A crappy UDP router for the year 2020 and beyond.
So I'm playing with Roon and I've got this complicated home network that throws Roon for a loop. I started debugging things and it turns out Roon sends broadcast messages to UDP/9003. My firewall/router will not forward these messages of course, because that's the right thing to do.
Unfortunately, I really want these broadcast messages to be forwarded to other VLAN/subnets on my local network. I started using udp-proxy-relay-redux which worked great at first.
But I also really like these messages forwarded over my OpenVPN connections
which utilize the tun
driver which is a point-to-point interface and
explicity does not support broadcasts. This didn't work well with
udp-proxy-relay-redux because Roon is poorly behaved and still tries sending
"broadcasts" to the .255 address which are then dropped on the floor because my
VPN server does not have the address x.x.x.255. Basically, on a point-to-point
interface, these "broadcasts" were being treated as a packet destined to another
host and rightfully ignored.
Instead of using a normal UDP socket to listen for broadcast messages, udp-proxy-2020
uses libpcap to "sniff" the UDP
broadcast messages. This means it can be a lot more flexible about what packets
it "sees" so it can then sends them via libpcap/packet injection out all the other
configured interfaces. If this makes you go "ew", well,
welcome to 2020.
I'm writing this in GoLang so at least cross compiling onto your random Linux/FreeBSD router/firewall is reasonably easy. No ugly cross-compling C or trying to install Python/Ruby and a bunch of libraries.
Also: HAHAHAHAHAHAHA! None of that is true! Needing to use libpcap means I have to cross compile using CGO because gopacket/pcapgo only supports Linux for reading & writing to (ethernet?) network interfaces.
Pretty much any Unix-like system is supported because the dependcy list is only
libpcap
and golang
. I develop on MacOS and specifically target
pfSense/FreeBSD and
Ubiquiti USG, EdgeRouter and DreamMachine/Pro as those
are quite common among the Roon user community.
If you are using a Linux RedHat or Debian based distro, the easiest way to install
is grab the appropriate .rpm
or .deb
file and install it with your package
manager. Then edit /etc/udp-proxy-2020.conf
and start via:
systemctl start udp-proxy-2020
.
There is also a docker image available for Linux on AMD64 and ARM64 (like the Ubiquiti UDM).
Note that for Docker deployments, you should be using host networking.
I release binaries for Linux, FreeBSD (pfSense) and MacOS for Intel, ARM and MIPS hardware.
There are now instructions and startup scripts available in the startup-scripts directory. If you figure out how to add support for another platform, please send me a pull request!
Run udp-proxy-2020 --help
for a current list of command line options.
Also, please note on many operating systems you will need to run it as the
root
user. Linux systems can optionally grant the CAP_NET_RAW
capability.
Currently there are only a few flags you probaly need to worry about:
--interface
-- Specify two or more network interfaces to listen on.--port
-- Specify one or more UDP ports to monitor.--level
-- Specify the log level: [trace|debug|warn|info|error]
Advanced options:
--fixed-ip
-- Hardcode an @ to always send traffic to. Useful for things like OpenVPN in site-to-site mode.--timeout
-- Number of ms for pcap timeout value. (default is 250ms)--cache-ttl
-- Number of minutes to cache IPs for. (default is 180min / 3hrs) This value may need to be increased if you have problems passing traffic to clients on OpenVPN tunnels if you can't use--fixed-ip
because clients don't have a fixed ip.--no-listen
-- Do not listen on the specified UDP port(s) to avoid conflicts--deliver-local
-- Deliver packets locally on loopback interface
There are other flags of course, run ./udp-proxy-2020 --help
for a full list.
Example:
udp-proxy-2020 --port 9003 --interface eth0,eth0.100,eth1,tun0 --cache-ttl 300
Would forward udp/9003 packets on four interfaces: eth0, eth1, VLAN100 on eth0 and tun0. Client IP's on tun0 would be remembered for 5 minutes once they are learned.
Note: "learning" requires the client to send a udp/9003 message first! If
your application requires a message to be sent to the client first, then you
would need to specify --fixed-ip=1.2.3.4@tun0
where 1.2.3.4
is the IP address
of the client on tun0.
I have tested both "road warrior" VPN configs with Roon client running on my laptop and connecting back to my home firewall via OpenVPN and Wireguard. I personally use Wireguard instead of OpenVPN because it is more secure and has better performance.
I've also tested Site-to-Site VPN using Wireguard + pfSense. I followed the
pfSense site-to-site Wireguard VPN directions and
installed udp-proxy-2020
on both firewalls. You must configure the
--interface
option to include both the LAN and Wireguard network interfaces.
If you are building for the same platform you intend to run udp-proxy-2020
then you just need to make sure you have libpcap
and the necessary headers
(you may need a -dev
package for that) and run make
or gmake
as
appropriate (we need GNU Make, not BSD Make).
If you need to build cross platform, then one of the following targets may help you:
- Linux on x86_64
make linux-amd64
via Docker - Linux on MIPS64
make linux-mips64
(Linux/MIPS64 big-endian for Ubiquiti USG/EdgeRouter) via Docker - Linux on ARM
make linux-arm
via Docker:- Linux on ARM64 for Ubiquiti UDM/UDM Pro
- Linux on ARMv5 (software floating point)
- Linux on ARMv6 (hardware floating point)
- Linux on ARMv7 (hardware floating point)
- FreeBSD 12.3 on x86_64, ARM64//v7
make freebsd
(pfSense 2.6) via Vagrant & VirtualBox - Docker image to run udp-proxy-2020 in docker
make docker
You can get a full list of make targets and basic info about them by running:
make help
.
Starting with v0.0.11, udp-proxy-2020
now by default creates a UDP listening
socket on the specified --port
(s). This prevents the underlying OS from issuing
ICMP Port Unreachable messages which can break certain clients (noteably the
Roon iOS client).
The only time you should need to use the --no-listen
flag is if there is another
piece of software that is running on the same host as udp-proxy-2020
.
As of v0.1.0, yes. You need to specify --deliver-local
and --no-listen
options so that it delivers packets via the loopback interface.
These flags are for debugging problems with udp-proxy-2020
. You should
use these flags when I direct you to do so as part of a ticket you have opened for udp-proxy-2020
.
From the releases page on Github.
Nope, it's not a proxy. It's more like a router. You don't need to make any changes other than running it on your home router/firewall.
Honestly, I didn't really think much about the name and this was the first thing that came to my mind. Also, naming is hard.
- Ethernet
- WiFi interfaces which appear as Ethernet
tun
interfaces, like those used by OpenVPNraw
interfaces, like those used by Wireguardvti
interfaces for site-to-site IPSec
Note that L2TP VPN tunnels on Linux are not compatible with udp-proxy-2020 because the Linux kernel exposes those interfaces as Linux SLL which does not provide an accurate decode of the packets.
So I haven't done this myself, but Bart Verhoeven over on the Roon Community forums wrote up this really detailed how to.
udp-proxy-2020 is built for multiple OS and hardware platforms:
- MacOS/Intel x86_64:
darwin-amd64
- Linux/Intel x86_64:
linux-amd64
- Linux/ARM64:
linux-arm64
(RasPi 2 V1.2 and above, Ubiquiti UniFi Dream Machine) - Linux/ARMv7 (hardware floating point):
linux-armv7
(RasPi 2 V1.1 and below) - Linux/ARMv6 (hardware floating point):
linux-armv6
- Linux/ARMv5 (software floating point):
linux-armv5
- Linux/MIPS64:
linux-mips64
(Ubiquiti USG/EdgeRouter) - FreeBSD/Intel x86_64:
freebsd-amd64
(works with pfSense on x86) - FreeBSD/ARMv8:
freebsd-arm64
(Netgate SG-1100 & SG-2100) - FreeBSD/ARMv7:
freebsd-armv7
(Netgate SG-3100)
Honestly, just send me an email saying thanks or "star" this project in GitHub is enough thanks.
Occasionally, someone will ask about giving me a few bucks, but I really don't need any money. If you still would like to throw a few bucks my way, I'd much rather you donate to Second Harvest Food Bank which is local to me and could put your money to better work than I would.