Skip to content

Releases: mysteriumnetwork/openvpn-forwarder

1.4.0

27 Aug 06:55
37a43e1
Compare
Choose a tag to compare

What's Changed

  • Add normalized hostname into metrics labels by @soffokl in #48

Full Changelog: 1.3.0...1.4.0

1.3.0

17 May 09:24
5eacf28
Compare
Choose a tag to compare

This release contains breaking changes:

  • By default, API is exposed only on local interface 127.0.0.1. Just in case someone launches with defaults and forgets to secure it with --proxy.api-bind
  • API supports only IPv4
  • Proxy supports only IPv4

What's Changed

  • By default, bind API only on 127.0.0.1 by @Waldz in #47

Full Changelog: 1.2.1...1.3.0

1.2.1

09 May 16:14
65e18e7
Compare
Choose a tag to compare

What's Changed

  • Rework bytes sent/received metrics by @Waldz in #42
  • Run tests in CI by @Waldz in #41
  • Bump github.com/tidwall/gjson from 1.3.2 to 1.9.3 by @dependabot in #29
  • Bump google.golang.org/grpc from 1.50.1 to 1.56.3 by @dependabot in #43
  • Bump golang.org/x/net from 0.19.0 to 0.23.0 by @dependabot in #44
  • Bump google.golang.org/protobuf from 1.31.0 to 1.33.0 by @dependabot in #45
  • Bump github.com/gin-gonic/gin from 1.4.0 to 1.9.1 by @dependabot in #46

New Contributors

Full Changelog: 1.2.0...1.2.1

1.2.0

21 Dec 09:05
71be35f
Compare
Choose a tag to compare

What's Changed

New Contributors

Full Changelog: 1.1.0...1.2.0

1.1.0

22 Dec 10:25
3335f4c
Compare
Choose a tag to compare

Changelog

1.1.0 (2022-12-22)

Full Changelog

Merged pull requests:

  • Support of multiple upstream proxies #28 (Waldz)

1.0.0

22 Dec 10:01
5edb42d
Compare
Choose a tag to compare

This release contains breaking changes, so the forwarder needs to be run differently.

Before it was run on Docker's "bridge" network and you mapped a transparent proxy port to host:

docker run -p 127.0.0.1:8443:8443 --cap-add NET_ADMIN mysteriumnetwork/openvpn-forwarder

Now forwarder MUST be run on the host network:

docker run --name forwarder --network host --cap-add NET_ADMIN mysteriumnetwork/openvpn-forwarder \
    --proxy.bind=0.0.0.0:8443 \
    --proxy.allow=10.13.0.0/16

Also, don't forget to restrict access with --proxy.allow flag, the otherwise transparent proxy port will be accessible from outside

Before traffic was redirected by changing DST address:

iptables -t nat -A PREROUTING -s 10.13.0.0/16 -p tcp -m multiport --dports 80,443 -j DNAT --to-destination 127.0.0.1:8443

Now you need to preserve DST address of IP packets:

iptables -t nat -A PREROUTING -s 10.13.0.0/16 -p tcp -m multiport --dports 80,443 -j REDIRECT --to-ports 8443

1.0.0 (2022-12-20)

Changelog

Full Changelog

Merged pull requests:

  • Handle HTTPS requests without SNI #27 (Waldz)
  • Recover original destination address of redirected requests #26 (Waldz)
  • Implement access log #25 (Waldz)

0.4.0

18 Nov 12:15
1852acd
Compare
Choose a tag to compare

Changelog

0.4.0 (2022-11-18)

Full Changelog

Merged pull requests:

  • Gracefully handle HTTP requests with close header #24 (Waldz)
  • E2E test for HTTP traffic #22 (Waldz)
  • Migrate to Go modules #21 (Waldz)

0.3.0

21 Oct 12:44
1041915
Compare
Choose a tag to compare

Changelog

0.3.0 (2022-10-21)

Full Changelog

Merged pull requests:

  • Change local environment port to default one - 8443 #19 (Waldz)
  • Possibility to exclude domains from forwarding to upstream proxy #18 (Waldz)
  • Fix broken E2E environment #17 (Waldz)

0.2.0

22 Nov 11:44
8969164
Compare
Choose a tag to compare
  • Country targeting #16

0.1.2

21 Feb 03:47
ea22ec3
Compare
Choose a tag to compare
Merge pull request #14 from mysteriumnetwork/forwarded-userid

Use Forwarded header instead of custom UserID