farukuzun / notsodeep

Active DPI circumvention utility for Linux

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

It isn't working with Raspberry Pi

alpgul opened this issue · comments

Kernel: Linux: Linux raspberry 4.9.0-7-amd64 #1 SMP Debian 4.9.110-3+deb9u2 (2018-08-13) x86_64 GNU/Linux

Program raspberry pi ile çalışmıyor.

Can you share your terminal output please?

pi@raspberry:~ $ cd /tmp
pi@raspberry:/tmp $ git clone https://github.com/farukuzun/notsodeep.git
Cloning into 'notsodeep'...
remote: Counting objects: 27, done.
remote: Total 27 (delta 0), reused 0 (delta 0), pack-reused 27
Unpacking objects: 100% (27/27), done.
pi@raspberry:/tmp $ cd notsodeep
pi@raspberry:/tmp/notsodeep $ make
cc notsodeep.c -Wall -Wextra -Wformat-security -O3 -fstack-protector-all -lnetfilter_queue -lnfnetlink -o notsodeep
pi@raspberry:/tmp/notsodeep $ cd ..
pi@raspberry:/tmp $ sudo cp -R notsodeep /opt
cp: normal dosya '/opt/notsodeep/notsodeep' oluşturulamadı: Metin dosyası meşgul
pi@raspberry:/tmp $ sudo cp /opt/notsodeep/notsodeep.service /etc/systemd/system/
pi@raspberry:/tmp $ sudo systemctl enable notsodeep.service
pi@raspberry:/tmp $ sudo iptables -A OUTPUT -p tcp --tcp-flags SYN,ACK SYN,ACK --sport 443 -j NFQUEUE --queue-num 200 --queue-bypass
pi@raspberry:/tmp $ sudo iptables -t mangle -I POSTROUTING -p tcp --dport 80 -j NFQUEUE --queue-num 200 --queue-bypass

pi@raspberry:/tmp $ sudo iptables-save
# Generated by iptables-save v1.6.0 on Mon Aug 20 10:36:14 2018
*mangle
:PREROUTING ACCEPT [0:0]
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [1:184]
:POSTROUTING ACCEPT [1:184]
-A POSTROUTING -p tcp -m tcp --dport 80 -j NFQUEUE --queue-num 200 --queue-bypass
COMMIT
# Completed on Mon Aug 20 10:36:14 2018
# Generated by iptables-save v1.6.0 on Mon Aug 20 10:36:14 2018
*filter
:INPUT ACCEPT [10:400]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [22:2784]
-A OUTPUT -p tcp -m tcp --sport 443 --tcp-flags SYN,ACK SYN,ACK -j NFQUEUE --queue-num 200 --queue-bypass
COMMIT
# Completed on Mon Aug 20 10:36:14 2018

pi@raspberry:~ $ sudo systemctl enable iptables.service
Failed to enable unit: File iptables.service: No such file or directory
pi@raspberry:/tmp $ sudo systemctl enable netfilter-persistent.service
Synchronizing state of netfilter-persistent.service with SysV service script with /lib/systemd/systemd-sysv-install.
Executing: /lib/systemd/systemd-sysv-install enable netfilter-persistent
pi@raspberry:/tmp $ sudo systemctl start netfilter-persistent.service
pi@raspberry:/tmp $ sudo systemctl start notsodeep.service

pi@raspberry:/tmp $ sudo systemctl status netfilter-persistent.service
● netfilter-persistent.service - netfilter persistent configuration
   Loaded: loaded (/lib/systemd/system/netfilter-persistent.service; enabled; vendor preset: enabled)
   Active: active (exited) since Mon 2018-08-20 10:58:15 +03; 6min ago
 Main PID: 297 (code=exited, status=0/SUCCESS)
    Tasks: 0 (limit: 19660)
   CGroup: /system.slice/netfilter-persistent.service

Ağu 20 10:58:14 raspberry systemd[1]: Starting netfilter persistent configuration...
Ağu 20 10:58:14 raspberry netfilter-persistent[297]: run-parts: executing /usr/share/netfilter-persistent/plugins.d/15-ip4tables start
Ağu 20 10:58:15 raspberry netfilter-persistent[297]: run-parts: executing /usr/share/netfilter-persistent/plugins.d/25-ip6tables start
Ağu 20 10:58:15 raspberry systemd[1]: Started netfilter persistent configuration.
lines 1-11/11 (END)

pi@raspberry:/tmp $ sudo systemctl status notsodeep.service
● notsodeep.service - Notsodeep service
   Loaded: loaded (/etc/systemd/system/notsodeep.service; enabled; vendor preset
   Active: active (running) since Mon 2018-08-20 10:14:45 +03; 22min ago
 Main PID: 458 (notsodeep)
   CGroup: /system.slice/notsodeep.service
           └─458 /opt/notsodeep/notsodeep

Ağu 20 10:14:45 raspberry systemd[1]: Started Notsodeep service.
lines 1-8/8 (END)

pi@raspberry:~ $ sudo iptables -L
Chain INPUT (policy ACCEPT)
target     prot opt source               destination

Chain FORWARD (policy ACCEPT)
target     prot opt source               destination

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination
NFQUEUE    tcp  --  anywhere             anywhere             tcp sp                                                             t:https flags:SYN,ACK/SYN,ACK NFQUEUE num 200 bypass
NFQUEUE    tcp  --  anywhere             anywhere             tcp sp                                                             t:https flags:SYN,ACK/SYN,ACK NFQUEUE num 200 bypass

I tried it on vmware.
The linux version:raspbian
Network mode of vmware is bridge. i tried on www.imgur.com