Tholian® Warps is a proactive and adaptive Mesh Network Router.
It tries to automatically detect and bypass censorship and throttling measurements at all cost. Programmable routing, traffic compression, traffic scattering, dynamic encryption rotation and other features are part of this experimental research project.
The goal of this project is to find out how feasible common NAT breaking and firewall bypassing techniques are and whether they can be used to build a reliable mesh network that's based on a peer-to-peer architecture.
- A
tunnelinstance tunnels network traffic through aforwardorgatewayinstance to access the internet. - A
tunneluses the initial configured network protocol. - A
forwardinstance tunnels network traffic through otherforwardorgatewayinstances. - All
gatewayinstances useoptimizersto reduce web asset file sizes. - All
gatewayinstances useDNS over TLSto resolve relayed DNS queries. - All instances use a local ProxyCache and ResolverCache.
- All instances can rotate encryption keys and can scatter network traffic on-demand.
The easiest way to use Warps is with running a Warps gateway on your own VPS that is connected to the internet,
and a locally running Warps tunnel.
As a defaulted network protocol, it is best to use dns, as that usually works to bypass typical firewall setups.
Alternative supported network protocols are documented further down in this document.
# On your VPS server (1.3.3.7)
tholian-warps gateway "dns://0.0.0.0:1053";
# On your local machine
tholian-warps tunnel "any" "dns://1.3.3.7:1053";
curl -x localhost:1080 http://google.com;Warps can be chained via multiple proxies, without a limit on how many network hops you want to the public internet. In this example, we are routing local web traffic through 3 instances before the traffic hits the clearnet.
# On your first VPS server (1.3.3.7)
tholian-warps gateway "dns://0.0.0.0:1337";
# On your second VPS server (1.3.3.8)
tholian-warps forward "http://1.3.3.8:1338" "dns://1.3.3.7:1337";
# On your third VPS server (1.3.3.9)
tholian-warps forward "dns://1.3.3.9:1339" "http://1.3.3.8:1338";
# On your local machine
# local -> dns -> 1.3.3.9 -> http -> 1.3.3.8 -> dns -> 1.3.3.7 -> * -> internet
tholian-warps tunnel "any" "dns://1.3.3.9:1339";
curl -x localhost:1080 http://google.com;🚧 Highly Experimental at this point - Use at own risk! 🚧
bash build.sh;
sudo cp ./build/tholian-warps /usr/bin/tholian-warps;
# Show CLI usage help
tholian-warps;These are the data compressors that have been implemented:
- compressors/text/css
- compressors/text/html
- compressors/text/js
- compressors/image/jpeg
- compressors/image/png
These are the transport protocols that have been implemented:
-
dnsor protocols/dns implements DNS Exfiltration -
httpor protocols/http implements HTTP Smuggling and DNS over HTTP -
httpsor protocols/https implements HTTPS Smuggling and DNS over HTTPS -
icmpor protocols/icmp implements ICMP Knocking and DNS over ICMP -
sshor protocols/ssh implements SSH Tunneling and DNS over SSH -
socksor protocols/socks implements SOCKS Routing (e.g. for TOR/I2P usage) - protocols/test implements the
Spytesting data structures
These are the go test files that have been implemented:
- structs/ProxyCache
- structs/ResolverCache
- utils/net/url/IsTrackingParameter
- utils/net/url/IsXSSParameter
- utils/net/url/ResolveCache
- utils/net/url/ToHostAndPort
- utils/net/url/ToHost
- utils/protocols/http/IsFilteredHeader
- protocols/dns/Resolver
- protocols/dns/Proxy
- protocols/dns/Tunnel
- protocols/dns/tunnel/ToRecordName
- protocols/http/Proxy
- protocols/http/Tunnel
AGPL3
