Awesome
pcap2socks
pcap2socks is a proxy which redirect traffic to a SOCKS proxy with pcap written in Rust.
You can use pcap2socks GUI for a front-end interface.
pcap2socks is designed to accelerate games in game consoles.
Features
- Redirect Traffic: Redirect TCP and UDP traffic to a SOCKS proxy.
- Proxy ARP: Reply ARP request as it owns the specified address which is not on the network.
- Cross Platform
- Full Cone NAT
Dependencies
- Npcap or WinPcap in Windows (If using Npcap, make sure to install with the "Install Npcap in WinPcap API-compatible Mode"), libpcap in macOS, Linux and others.
Build
Windows
If you want to build pcap2socks in Windows, you must meet all the three requirements described in libpnet.
Usage
pcap2socks -s <ADDRESS>
# Or a more general one using proxy ARP (recommended)
pcap2socks -s <ADDRESS> -p <ADDRESS> -d <ADDRESS>
Flags
-h, --help
: Prints help information.
-v, --verbose
: Prints verbose information (-vv
for vverbose).
-V, --version
: Prints version information.
--force-associate-destination
, --force-associate-bind-address
: Force to associate with the destination/replied bind address. pcap2socks will associate with the destination instead of the replied bind address in UDP ASSOCIATE if the replied bind address is in the private network by default. If this flag is set, pcap2socks will force to associate with the destination/replied bind address. If both flags are set, the --force-associate-destination
will take effect.
Options
-i, --interface <INTERFACE>
: Interface for listening.
--mtu <VALUE>
: MTU. Generally, pcap2socks will automatically obtain the MTU, but you can also override by setting this option. The MTU is set in the traffic from local to the source.
-P, --preset <PRESET>
: Preset. You can use preset source and publish of game accelerators in the market. Available values are t
, tencent
for Tencent Online Game Accelerator and n
, netease
, u
, uu
for Netease UU Game Accelerator.
-s, --source <ADDRESS>
: Source. The source can be a single IPv4 address like 192.168.1.2
, or an IPv4 CIDR network like 10.10.0.1/24
.
-p, --publish <ADDRESS>
: ARP publishing address. If this option is set, pcap2socks will reply ARP request as it owns the specified address which is not on the network, also called proxy ARP.
-d, --destination <ADDRESS>
: Destination, default as 127.0.0.1:1080
.
--username <VALUE>
: Username. This value should be set only when the SOCKS5 server requires the username/password authentication.
--password <VALUE>
: Password. This value should be set only when the SOCKS5 server requires the username/password authentication.
Troubleshoot
-
Because the packet sent from sources should only be handled by pcap2socks, you have to disable IP forward or configure the firewall with the following command statement. For more information, please refer to the troubleshoot paragraph in IkaGo.
// Linux sysctl -w net.ipv4.ip_forward=0 // macOS sysctl -w net.inet.ip.forwarding=0
-
pcap2socks requires root permission in some OS by default. But you can run pcap2socks in non-root by executing the following command before opening pcap2socks.
// Linux setcap cap_net_raw+ep path_to_pcap2socks
Limitations
-
IPv6 is not supported yet.
-
Because only SOCKS5 can forward UDP traffic, pcap2socks only support SOCKS5 at this point. A version with SOCKS4 support without redirecting UDP traffic will release in the future.
Known Issues
-
Applications like VMWare Workstation on Windows may implement their own IP forwarding and forward packets which should be handled by pcap2socks, resulting in abnormal operations in pcap2socks.
-
The traffic flow control was not implemented in pcap2socks currently. On certain occasions, bandwidth may be heavily occupied by one side of a connection, causing the other side of the connection and other connections to be unable to transmit data normally.
License
pcap2socks is licensed under the MIT License.