Skip to content

udp2raw或者phantun这种faketcp工具支持吗 #105

@resticDOG

Description

@resticDOG

服务端是华为云 ECS 主机,使用 udp2raw faketcp 协议伪装了 wireguard,由于 ECS 无公网 IP, 使用一个 BGP 的公网 IP 转发了 udp2raw 的端口, 服务端开启 fakehttp

客户端上海联通,使用 udp2raw 和转发后的公网 IP 成功建立连接,wireguard 也能成功连上,fakehttp 在握手的时候也能看到 FAKE(*) 日志,但是依然未能突破限速:

➜  fakehttp-linux-x86_64 ./fakehttp -e creator.douyin.com -e p3-pc-sign.douyinpic.com -e upos-sz-mirrorcos.bilivideo.com -e member.bilibili.com -e pan.wo.cn -e vd3.bdstatic.com -e iservice.10010.com -e i0.hdslb.com -e i1.hdslb.com -e www.speedtest.cn -e cloud.189.cn -i eth0
2026-04-30 11:13:59 [src/mainfun.c:382] FakeHTTP version 0.9.18
2026-04-30 11:13:59 [src/mainfun.c:383]
2026-04-30 11:13:59 [src/mainfun.c:384] FakeHTTP is free software licensed under the GPLv3.
2026-04-30 11:13:59 [src/mainfun.c:385] Distribution without the accompanying source code is not permitted.
2026-04-30 11:13:59 [src/mainfun.c:386]
2026-04-30 11:13:59 [src/mainfun.c:387] Home page: https://github.com/MikeWang000000/FakeHTTP
2026-04-30 11:13:59 [src/mainfun.c:388]
2026-04-30 11:13:59 [src/nfrules.c:051] WARNING: Falling back to iptables command, as nft command is not working.
2026-04-30 11:13:59 [src/mainfun.c:455] listening on eth0, netfilter queue number 512...
2026-04-30 11:14:27 [src/rawsend.c:496] 112.*.*.10:2089 ===SYN===> 172.16.50.52:4596
2026-04-30 11:14:27 [src/rawsend.c:449] 112.*.*.10:2089 <===FAKE(*)=== 172.16.50.52:4596
2026-04-30 11:14:27 [src/rawsend.c:475] 112.*.*.10:2089 <===SYN-ACK=== 172.16.50.52:4596
2026-04-30 11:14:27 [src/rawsend.c:530] 112.*.*.10:2089 ===(~)===> 172.16.50.52:4596
2026-04-30 11:14:27 [src/rawsend.c:530] 112.*.*.10:2089 ===(~)===> 172.16.50.52:4596
: iperf3 -c 172.16.50.52
Connecting to host 172.16.50.52, port 5201
[  4] local 192.168.6.3 port 14838 connected to 172.16.50.52 port 5201
[ ID] Interval           Transfer     Bandwidth
[  4]   0.00-1.00   sec  1.50 MBytes  12.5 Mbits/sec
[  4]   1.00-2.01   sec   384 KBytes  3.12 Mbits/sec
[  4]   2.01-3.01   sec   512 KBytes  4.21 Mbits/sec
[  4]   3.01-4.00   sec   384 KBytes  3.16 Mbits/sec
[  4]   4.00-5.00   sec   512 KBytes  4.21 Mbits/sec
[  4]   5.00-6.01   sec   512 KBytes  4.15 Mbits/sec
[  4]   6.01-7.01   sec   256 KBytes  2.10 Mbits/sec
[  4]   7.01-8.01   sec   512 KBytes  4.20 Mbits/sec
[  4]   8.01-9.00   sec   512 KBytes  4.22 Mbits/sec
[  4]   9.00-10.00  sec   512 KBytes  4.20 Mbits/sec
- - - - - - - - - - - - - - - - - - - - - - - - -
[ ID] Interval           Transfer     Bandwidth
[  4]   0.00-10.00  sec  5.50 MBytes  4.61 Mbits/sec                  sender
[  4]   0.00-10.00  sec  5.35 MBytes  4.49 Mbits/sec                  receiver

iperf Done.

所以很疑惑,是不是通过端口转发之后就失效了,必须有公网 IP 的网口监听才有效果,请各路大佬解答,感谢🙏

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions