oooo ooooo888 ooooooo oooo o oooo oooooooo8 ooooooooo8 888 888 888 888 888 888 888 888ooooooo 888oooooo8 888 888 888 888 888888888 888 888 88ooo888o 88ooo88 88 88 88oooooo88 88oooo888 a digital rod for local area network rabdomancy
Dowse is a transparent proxy facilitating the awareness of ingoing and outgoing connections, from, to, and within a local area network.
Dowse provides a central point of soft control for all local traffic: from ARP traffic (layer 2) to TCP/IP (layers 3 and 4) as well as application space, by chaining a firewall setup to a trasparent proxy setup. A core feature for Dowse is that of hiding all the complexity of such a setup.
Dowse is also a highly extensible platform: interoperability between modules is available using Socks4/5, UNIX pipes, local TCP/IP sockets and port redirection, conforming to specific daemon implementations. At the core of Dowse is a very portable shell script codebase implementing a modular plugin architecture that isolates processes and supports any executable written in any language: Shell, C, Perl, Python etc.
Plea for support
If you like to support the development of this project, please rate it and endorse it on the CHEST funding platform:
We are seeking funding to continue this free and open source development. It does not require much, just a registration and rating. Thanks.
Dowse takes control of a LAN by becoming its DHCP server and thereby assigning itself as main gateway and DNS server for all clients. It keeps tracks of assigned leases by MAC Address. DNSMasq is the DHCP and DNS daemon.
All network traffic is passed through NAT rules for masquerading. All HTTP traffic (TCP port 80) is filtered through a transparent proxy, using an application layer chain of Squid2 and Privoxy.
All DNS traffic (UDP port 53) is filtered through DNSCrypt-proxy and encrypted using AES/SHA256 before being sent to DNSCrypt.eu or other configurable servers supporting this protocol.
In the future, traffic of all kinds may be transparently proxied for monitoring, filtering, and transformation by other applications loaded on the Dowse device.
All daemons are running as a unique non-privileged UID. The future plan is to separate them using a different UID for each daemon.
Installation and activation takes a few steps and needs root:
Download dowse on a GNU/Linux box (we use Debian 7)
git clone https://github.com/dyne/dowse /usr/src/dowse
Install ZSh, needed to run all scripts in Dowse: apt-get zsh then go into the dowse directory ( cd /usr/src/dowse in example)
./utils/debian-install.shas root, it fires up some commands:
invoke-rc.dto install dependencies like
Configure the files in the
conf/folder: settings and network The files are plain text and include documentation in comments.
Launch the dowse script as root, using full path. In our example:
Dowse will launch all daemons dropping root privileges and using the user configured (default user is
Deactivate the DHCP service (Automatic IP configuration) on any other object on the network, typically your ADSL router.
If all went well now one should be able to connect any device to the internet as you did before, but now all the traffic is passing via Dowse's transparent proxy configuration, which weeds out adverts and takes care of browser's privacy.
To make sure that dowse is started at every boot, just add it to the
/etc/rc.local file, in our example that would be the line:
Dowse is Copyright (C) 2012-2014 by the Dyne.org Foundation
Dowse is written by Denis Roio firstname.lastname@example.org
This source code is free software; you can redistribute it and/or modify it under the terms of the GNU Public License as published by the Free Software Foundation; either version 3 of the License, or (at your option) any later version. This source code is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. Please refer to the GNU Public License for more details. You should have received a copy of the GNU Public License along with this source code; if not, write to: Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.