Client
The Bondix SANE client is the software that you install on your supported router, which establishes a connection to the server using multiple WAN links.
For OpenWRT based routers, please check this page.
Installation
Log into your router via SSH and do the following:
Create installation directory | mkdir -p /opt/bondix
|
Download installation package | curl -o sane.tar.gz <DOWNLOAD-URL>
|
Extract package | tar -xvzf sane.tar.gz
|
You can verify that the correct version has been installed with the command
/opt/bondix/client/saneclient --version
If successful, it should print its version string.
Configuration
Configuration is done using JSON commands. These can either be sent via a raw TCP socket (localhost:5113), or written to a configuration file (in a json-array) that is parsed at start-up. This allows both a fixed configuration as well as adjustments during runtime without the need to restart the service. By default, SANE checks for the existence of a configuration file in its installation directory (e.g. /opt/bondix/client/saneclient.json
) and at /etc/saneclient.json
. If you want SANE to load a configuration from a different location, you can specify it using a command line parameter.
Quick Start
This example provides the minimal necessities to get a tunnel up and running:
[ {"action": "create", "target": "tunnel", "name": "TUNNELNAME", "password": "TUNNELPASSWORD"}, {"action": "add-server", "target": "tunnel", "host": "ENDPOINTSERVER", "port": "443"}, {"action": "create-interfaces", "target": "tunnel", "interfaces": { "eth1": "mobileAggressive", "wwan0": "mobileAggressive", "wwan1": "mobileAggressive" }}, {"target": "tunnel", "action": "set-preset", "preset": "bonding"} ]
Command Structure
A JSON command has the following structure:
{"target": "<module>", "action": "<command>", [...additional values...]}
Where <module> specifies the configuration submodule and <command> specifies what should be done.
System Commands
{"target": "system", "action": "shutdown" } |
Shuts down the client and terminates. | ||||||||||||
{"target": "system", "action": "set-log", "file": "/var/log/saneclient.log", "fileMode": "append" } |
Enables logging to file or changes output file.
| ||||||||||||
{"target": "system", "action": "set-webinterface", "host": "0.0.0.0", "port": "80", "allowConfig": false, "allowMonitor": true, "configApiKey": "123456", "webroot": "/tmp/" } |
Enables the integrated webserver & debug webinterface.
|
Tunnel Commands
{"target": "tunnel", "action": "create", "name": "MyTunnel", "password: "1234", "server": "10.0.0.1", "interfaceName": "bndx0", "values": {...} } |
createSets up basic tunnel configuration.
| ||||||||||
{"target": "tunnel", "action": "add-server", "host": "10.0.0.1", "port": "443" } |
add-serverAdds a endpoint server. If multiple servers are added, the client will cycle through them until a connection has been established successfully.
| ||||||||||
{"target": "tunnel", "action": "create-interfaces", "interfaces": { "wwan0": "mobile", "eth1": "ethernet" } } |
create-interfacesCreates channels for the specified interfaces using presets.
| ||||||||||
{"target": "tunnel", "action": "set-preset", "preset": "Bonding" } |
set-presetApplies a tunnel preset. See Presets for more info.
| ||||||||||
{"target": "tunnel", "action": "set-ifname", "name": "bondix0" } } |
set-ifnameRenames the virtual network tunnel interface.
| ||||||||||
{"target": "tunnel", "action": "set-cert-check", "enabled": true } } |
set-cert-checkEnables or disables verification of the server's SSL certificate. TODO: Which root cert dir is used when no custom root certificate is provided?
| ||||||||||
{"target": "tunnel", "action": "set-root-ca", "file": "/etc/ssl/foobar.pub" } } |
set-root-caSpecifies a root certificate that can be used to verify the authenticity of the remote server. When used, SSL server verification will be automatically enabled.
| ||||||||||
{"target": "tunnel", "action": "set-certificate", "cert": "/etc/ssl/foobar.pem" "key": "/etc/ssl/foobar.key" } } |
set-certificateLoads a tunnel client certificate. See Certificates for further information.
| ||||||||||
{"target": "tunnel", "action": "embed-certs", "cert": "...", "key": "...", "root": "..." } } |
embed-certsA helper functions to embed tunnel & root certificate inside the configuration instead of an external file. Performs the same actions as set-certificate and set-root-ca combined.
|
Running
The software can be run in the shell using /opt/bondix/client/saneclient
, where it will run in the foreground. However, it is recommended to start the service automatically on startup, which can be different depending on the platform.
Parameters
--daemon |
Runs the software as a daemon. |
--nopid |
Does not attempt to create a pid-file at /var/run/saneclient.pid
|
--listflags |
Lists available feature flags |
--flags <FLAG1> <FLAG2>... |
Enables the specified flag(s). Multiple flags are separated using space. |
</path/to/filename.json> |
JSON configuration file that should be used |
Feature Flags
Feature flags are switches that enable certain features that are otherwise unavailable. These features are usually experimental and should be used with caution.
useBlake | Switches from SHA256 to the "blake" hashing algorithm. Depending on architecture, this can slightly improve performance. |
useBlake3 | Switches to the "blake3" hashing algorithm. Depending on architecture, this can slightly improve performance. |
disableHash | Disables hashing completely, allowing potential MitM, with a vast speed improvement. |
useMMSG | uses useMMSG linux socket API to send & receive multiple UDP packets at once. This improves performance under load, while stable there are some corner cases which can trigger error messages in the log. |
channelRoutes | Makes the client create specific routes for each channel. Experimental, do not use. |
bondingProxy | Enables the TCP Bonding Proxy. |