A TCP / UDP tunneler that uses public / private key authentication with encryption. Basically, it's ssh -L
. This is useful for tunneling through a machine that doesn't support SSH.
$ ratrod -h
A TCP / UDP tunneler that uses public / private key authentication with encryption.
Usage: ratrod [OPTIONS] [COMMAND]
Commands:
serve Start a server on this machine that listens for incoming connections and forwards them to a remote server (as specified by the client)
connect Connects to a server and forwards traffic from a local port to a remote `host:port` "through" the server
help Print this message or the help of the given subcommand(s)
Options:
-k, --key-path <KEY_PATH> Specifies the path to the key store (`key`, `key.pub`, `authorized_keys`, and `known_hosts`)
-v, --verbose Flag that specifies verbose logging
-h, --help Print help (see more with '--help')
-V, --version Print version
Below illustrates a common flow.
$ ratrod serve -h
Start a server on this machine that listens for incoming connections and forwards them to a remote server (as specified by the client)
Usage: ratrod serve [OPTIONS] <BIND>
Arguments:
<BIND> Specifies the local `host:port` to bind to
Options:
-r, --remote-regex <REMOTE_REGEX> Specifies an optional regex restriction on the remote hostnames that can be connected to. This is used to prevent clients from connecting to arbitrary through the server [default: .*]
-h, --help Print help (see more with '--help')
First run will ask if you want to generate the keypair.
$ ratrod serve 0.0.0.0:19000
2025-03-12T22:56:13.939034Z INFO No security files present in `/home/user/.ratrod` ...
Would you like to have the security files (public / private key pair, known hosts, and authorized keys) generated (y/n)?
If you choose y
, it will generate the keypair and store it in $HOME/.ratrod/key
and $HOME/.ratrod/key.pub
. An empty known_hosts
and authorized_keys
file will also be created.
If you specify a keypath, it will look / generate into that directory.
$ ratrod -k keys serve 0.0.0.0:19000
2025-03-12T22:57:53.493477Z INFO No security files present in `keys` ...
Would you like to have the security files (public / private key pair, known hosts, and authorized keys) generated (y/n)? y
2025-03-12T22:57:55.535365Z INFO Generating security files ...
2025-03-12T22:57:55.535986Z INFO π¦ Security files written to `keys/key`
2025-03-12T22:57:55.536653Z INFO π Starting server on `0.0.0.0:19000` ...
Basic usage pulls the key from the default location ($HOME/.ratrod/key.pub
).
$ ratrod serve 0.0.0.0:19000
2025-03-12T22:59:24.072923Z INFO π Starting server on `0.0.0.0:19000` ...
Otherwise, you can specify the keypath with the --key
(-k
) flag.
Or, pass the keyfile.
$ ratrod -k ~/mykeys serve 0.0.0.0:19000
$ ratrod connect -h
Connects to a server and forwards traffic from a local port to a remote `host:port` "through" the server
Usage: ratrod connect [OPTIONS] <SERVER> [TUNNEL]...
Arguments:
<SERVER> Specifies the server's `host:port` to connect to
[TUNNEL]... Specifies the remote(s) (e.g., `client_port:host:remote_port`) that the client wishes the server to route the traffic to
Options:
-a, --accept-all-hosts Specifies that all server public keys should be accepted
-e, --encrypt Specifies whether to encrypt the traffic between the client and server
-h, --help Print help (see more with '--help')
First run will ask if you want to generate the keypair.
$ ratrod connect 192.168.1.100:19000 2000:google.com:80
2025-03-12T22:56:13.939034Z INFO No security files present in `/home/user/.ratrod` ...
Would you like to have the security files (public / private key pair, known hosts, and authorized keys) generated (y/n)?
At this point, you should make sure the server adds your public key to the authorized_keys
file on the server. This is done by copying the contents of key.pub
to the server's authorized_keys
file.
Usage is as simple as (assuming you're using the default keyfile location):
$ ratrod connect 192.168.1.100:19000 2000:google.com:80
2025-03-12T23:02:55.563197Z INFO β³ Testing server connection ...
2025-03-12T23:02:55.563274Z INFO π» [TCP] Listening on `127.0.0.1:2000`, and routing through `192.168.1.100:19000` to `google.com:80` ...
2025-03-12T23:02:55.563282Z INFO π» [UDP] Listening on `127.0.0.1:2000`, and routing through `192.168.1.100:19000` to `google.com:80` ...
2025-03-12T23:02:55.563378Z INFO β
Connected to server `192.168.1.100:19000` ...
2025-03-12T23:02:55.563496Z INFO β
Sent preamble to server ...
2025-03-12T23:02:55.563886Z INFO β
Server's signature validated with public key `OLtgafdheGshrj5EzuuS0c30UL2KVZDTaX7N5bSI8Zo` ...
2025-03-12T23:02:55.563908Z ERROR β Test connection failed: Server's public key `OLtgafdheGshrj5EzuuS0c30UL2KVZDTaX7N5bSI8Zo` is not in the known hosts file
You will have to make sure the server's public key is in the known_hosts
file. Or, you can use the --accept-all-hosts
(-a
) flag to accept all server public keys.
$ ratrod connect -a 192.168.1.100:19000 2000:google.com:80
2025-03-12T23:08:03.680555Z INFO β³ Testing server connection ...
2025-03-12T23:08:03.680580Z INFO π» [UDP] Listening on `127.0.0.1:2000`, and routing through `192.168.1.100:19000` to `google.com:80` ...
2025-03-12T23:08:03.680582Z INFO π» [TCP] Listening on `127.0.0.1:2000`, and routing through `192.168.1.100:19000` to `google.com:80` ...
2025-03-12T23:08:03.680789Z INFO β
Connected to server `192.168.1.100:19000` ...
2025-03-12T23:08:03.680903Z INFO β
Sent preamble to server ...
2025-03-12T23:08:03.681392Z INFO β
Server's signature validated with public key `OLtgafdheGshrj5EzuuS0c30UL2KVZDTaX7N5bSI8Zo` ...
2025-03-12T23:08:03.681405Z INFO π§ Signing server challenge ...
2025-03-12T23:08:03.681497Z INFO β³ Awaiting challenge validation ...
2025-03-12T23:08:03.681740Z INFO β
Challenge accepted!
2025-03-12T23:08:03.681751Z INFO β
Test connection successful!
If you want to use encryption, you can specify the --encrypt
(-e
) flag.
$ ratrod connect -e 192.168.1.100:19000 2000:google.com:80
The client and server will each generate an ephemeral keypair for each connection, and they will generate a shared secret using the Diffie-Hellman key exchange algorithm. The shared secret is used to encrypt the traffic between the client and server after the handshake (handshake is plaintext).
The host
argument accepts the form [local_host:[local_port:[remote_host:]]]remote_port
. This means you could have various scenarios like this:
0.0.0.0:2000:google.com:80
: server connects togoogle.com:80
and client listens on0.0.0.0:2000
.2000:google.com:80
: server connects togoogle.com:80
and client listens on127.0.0.1:2000
.2000:80
: server connects toserver:80
(as in, its own127.0.0.1:80
) and client listens on127.0.0.1:2000
.80
: server connects toserver:80
(as in, its own127.0.0.1:80
) and client listens on127.0.0.1:80
.
Windows:
$ iwr https://github.com/twitchax/ratrod/releases/latest/download/ratrod_x86_64-pc-windows-gnu.zip
$ Expand-Archive ratrod_x86_64-pc-windows-gnu.zip -DestinationPath C:\Users\%USERNAME%\AppData\Local\Programs\ratrod
Mac OS (Apple Silicon):
$ curl -LO https://github.com/twitchax/ratrod/releases/latest/download/ratrod_aarch64-apple-darwin.zip
$ unzip ratrod_aarch64-apple-darwin.zip -d /usr/local/bin
$ chmod a+x /usr/local/bin/ratrod
Linux:
$ curl -LO https://github.com/twitchax/ratrod/releases/latest/downloadratrod_x86_64-unknown-linux-gnu.zip
$ unzip ratrod_x86_64-unknown-linux-gnu.zip -d /usr/local/bin
$ chmod a+x /usr/local/bin/ratrod
Cargo:
$ cargo install ratrod
sequenceDiagram
participant Originator
participant Client
participant Server
participant Remote
Originator->>Client: TCP or UDP Connection
Note over Client,Server: Key-Based Authentication & Setup
Client->>Server: TCP Connection
Client->>Server: ClientPreamble
Note right of Client: - Remote address<br>- Ephemeral public key<br>- Challenge nonce<br>- Encryption flag<br>- UDP/TCP flag
Server->>Server: Verify remote regex matches
Server->>Client: ServerPreamble
Note left of Server: - Server identity public key<br>- Server ephemeral public key<br>- Signed client challenge<br>- Server challenge nonce
Client->>Client: Verify server signature<br>Check server's public key in known_hosts
Client->>Server: ClientAuthentication
Note right of Client: - Client identity public key<br>- Signed server challenge
Server->>Server: Verify client signature<br>Check client's public key in authorized_keys
Server->>Client: HandshakeCompletion
Note over Client,Server: Optional Encryption
alt encryption requested
Client->>Client: Generate shared secret from ephemeral keys
Server->>Server: Generate shared secret from ephemeral keys
end
Note over Client,Server: Tunnel Establishment / Pump<br>(TCP / UDP handled slightly differently)
Originator->>Client: Upstream data (TCP or UDP)
Client->>Server: Forward data through (encrypted) channel (TCP)
Server->>Remote: Forward data to remote (TCP or UDP)
Remote->>Server: Downstream data (TCP or UDP)
Server->>Client: Forward data through (encrypted) channel (TCP)
Client->>Originator: Forward to originator (TCP or UDP)
It's a reference to the Rat Rod car culture, which is all about building something that works, even if it's "rusty".
Essentially, I googled "rusty pipe", and didn't get much, so I googled "rusty rod", and google figured I meant "rat rod". I thought it was appropriately esoteric, so I went with it.
$ cargo nextest run
This project is licensed under the MIT License - see the LICENSE file for details.