Provided by: iodine_0.6.0~rc1-18_amd64 bug

NAME

       iodine, iodined - tunnel IPv4 over DNS

SYNOPSIS

       iodine [-v]

       iodine [-h]

       iodine [-f] [-r] [-u user ] [-P password ] [-m fragsize ] [-t chrootdir ] [-d device ] [-m
       fragsize ] [-M namelen ] [-z context ] [-F pidfile ] [-T dnstype ] [-O downenc ] [-L 0|1 ]
       [-I interval ] [ nameserver ] topdomain

       iodined [-v]

       iodined [-h]

       iodined  [-c]  [-s]  [-f]  [-D]  [-u  user  ]  [-t  chrootdir ] [-d device ] [-m mtu ] [-l
       listen_ip ] [-p port ] [-n external_ip ] [-b dnsport ] [-P password ] [-z  context  ]  [-F
       pidfile ] tunnel_ip [ /netmask ] topdomain

DESCRIPTION

       iodine  lets  you  tunnel IPv4 data through a DNS server. This can be useful in situations
       where Internet access is firewalled, but DNS queries  are  allowed.  It  needs  a  TUN/TAP
       device  to  operate.  The bandwidth is asymmetrical, with a measured maximum of 680 kbit/s
       upstream and 2.3 Mbit/s downstream in a  wired  LAN  test  network.   Realistic  sustained
       throughput  on a Wifi network using a carrier-grade DNS cache has been measured at some 50
       kbit/s upstream and over 200 kbit/s downstream.  iodine is the client application, iodined
       is the server.

       Note: server and client are required to speak the exact same protocol. In most cases, this
       means running the same iodine version. Unfortunately, implementing  backward  and  forward
       protocol compatibility is usually not feasible.

OPTIONS

   Common Options:
       -v     Print version info and exit.

       -h     Print usage info and exit.

       -f     Keep running in foreground.

       -u user
              Drop privileges and run as user 'user' after setting up tunnel.

       -t chrootdir
              Chroot to 'chrootdir' after setting up tunnel.

       -d device
              Use  the  TUN device 'device' instead of the normal one, which is dnsX on Linux and
              otherwise tunX.

       -P password
              Use 'password' to authenticate. If not used, stdin will be used as input. Only  the
              first 32 characters will be used.

       -z context
              Apply SELinux 'context' after initialization.

       -F pidfile
              Create 'pidfile' and write process id in it.

   Client Options:
       -r     Skip  raw  UDP  mode. If not used, iodine will try getting the public IP address of
              the iodined host and test if it is reachable directly. If it is,  traffic  will  be
              sent to the server instead of the DNS relay.

       -m fragsize
              Force  maximum  downstream fragment size. Not setting this will cause the client to
              automatically probe the maximum accepted downstream fragment size.

       -M namelen
              Maximum length of upstream hostnames, default 255.  Usable range ca.  100  to  255.
              Use  this option to scale back upstream bandwidth in favor of downstream bandwidth.
              Also useful  for  DNS  servers  that  perform  unreliably  when  using  full-length
              hostnames,  noticeable  when fragment size autoprobe returns very different results
              each time.

       -T dnstype
              DNS request type override.  By default, autodetection will probe  for  working  DNS
              request  types,  and  will  select the request type that is expected to provide the
              most bandwidth.  However, it may turn out that a DNS relay imposes limits that skew
              the  picture,  which  may  lead  to an "unexpected" DNS request type providing more
              bandwidth.  In that case, use  this  option  to  override  the  autodetection.   In
              (expected)  decreasing  bandwidth order, the supported DNS request types are: NULL,
              TXT, SRV, MX, CNAME and A (returning CNAME).  Note that  SRV,  MX  and  A  may/will
              cause  additional  lookups  by  "smart"  caching  nameservers  to  get an actual IP
              address, which may either slow down or fail completely.

       -O downenc
              Force downstream encoding type for all query type responses except  NULL.   Default
              is  autodetected,  but may not spot all problems for the more advanced codecs.  Use
              this option to override the autodetection.  Base32 is the  lowest-grade  codec  and
              should  always  work;  this is used when autodetection fails.  Base64 provides more
              bandwidth, but may not work on all nameservers.  Base64u is equal to Base64  except
              in using underscore ('_') instead of plus sign ('+'), possibly working where Base64
              does not.  Base128 uses high byte values (mostly accented  letters  in  iso8859-1),
              which  might work with some nameservers.  For TXT queries, Raw will provide maximum
              performance, but this will only work if the nameserver path  is  fully  8-bit-clean
              for responses that are assumed to be "legible text".

       -L 0|1 Lazy-mode  switch.   -L1  (default):  Use  lazy  mode  for improved performance and
              decreased latency.  A very small minority of DNS relays appears  to  be  unable  to
              handle  the  lazy  mode traffic pattern, resulting in no or very little data coming
              through.  The iodine client will detect this and try to switch back to legacy mode,
              but  this  may  not  always  work.  In these situations use -L0 to force running in
              legacy mode (implies -I1).

       -I interval
              Maximum interval between requests (pings) so that intermediate DNS servers will not
              time  out.  Default is 4 in lazy mode, which will work fine in most cases. When too
              many SERVFAIL errors occur, iodine will automatically reduce this  to  1.   To  get
              absolute  minimum DNS traffic, increase well above 4, but not so high that SERVFAIL
              errors start to occur.  There are some DNS relays with very small timeouts, notably
              dnsadvantage.com  (ultradns),  that  will  give SERVFAIL errors even with -I1; data
              will still get trough, and these errors can be ignored.  Maximum  useful  value  is
              59, since iodined will close a client's connection after 60 seconds of inactivity.

   Server Options:
       -c     Disable  checking  the  client  IP  address  on all incoming requests.  By default,
              requests originating from non-matching IP addresses will be rejected, however  this
              will cause problems when requests are routed via a cluster of DNS servers.

       -s     Don't  try  to  configure  IP address or MTU.  This should only be used if you have
              already configured the device that will be used.

       -D     Increase debug level. Level 1 prints info about each RX/TX packet.  Implies the  -f
              option.   On  level 2 (-DD) or higher, DNS queries will be printed literally.  When
              using Base128 upstream encoding, this is best viewed as ISO Latin-1 text instead of
              (illegal)  UTF-8.  This is easily done with : "LC_ALL=C luit iodined -DD ..."  (see
              luit(1)).

       -m mtu Set 'mtu' as mtu size for the tun device.  This will  be  sent  to  the  client  on
              login,  and  the  client  will  use the same mtu for its tun device.  Default 1130.
              Note that the DNS traffic will be automatically fragmented when needed.

       -l listen_ip
              Make the server listen only on 'listen_ip'  for  incoming  requests.   By  default,
              incoming requests are accepted from all interfaces.

       -p port
              Make  the  server  listen on 'port' instead of 53 for traffic.  If 'listen_ip' does
              not include localhost, this 'port' can be the same as 'dnsport'.   Note:  You  must
              make sure the dns requests are forwarded to this port yourself.

       -n external_ip
              The  IP address to return in NS responses. Default is to return the address used as
              destination in the query.

       -b dnsport
              If this port is specified, all incoming requests not inside the tunnel domain  will
              be  forwarded  to  this  port  on  localhost,  to  be  handled  by  a real dns.  If
              'listen_ip' does not include localhost, this 'dnsport' can be the same  as  'port'.
              Note:  The  forwarding  is  not  fully  transparent,  and  not  advised  for use in
              production environments.

   Client Arguments:
       nameserver
              The nameserver to use to relay the dns traffic. This can be any relaying nameserver
              or  the  server  running  iodined  if  reachable.  This field can be given as an IP
              address, or as a hostname. This argument  is  optional,  and  if  not  specified  a
              nameserver will be read from the /etc/resolv.conf file.

       topdomain
              The  dns  traffic will be sent as queries for subdomains under ´topdomain'. This is
              normally a subdomain to a domain you own. Use a short domain  name  to  get  better
              throughput.  If  nameserver is the iodined server, then the topdomain can be chosen
              freely. This argument must be the same on both the client and the server.

   Server Arguments:
       tunnel_ip[/netmask]
              This is the server's ip address on the tun interface. The client will be given  the
              next  ip  number  in the range. It is recommended to use the 10.0.0.0 or 172.16.0.0
              ranges. The default netmask is /27, can be overridden by specifying it here.  Using
              a smaller network will limit the number of concurrent users.

       topdomain
              The  dns traffic is expected to arrive as queries for subdomains under 'topdomain'.
              This is normally a subdomain to a domain you own. Use a short domain  name  to  get
              better  throughput.  This  argument  must  be  the  same on both the client and the
              server. Queries for domains other than 'topdomain' will be forwarded  when  the  -b
              option is given, otherwise they will be dropped.

EXAMPLES

       See  the  README  file for both a quick test scenario, and a detailed description of real-
       world deployment.

SECURITY

       Login is a relatively secure challenge-response MD5 hash, with the password never  passing
       the  wire.   However,  all other data is NOT encrypted in any way. The DNS traffic is also
       vulnerable to replay, injection and man-in-the-middle attacks, especially when iodined  is
       used  with  the  -c  option. Use of ssh or vpn tunneling is strongly recommended.  On both
       server and client, use iptables, pf or other firewalls to block all traffic coming in from
       the tun interfaces, except to the used ssh or vpn ports.

ENVIRONMENT

   IODINE_PASS
       If  the environment variable IODINE_PASS is set, iodine will use the value it is set to as
       password instead of asking for one. The -P option still has precedence.

   IODINED_PASS
       If the environment variable IODINED_PASS is set, iodined will use the value it is  set  to
       as password instead of asking for one. The -P option still has precedence.

SEE ALSO

       The README file in the source distribution contains some more elaborate information.

BUGS

       File bugs at http://dev.kryo.se/iodine/

AUTHORS

       Erik  Ekman  <yarrick@kryo.se>  and Bjorn Andersson <flex@kryo.se>. Major contributions by
       Anne Bezemer.