Go to file
Christian Ulrich d04bbfa4b9
shorten rendezvous server section
2020-10-20 00:35:28 +02:00
examples add FIXME 2020-10-15 19:20:51 +02:00
README.md shorten rendezvous server section 2020-10-20 00:35:28 +02:00
asyncutils.nim need to unregister an close all events (fixes "too many open files" error) 2020-10-06 10:04:21 +02:00
ip_packet.nim include TCP window size and reuse parsed packet when resending 2020-08-23 22:48:34 +02:00
message.nim Revert "allow empty seqs" 2020-10-14 20:32:44 +02:00
network_interface.nim rename fromIpAddress -> getNetworkInterface 2020-10-10 12:31:18 +02:00
port_prediction.nim move port prediction into dedicated module 2020-10-14 18:40:58 +02:00
punchd.nim check if the client is still there before sending a message (fix unhandled ValueError) 2020-10-16 00:18:11 +02:00
puncher.nim move port prediction into dedicated module 2020-10-14 18:40:58 +02:00
raw_socket.nim close raw sockets on error 2020-10-10 11:38:53 +02:00
tcp_nutss_initiator.nim no firewall rules needed for tcp_nutss_responder; remove unneeded cleanup logic 2020-10-15 19:52:28 +02:00
tcp_nutss_responder.nim no firewall rules needed for tcp_nutss_responder; remove unneeded cleanup logic 2020-10-15 19:52:28 +02:00
tcp_syni_accept.nim cosmetic changes; add FIXMEs 2020-10-14 20:51:32 +02:00
tcp_syni_connect.nim cosmetic changes; add FIXMEs 2020-10-14 20:51:32 +02:00
utils.nim close socket if exception occurs too 2020-10-12 21:32:43 +02:00

README.md

Introduction

punchd (short for "hole punching daemon") provides TCP (and soon UDP) hole punching as a service to applications. This allows two applications on different hosts, both behind NAT and / or firewalls, to establish a direct communication channel. The motivation is to help peer-to-peer applications improve their connectivity.

How does it work?

The idea is to try out a sequence of well known hole punching techniques until one of them succeeds. punchd implements the following techniques:

  • SYNI (TCP hole punching based on SYN injection), DOI: 10.1109/NCA.2011.66
  • NUTSS (TCP hole punching, the non-spoofing approach described in section 4.2.2 of the paper), DOI: 10.1145/1016707.1016715

The assumption of those techniques is that there is a side-channel (i.e. a rendezvous server) between the two hosts. A peer that wants to be available for hole punching needs to constantly be connected (subscribed) to the rendezvous server so it can be notified by other peers about new hole punching attempts. Also it needs to provide an endpoint (public IP address and port) to other peers before those can initiate the hole punching. See the example applications for a naive rendezvous server implementation.

How can I use punchd?

Applications can communicate with punchd through a unix domain socket (by default /tmp/punchd.socket). An application can call one of punchd's API functions to either start a hole punching attempt (initiate) or react to an attempt started by another peer (respond). After calling an API function punchd will report back a status (either ok, progress or error). After a successful hole punching attempt, punchd will pass a socket to the application which can be used immediately to communicate with the other peer. The full punchd API is described in section The punchd API.

The figure below shows the workflow of a successful hole punching attempt between two peers A (initiator) and B (responder).

                   +--------------------------+
                   |  Rendezvous server (RS)  |
                   +--------------------------+
                        Λ                |
                        |                4 
                        3                |
                        |                V
 +----------------------------+    +----------------------------+
 | Application at peer A (AA) |    | Application at peer B (AB) |
 +----------------------------+    +----------------------------+
            |  Λ  Λ                             |  Λ
            1  |  |                             5  |
            |  2  6                             |  7
            V  |  |                             V  |
 +-------------------------+          +-------------------------+
 |  punchd at peer A (PA)  |          |  punchd at peer B (PB)  |
 +-------------------------+          +-------------------------+
  1. initiate: AA asks PA to initiate the hole punching to AB
  2. progress: PA reports progress
  3. AA sends notification about the hole punching attempt to RS
  4. RS forwards notification to AB
  5. respond: AB asks PB to respond to the hole punching attempt
  6. ok: PA reports success and passes a connected socket to AA
  7. ok: PB reports success and passes a connected socket to AB

Installation

No packages exist yet, so installation has to be done manually to the desired location after running nimble install. Starting punchd is as simple as

$ sudo ./punchd

The punchd API

TBD

FAQ

  • Q: Why does punchd only offer a weird socket API and not REST? A: punchd needs to pass a file descriptor to the application. On Unix systems that is only possible using the sendmsg system call with an ancillary message of type SCM_RIGHTS on a unix domain socket. See the unix(7) man page.

  • Q: Why does punchd need root permissions? A: Most hole punching techniques require elevated privileges because they need raw sockets (e.g. for capturing TCP sequence numbers) or they need to create firewall rules (some techniques require sending out low-TTL packets; the resulting ICMP time-exceeded responses have to be filtered out or else TCP connections will fail). On linux punchd can run as a non-root user though if punchd is started with the CAP_NET_RAW and CAP_NET_ADMIN capabilities.

  • Q: Which one is the best hole punching technique? A: No hole punching technique will work for all environments. In fact there are environments where no hole punching will be possible at all. The goal of this project is to find a good sequence of hole punching techniques to be tried one after the other. A lot of research still has to be done. See the example applications for some proposed sequences.