forked from ports/contrib
48 lines
922 B
Groff
48 lines
922 B
Groff
.\"@ usocks - detour network traffic through SOCKS5 proxy.
|
|
.\"
|
|
.\" Public Domain
|
|
.
|
|
.Dd September 17, 2020
|
|
.Dt USOCKS 1
|
|
.Os
|
|
.
|
|
.
|
|
.Sh NAME
|
|
.Nm usocks
|
|
.Nd detour network traffic through SOCKS5 proxy
|
|
.
|
|
.
|
|
.Sh SYNOPSIS
|
|
.Nm
|
|
.Ar proxy-address
|
|
.Ar proxy-port
|
|
.Ar command
|
|
.Op Pf : Ar argument Ns \&:
|
|
.
|
|
.
|
|
.Sh DESCRIPTION
|
|
.
|
|
.Nm
|
|
can be used to detour stream-based network traffic of
|
|
.Ar command
|
|
through the specified SOCKS5 proxy.
|
|
This is realized by preloading a shared library which overwrites the
|
|
.Xr connect 2
|
|
system call.
|
|
Because of this simple approach the SOCKS5 provided DNS (name) lookup
|
|
mechanism is not used.
|
|
.Ar proxy-address
|
|
must be an IPv4 internet address (like
|
|
.Ql 127.0.0.1 ) .
|
|
For example
|
|
.
|
|
.Bd -literal -offset indent
|
|
# Login as USER on HOST, create a local SOCKS proxy on port 10000
|
|
$ ssh -D 10000 USER@HOST
|
|
|
|
# Thereafter use usocks(1) to proxy any command over it
|
|
$ usocks 127.0.0.1 10000 irssi
|
|
.Ed
|
|
.
|
|
.\" s-ts-mode
|