A cross-platform, user-space WireGuard port-forwarder that requires no system network configurations.
onetun opens a TCP port on your local system, from which traffic is forwarded to a TCP port on a peer in your WireGuard network. It requires no changes to your operating system's network interfaces: you don't need to have
root access, or install any WireGuard tool on your local system for it to work.
The only prerequisite is to register a peer IP and public key on the remote WireGuard endpoint; those are necessary for the WireGuard endpoint to trust the onetun peer and for packets to be routed.
./onetun <SOURCE_ADDR> <DESTINATION_ADDR> \ --endpoint-addr <public WireGuard endpoint address> \ --endpoint-public-key <the public key of the peer on the endpoint> \ --private-key <private key assigned to onetun> \ --source-peer-ip <IP assigned to onetun> \ --keep-alive <optional persistent keep-alive in seconds> \ --log <optional log level, defaults to "info"
Note: you can use environment variables for all of these flags. Use
onetun --helpfor details.
Suppose your WireGuard endpoint has the following configuration, and is accessible from
# /etc/wireguard/wg0.conf [Interface] PrivateKey = ******************************************** ListenPort = 51820 Address = 192.168.4.1 # A friendly peer that hosts the TCP service we want to reach [Peer] PublicKey = AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AllowedIPs = 192.168.4.2/32 # Peer assigned to onetun [Peer] PublicKey = BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB AllowedIPs = 192.168.4.3/32
We want to access a web server on the friendly peer (
192.168.4.2) on port
8080. We can use onetun to open a local port, say
127.0.0.1:8080, that will tunnel through WireGuard to reach the peer web server:
./onetun 127.0.0.1:8080 192.168.4.2:8080 \ --endpoint-addr 188.8.131.52:51820 \ --endpoint-public-key 'PUB_****************************************' \ --private-key 'PRIV_BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB' \ --source-peer-ip 192.168.4.3 \ --keep-alive 10
You'll then see this log:
INFO onetun > Tunnelling [127.0.0.1:8080]->[192.168.4.2:8080] (via [184.108.40.206:51820] as peer 192.168.4.3)
Which means you can now access the port locally!
$ curl 127.0.0.1:8080 Hello world!
Normally I would publish
onetun to crates.io. However, it depends on some features in smoltcp and boringtun that haven't been published yet, so I'm forced to use their Git repos as dependencies for now.
In the meantime, you can download the binary for Windows, macOS (Intel), and Linux (amd64) from the Releases page.
You can also run onetun using Docker:
docker run --rm --init --name onetun -p 8080:8080 aramperes/onetun \ 0.0.0.0:8080 192.168.4.2:8080 [...options...]
You can also build onetun locally, using Rust:
$ git clone https://github.com/aramperes/onetun && cd onetun $ cargo build --release $ ./target/release/onetun
onetun uses tokio, the async runtime, to listen for new TCP connections on the given port.
When a client connects to the local TCP port, it uses smoltcp to create a "virtual interface", with a "virtual client" and a "virtual server" for the connection. These "virtual" components are the crux of how onetun works. They essentially replace the host's TCP/IP stack with smoltcp's, which fully runs inside onetun. An ephemeral "virtual port" is also assigned to the connection, in order to route packets back to the right connection.
When the real client opens the connection, the virtual client socket opens a TCP connection to the virtual server. The virtual interface (implemented by smoltcp) in turn crafts the
SYN segment and wraps it in an IP packet. Because of how the virtual client and server are configured, the IP packet is crafted with a source address being the configured
192.168.4.3 in the example above), and the destination address is the remote peer's (
By doing this, we let smoltcp handle the crafting of the IP packets, and the handling of the client's TCP states. Instead of actually sending those packets to the virtual server, we can intercept them in the virtual interface and encrypt the packets using boringtun, and send them to the WireGuard endpoint's UDP port.
Once the WireGuard endpoint receives an encrypted IP packet, it decrypts it using its private key and reads the IP packet. It reads the destination address, re-encrypts the IP packet using the matching peer's public key, and sends it off to the peer's UDP endpoint.
The remote peer receives the encrypted IP and decrypts it. It can then read the inner payload (the TCP segment), forward it to the server's port, which handles the TCP segment. The server responds with
SYN-ACK, which goes back through the peer's local WireGuard interface, gets encrypted, forwarded to the WireGuard endpoint, and then finally back to onetun's UDP port.
When onetun receives an encrypted packet from the WireGuard endpoint, it decrypts it using boringtun. The resulting IP packet is broadcasted to all virtual interfaces running inside onetun; once the corresponding interface is matched, the IP packet is read and unpacked, and the virtual client's TCP state is updated.
Whenever data is sent by the real client, it is simply "sent" by the virtual client, which kicks off the whole IP encapsulation and WireGuard encryption again. When data is sent by the real server, it ends up routed in the virtual interface, which allows the virtual client to read it. When the virtual client reads data, it simply pushes the data back to the real client.
LICENSE for details.