Bug 2352439 - Package Request: udp2raw - A tunnel that turns UDP traffic into encrypted UDP/FakeTCP/ICMP traffic by using raw sockets
Summary: Package Request: udp2raw - A tunnel that turns UDP traffic into encrypted UDP...
Keywords:
Status: NEW
Alias: None
Product: Fedora
Classification: Fedora
Component: distribution
Version: 42
Hardware: All
OS: Linux
unspecified
medium
Target Milestone: ---
Assignee: Nobody's working on this, feel free to take it
QA Contact: Fedora Extras Quality Assurance
URL: https://github.com/wangyu-/udp2raw
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-03-13 19:58 UTC by PhrozenByte
Modified: 2026-05-06 12:28 UTC (History)
3 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Type: ---
Embargoed:


Attachments (Terms of Use)

Description PhrozenByte 2025-03-13 19:58:41 UTC
Project homepage: https://github.com/wangyu-/udp2raw

I'd like to request a package of udp2raw, a tunnel that turns UDP traffic into encrypted UDP/FakeTCP/ICMP traffic by using raw sockets.

It is commonly used with VPN software to bypass UDP firewalls or unstable UDP environments. For example, it's an alternative to OpenVPN's TCP mode, and allows the use of WireGuard in such environments. In FakeTCP mode it neatly avoids the major disadvantages of common UDP-over-TCP tunnelling by mimicking TCP with raw sockets, but effectively still using UDP behind the scenes. It's somewhat similar to udptunnel, but does a few things different and e.g. can't be detected by Wireshark. udp2raw thus allows the undisclosed use of WireGuard VPNs by e.g. journalists and activists in sensitive environments.

The software is written in C/C++ and released under the terms of the MIT License.

I'm not affiliated with the udp2raw project and no C/C++ developer (I can't even read the code properly), thus it would be unwise for me to assume I could become the package maintainer of udp2raw. Thus I'd like to ask whether an established Fedora package maintainer might be willing to take maintainership of a possible future udp2raw package. It's some very neat piece of software, thus a package would be very much appreciated.

Reproducible: Always

Comment 1 Fedora Review Service 2025-03-13 19:59:02 UTC
The ticket summary is not in the correct format.
Expected:

    Review Request: <main package name here> - <short summary here>

Found:

    Package Request: udp2raw - A tunnel that turns UDP traffic into encrypted UDP/FakeTCP/ICMP traffic by using raw sockets

As a consequence, the package name cannot be parsed and submitted to
be automatically build. Please modify the ticket summary and trigger a
build by typing [fedora-review-service-build].


---
This comment was created by the fedora-review-service
https://github.com/FrostyX/fedora-review-service

If you want to trigger a new Copr build, add a comment containing new
Spec and SRPM URLs or [fedora-review-service-build] string.

Comment 2 nucleo 2026-02-14 22:34:33 UTC
FYI: udp2raw in Copr
https://copr.fedorainfracloud.org/coprs/nucleo/udp2raw/

Comment 3 Fedora Release Engineering 2026-05-06 12:28:03 UTC
This message is a reminder that Fedora Linux 42 is nearing its end of life.
Fedora will stop maintaining and issuing updates for Fedora Linux 42 on 2026-05-13.
It is Fedora's policy to close all bug reports from releases that are no longer
maintained. At that time this bug will be closed as EOL if it remains open with a
'version' of '42'.

Package Maintainer: If you wish for this bug to remain open because you
plan to fix it in a currently maintained version, change the 'version' 
to a later Fedora Linux version. Note that the version field may be hidden.
Click the "Show advanced fields" button if you do not see it.

Thank you for reporting this issue and we are sorry that we were not 
able to fix it before Fedora Linux 42 is end of life. If you would still like 
to see this bug fixed and are able to reproduce it against a later version 
of Fedora Linux, you are encouraged to change the 'version' to a later version
prior to this bug being closed.


Note You need to log in before you can comment on or make changes to this bug.