1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47
|
Source: snid
Section: golang
Priority: optional
Maintainer: Debian Go Packaging Team <team+pkg-go@tracker.debian.org>
Uploaders: Daniel Gröber <dxld@darkboxed.org>,
Rules-Requires-Root: no
Build-Depends: debhelper-compat (= 13),
help2man,
dh-sequence-golang,
golang-any,
golang-agwa-go-listener-dev,
Testsuite: autopkgtest-pkg-go
Standards-Version: 4.7.2
Vcs-Browser: https://salsa.debian.org/go-team/packages/snid
Vcs-Git: https://salsa.debian.org/go-team/packages/snid.git
Homepage: https://github.com/AGWA/snid
XS-Go-Import-Path: github.com/AGWA/snid
Package: snid
Section: net
Architecture: any
Depends: ${misc:Depends},
${shlibs:Depends},
Static-Built-Using: ${misc:Static-Built-Using}
Description: Oblivious TLS-SNI proxy with zero config IPv4/v6 translation
A lightweight proxy used to forward TLS connections (without decryption)
to backend servers listening on IPv6 or UNIX sockets based only on the
cleartext server name indication (SNI) hostname. Note: ESNI/ECH is not
(yet) supported.
.
Backend addresses are constructed based on DNS lookups or filesystem path
for IPv6 and UNIX listeners respectively, making snid deployments
exceedingly easy to manage.
.
Unlike other TLS-SNI proxies snid's address mapping approach (-mode nat46)
allows exposing any unmodified TLS-based service listening on IPv6 towards
legacy IPv4 with no configuration or loss of client identity by encoding
IPv4 client addresses into IPv6 source addresses.
.
Running a few snid nodes across an infrastructure thus removes the need to
think about legacy IP problems like address exhaustion, port-forwarding or
multi-layer NAT ever again.
.
Client identity in snid isn't handled using hacks such as the PROXY
protocol or X-Forwarded-For/X-Real-IP headers in the case of HTTP based
protocols. This avoids confusion as to what is the real client IP, at
least for programs not already expecting these.
|