This program is just a proxy server which multiplexes TCP connections into an HTTPS. The primary purpose is to make all connections look like legitimate ones for firewalls (including DPI).
The closest analog is shadowsocks.
The only reason why I wrote this is that I want to have better control on how the connections are masked/multiplexed.
This software is unstable and non-unique. The code is broken in many places and follows the worst coding practices. It is not recommended to use this piece.
First, clone the repo and build all binaries (go install ./...
). You may install it with go get github.com/neex/tcp-over-http
as well, but the idea that you won't need source modifications is way too optimistic.
- Buy a domain name (e.g.
example.com
). - Rent a VPS. Make sure not to use any popular VPS provider (e.g. DigitalOcean/Vultr/Scaleway) as they're banned in some countries almost completely.
- Set up DNS A record pointing to the VPS.
- Get a LetsEncrypt certificate using certbot (
apt install certbot && certbot -d example.com
). - Get something legitimate-looking to place on your website, like free bootstrap template.
- Create a config for the server part in
/etc/tcp-over-http.yaml
, it should look like this:listen_addr: ':443' static_dir: /var/www/html/ dial_timeout: 2m token: <put a random token here> domain: <example.com> redirector_addr: ':80' cert_path: /etc/letsencrypt/live/<example.com>/fullchain.pem key_path: /etc/letsencrypt/live/<example.com>/privkey.pem
- Create systemd module in
/etc/systemd/system/tcp-over-http.service
:[Unit] Description=TCP over HTTP [Service] Type=simple Restart=always ExecStart=/usr/local/bin/tcp_over_http_server /etc/tcp-over-http.yaml LimitNOFILE=100000 [Install] WantedBy=multi-user.target
- Do
systemctl daemon-reload && systemctl start tcp-over-http
. - Debug errors in journalctl, if any.
-
Create a client config, should like like:
address: "https://<example.com>/establish/<token-from-server-config>" dns_override: <vps ip>:443 remote_timeout: 30s connect_timeout: 10s max_connection_multiplex: 1000 keep_alive_timeout: 10s
-
Start the client using something like
tcp_over_http --config ./client.yaml proxy :12321 --direct-dial '127.0.0.1|localhost'
This command starts socks5 server on :12321, which runs through the tunnel.
-
Under linux, you can setup an interface that proxies the connections. Do it like this:
sudo ip tuntap add user <your username> mode tun hui0 sudo ip link set hui0 up
After that, run
tcp-over-http
with--tun hui0
flag. No server reconfiguration is required.Note that this is not an actual VPN. The connections are intercepted and proxies as TCP/UDP streams.
Also, you will need to set up routes correctly.
This software is distributed under the terms of MIT License.