File: INSTALL-FreeBSD.markdown

package info (click to toggle)
tcpcrypt 0.3~rc1-3
  • links: PTS, VCS
  • area: main
  • in suites: jessie, jessie-kfreebsd
  • size: 1,292 kB
  • ctags: 1,285
  • sloc: ansic: 11,305; asm: 482; sh: 192; objc: 149; makefile: 98
file content (62 lines) | stat: -rw-r--r-- 1,712 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
Installing tcpcrypt on FreeBSD
==============================

Dependencies
------------

Enable `ipfw` and divert sockets, if you haven't already (reboot required):

    echo 'firewall_enable="YES"' >> /etc/rc.conf
    echo 'firewall_type="open"' >> /etc/rc.conf
    echo 'ipfw_load="YES"' >> /boot/loader.conf
    echo 'ipdivert_load="YES"' >> /boot/loader.conf
    reboot

Tcpcrypt also requires OpenSSL >= 0.9.8, which is provided by the
`security/openssl` port.


Compiling
---------

    cd tcpcrypt
    ./bootstrap.sh
    ./configure
    make

Optional: running `make install` will install `libtcpcrypt` and tcpcrypt
headers, for building apps that use tcpcrypt's session ID.

Running
-------

The launch script starts tcpcryptd and sets up your firewall
to send port 80 and 7777 packets through tcpcrypt:

    ./launch_tcpcryptd.sh

With tcpcryptd running, open
[http://tcpcrypt.org/test.php](http://tcpcrypt.org/test.php) to try it out.

See `launchers/freebsd` for a FreeBSD rc script that loads tcpcryptd on system startup.

More info
----------

See the included `README.markdown` file for more ways to try out tcpcrypt and
for troubleshooting help.


Firewall setup
==============

The included `launch_tcpcryptd.sh` script sets up reasonable firewall rules, but for more complex setups, add your own `divert` rules.

For example, this will divert all TCP packets to tcpcryptd (on divert port 666), and it will be rule #1.

    ipfw 01 add divert 666 tcp from any to any

It's important that tcpcrypt divert rules are high on the list since tcpcryptd
modifies the packet quite a lot, including sequence numbers, so other items
(e.g., natd) may get confused if tcpcryptd doesn't do its magic first.