A fast SOCKS5 proxy that tunnels your traffic through what looks like normal SMTP email, bypassing Deep Packet Inspection firewalls.
How it works:
- Client runs a local SOCKS5 proxy (127.0.0.1:1080)
- Traffic is sent to server disguised as SMTP (EHLO, STARTTLS, AUTH)
- DPI sees legitimate email session, not a VPN/proxy
Features:
- One-liner install on any Linux VPS
- Multi-user with per-user secrets and IP whitelists
- Auto-generated client packages (just double-click to run)
- Auto-reconnect on connection loss
- Works with any app that supports SOCKS5
Tech: Python/asyncio, TLS 1.2+, HMAC-SHA256 auth
GitHub: https://github.com/x011/smtp-tunnel-proxy
If I came across this in netflow data I'd first assume outbound spam. But a hallmark of sending mail is that the client to server byte ratio is extremely skewed towards client -> server bytes, whereas running a VPN-like service is usually more balanced but still skewed towards server -> client bytes. I'd see the large server -> client byte count and immediately know something strange was going on.
That said, very little code here is involved in looking like SMTP. The SMTP obfuscation basically boils down to a few lines of plaintext between the client and server before a STARTTLS and then everything after that has nothing to do with SMTP. You could swap out the fake stub conversation quite easily to look like many other protocols. Whether the in to out bytes ratio makes sense for those protocols is another matter.
These days, I think the best thing to disguise as is HTTPS. There is so much variety in HTTPS traffic and such a huge volume of it, that spotting hidden tunnels is very hard.
reply