168.99.2) and a suitable MTU.  

Enter the same password as on
 the server either by argument or after the client has started. 

Now you should
be able to ping the other end of the tunnel from either side.  


	



MISC. INFO:



Routing:


The normal case is to route all traffic through the DNS tunnel. 

To do this, first
add a route to the nameserver you use with the default gateway as gateway. 

Then
replace the default gateway with the servers IP address within the DNS tunnel,
and configure the server to do NAT.



MTU issues:


These issues should be solved now, with automatic fragmentation of downstream 
packets. 

There should be no need to set the MTU explicitly on the server.



If you have problems, try inspecting the traffic with network monitoring tools
and make sure 
that the relaying DNS server has not cached the response. 

A 
cached error message could mean that you started the client before the server.


The -D option on the server can also show received and sent queries.



The iodined server replies to NS requests sent for subdomains of the tunnel
domain. 

If your domain is tunnel.com, send a NS request for foo.tunnel.com
to see if the delegation works. 

dig is a good tool for this:


dig -t NS foo123.tunnel.com



The upstream data is sent gzipped encoded with Base32, or Base64 if the relay
server support '+' in domain names. 

DNS protocol allows one query per packet,
and one query can be max 256 chars.
 
Each domain name part can be max 63 chars.


So your domain name and subdomain should be as short as possible to allow
maximum upstream throughput.




TIPS & TRICKS:



If your port 53 is taken on a specific interface by an application that does 
not use it, 

use -p on iodined to specify an alternate port (like -p 5353) and 
use for instance iptables 
(on Linux) to forward the traffic:


iptables -t nat -A PREROUTING -i eth0 -p udp --dport 53 -j DNAT --to :5353

(Sent in by Tom Schouten)




PORTABILITY:



iodine has been tested on Linux (arm, ia64, x86, AMD64 and SPARC64), 
FreeBSD
(ia64, x86), OpenBSD (x86), NetBSD (x86), MacOS X (ppc and x86, with
http://tuntaposx.sourceforge.net/ 
and Windows (with OpenVPN TAP32 driver, see
win32 readme file).  


Bon, si je comprends bien, je dois déjà mettre en place un serveur, et avoir un nom de domaine à moi ( et là, je suis déjà dépassé ^^ )

la question, est, d'après le descriptif, ou vos connaissances, ces 2 points sont-ils obligatoires pour venir à mes fins, et si oui, sont ils faciles à mettre en œuvre pour quelqu'un qui a des connaissances relativement limitées en réseau/serveur, mais qui n'as pas peur de "bricoler" ?

aussi, pensez vous qu'une fois, ces 2 points mis en œuvre, l'établissement de la connexion, ne sera plus qu'une partie de plaisir, ou c'est loin d'être gagné ?

et enfin, avez vous d'autres propositions, plus faciles à mettre en oeuvre pour obtenir un accès internet depuis mon taf, soit en passant par un hotspot neuf, que je détecte, soit en outre passant le fierwall de montaf, sans pour autant mettre en péril la sécurité du réseau de ma boite

Merci !

2 réponses

Utilisateur anonyme
 
il y a aussi une chose que je ne comprends pas,

"Start iodined on the server.

The first argument is the tunnel
IP address (like 192.168.99.1)

and the second is the assigned domain (in this
case tunnel1.mytunnel.com).

The -f argument will keep iodined running in the
foreground, which helps when testing. "

le 1er argument est l'ip du tunnel, c'est quoi son ip à ce $*%!! de tunnel ^^ ?

je perds le tête avec les différentes IP utilisées dans le readme !

tu comprends quelque chose, toi ? ^^
0
Utilisateur anonyme
 
bon, une fois le tunnel établi après avoir obtenu gratuitement un nom de domaine, je n'ai jamais réussi à surfer à travers le tunnel, malgré les aides que l'on ma apporté

j'ai abandonné l'idée... je ne mets pas résolu au cas où d'autres s'intéressent à ce soft
0