-
Notifications
You must be signed in to change notification settings - Fork 443
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
TUN/TAP (VPN) support #120
Comments
TUN/TAP with IPv6 would be very good. Another useful feature would be support for listening on Unix Sockets, together with TUN/TAP could provide networking for containers without using network stacks with veth pairs and iptable rules. |
This issue is stale because it has been open 90 days with no activity. Remove stale label or comment or this will be closed in 5 days. |
Such feature would be great to have ! something like:
|
Maybe I would pay for this feature. |
Hi @nil0x42 , I guess you just want to forward requests via an existing tun interface? then you can run glider like:
|
Actually i want to forward requests via multiple existing tun interfaces, with
|
How about this?
|
Hi @nil0x42 , actually the following config is working start from the version v0.15.0:
|
Okay, thank you ! |
Hi ! I've tried this technique with vlan interfaces (secondary ips), and it doesn't work:
EDIT:as vlan interface name is not recognized, i've tried directly setting each source ip as interface and it works.
|
You can use the interface names showed by |
Hi, just leaving the links for useful software and libraries to convert TUN/TAP to Socks5/HTTP proxy (OpenVPN as proxy). Hope you'll find them useful.
https://github.com/russdill/tunsocks
tunsocks is a user-level SOCKS, HTTP, and port forwarding proxy for use with VPNs that typically interact with tun devices. Rather than passing bytes to and from the tun device, they can pass the data to and from this user-level program. tunsocks is implemented using lwIP.
https://github.com/cernekee/ocproxy
ocproxy is a user-level SOCKS and port forwarding proxy for OpenConnect based on lwIP. When using ocproxy, OpenConnect only handles network activity that the user specifically asks to proxy, so the VPN interface no longer “hijacks” all network traffic on the host.
The text was updated successfully, but these errors were encountered: