sut, an IPv6 in IPv4 Userlspace Tunnel (RFC 4213)
## DEPENDENCIES
* https://github.com/msantos/procket
* https://github.com/msantos/pkt
* https://github.com/msantos/tunctl
## SETUP
* Sign up for an IPv6 tunnel with Hurricane Electric
http://tunnelbroker.net/
* Start the IPv6 tunnel:
* Serverv4 = HE IPv4 tunnel end
* Clientv4 = Your local IP address
* Clientv6 = The IPv6 address assigned by HE to your end of the tunnel
```
sut:start([
{serverv4, "216.66.22.2"},
{clientv4, "192.168.1.72"},
{clientv6, "2001:3:3:3::2"}
]).
```
* Set up MTU and routing (as root)
```
ifconfig sut-ipv6 mtu 1480
ip route add ::/0 dev sut-ipv6
```
* Test the tunnel!
```
ping6 ipv6.google.com
```
## EXPORTS
```
start(Options) -> {ok, Ref}
start_link(Options) -> {ok, Ref}
Types Options = [Option]
Option = {ifname, Ifname}
| {serverv4, IPv4Address}
| {clientv4, IPv4Address}
| {clientv6, IPv6Address}
| {filter_out, Fun}
| {filter_in, Fun}
Ifname = string() | binary()
IPv4Address = string() | tuple()
IPv6Address = string() | tuple()
Fun = fun()
Ref = pid()
Starts an IPv6 over IPv4 configured tunnel.
The default tun device is named "sut-ipv6". To specify the name,
use {ifname, <<"devname">>}. Note the user running the tunnel
must have sudo permissions to configure this device.
{serverv4, Server4} is the IPv4 address of the peer.
{clientv4, Client4} is the IPv4 address of the local end. If the
client is on a private network (the tunnel will be NAT'ed by
the gateway), specify the private IPv4 address here.
{clientv6, Client6} is the IPv6 address of the local end. This
address will usually be assigned by the tunnel broker.
{filter_in, Fun} allows filtering and arbitrary transformation
of IPv6 packets received from the network. All packets undergo
the mandatory checks specified by RFC 4213 before being passed
to user checks.
{filter_out, Fun} allows filtering and manipulation of IPv6
packets received from the tun device.
Filtering functions take 2 arguments: the packet payload (a binary)
and the tunnel state:
-include("sut.hrl").
-record(sut_state, {
serverv4,
clientv4,
clientv6
}.
Filtering functions should return ok to allow the packet or {ok,
binary()} if the packet has been altered by the function.
Any other return value causes the packet to be dropped. The
default filter for both incoming and outgoing packets is a noop:
fun(_Packet, _State) -> ok end.
destroy(Ref) -> ok
Types Ref = pid()
Shutdown the tunnel. On Linux, the tunnel device will be removed.
```
## EXAMPLES
To compile:
```
erlc -I deps -o ebin examples/*.erl
```
### basic_firewall
An example of setting up a stateless packet filter.
The rules are:
```
* icmp: all
* udp: none
* tcp:
* outgoing: 22, 80, 443
* incoming: 22
```
Start the tunnel with the filter:
```
sut:start([
{filter_out, fun(Packet, State) -> basic_firewall:out(Packet, State) end},
{filter_in, fun(Packet, State) -> basic_firewall:in(Packet, State) end},
{serverv4, Server4},
{clientv4, Client4},
{clientv6, Client6}
]).
```
### tunnel_activity
Flashes LEDs attached to an Arduino to signal tunnel activity. Requires:
```
https://github.com/msantos/srly
```
Upload a sketch to the Arduino:
```
https://github.com/msantos/srly/blob/master/examples/strobe/strobe.pde
```
Then start the tunnel:
```
tunnel_activity:start("/dev/ttyUSB0",
[{led_in, 3},
{led_out, 4},
{serverv4, Server4},
{clientv4, Client4},
{clientv6, Client6}]).
```
## TODO
* Support other checks required by RFC
* Make a firewall ruleset to Erlang compiler