Skip to content


Repository files navigation


A crappy UDP router for the year 2020 and beyond.


What is this for?

So I'm playing with Roon and I've got this complicated home network that throws Roon for a loop. I started debugging things and it turns out Roon sends broadcast messages to UDP/9003. My firewall/router will not forward these messages of course, because that's the right thing to do.

Unfortunately, I really want these broadcast messages to be forwarded to other VLAN/subnets on my local network. I started using udp-proxy-relay-redux which worked great at first.

But I also really like these messages forwarded over my OpenVPN connections which utilize the tun driver which is a point-to-point interface and explicity does not support broadcasts. This didn't work well with udp-proxy-relay-redux because Roon is poorly behaved and still tries sending "broadcasts" to the .255 address which are then dropped on the floor because my VPN server does not have the address x.x.x.255. Basically, on a point-to-point interface, these "broadcasts" were being treated as a packet destined to another host and rightfully ignored.

So what does this do?

Instead of using a normal UDP socket to listen for broadcast messages, udp-proxy-2020 uses libpcap to "sniff" the UDP broadcast messages. This means it can be a lot more flexible about what packets it "sees" so it can then sends them via libpcap/packet injection out all the other configured interfaces. If this makes you go "ew", well, welcome to 2020.

The good news...

I'm writing this in GoLang so at least cross compiling onto your random Linux/FreeBSD router/firewall is reasonably easy. No ugly cross-compling C or trying to install Python/Ruby and a bunch of libraries.

Also: HAHAHAHAHAHAHA! None of that is true! Needing to use libpcap means I have to cross compile using CGO because gopacket/pcapgo only supports Linux for reading & writing to (ethernet?) network interfaces.

Installation & Startup Scripts

Pretty much any Unix-like system is supported because the dependcy list is only libpcap and golang. I develop on MacOS and specifically target pfSense/FreeBSD and Ubiquiti USG, EdgeRouter and DreamMachine/Pro as those are quite common among the Roon user community.


If you are using a Linux RedHat or Debian based distro, the easiest way to install is grab the appropriate .rpm or .deb file and install it with your package manager. Then edit /etc/udp-proxy-2020.conf and start via: systemctl start udp-proxy-2020.


There is also a docker image available for Linux on AMD64 and ARM64 (like the Ubiquiti UDM).

Note that for Docker deployments, you should be using host networking.


I release binaries for Linux, FreeBSD (pfSense) and MacOS for Intel, ARM and MIPS hardware.

There are now instructions and startup scripts available in the startup-scripts directory. If you figure out how to add support for another platform, please send me a pull request!



Run udp-proxy-2020 --help for a current list of command line options.
Also, please note on many operating systems you will need to run it as the root user. Linux systems can optionally grant the CAP_NET_RAW capability.

Currently there are only a few flags you probaly need to worry about:

  • --interface -- Specify two or more network interfaces to listen on.
  • --port -- Specify one or more UDP ports to monitor.
  • --level -- Specify the log level: [trace|debug|warn|info|error]

Advanced options:

  • --fixed-ip -- Hardcode an @ to always send traffic to. Useful for things like OpenVPN in site-to-site mode.
  • --timeout -- Number of ms for pcap timeout value. (default is 250ms)
  • --cache-ttl -- Number of minutes to cache IPs for. (default is 180min / 3hrs) This value may need to be increased if you have problems passing traffic to clients on OpenVPN tunnels if you can't use --fixed-ip because clients don't have a fixed ip.
  • --no-listen -- Do not listen on the specified UDP port(s) to avoid conflicts
  • --deliver-local -- Deliver packets locally on loopback interface

There are other flags of course, run ./udp-proxy-2020 --help for a full list.


udp-proxy-2020 --port 9003 --interface eth0,eth0.100,eth1,tun0 --cache-ttl 300

Would forward udp/9003 packets on four interfaces: eth0, eth1, VLAN100 on eth0 and tun0. Client IP's on tun0 would be remembered for 5 minutes once they are learned.

Note: "learning" requires the client to send a udp/9003 message first! If your application requires a message to be sent to the client first, then you would need to specify --fixed-ip= where is the IP address of the client on tun0.

Using udp-proxy-2020 with VPNs

I have tested both "road warrior" VPN configs with Roon client running on my laptop and connecting back to my home firewall via OpenVPN and Wireguard. I personally use Wireguard instead of OpenVPN because it is more secure and has better performance.

I've also tested Site-to-Site VPN using Wireguard + pfSense. I followed the pfSense site-to-site Wireguard VPN directions and installed udp-proxy-2020 on both firewalls. You must configure the --interface option to include both the LAN and Wireguard network interfaces.

Building udp-proxy-2020

If you are building for the same platform you intend to run udp-proxy-2020 then you just need to make sure you have libpcap and the necessary headers (you may need a -dev package for that) and run make or gmake as appropriate (we need GNU Make, not BSD Make).

If you need to build cross platform, then one of the following targets may help you:

  • Linux on x86_64 make linux-amd64 via Docker
  • Linux on MIPS64 make linux-mips64 (Linux/MIPS64 big-endian for Ubiquiti USG/EdgeRouter) via Docker
  • Linux on ARM make linux-arm via Docker:
    • Linux on ARM64 for Ubiquiti UDM/UDM Pro
    • Linux on ARMv5 (software floating point)
    • Linux on ARMv6 (hardware floating point)
    • Linux on ARMv7 (hardware floating point)
  • FreeBSD 12.3 on x86_64, ARM64//v7 make freebsd (pfSense 2.6) via Vagrant & VirtualBox
  • Docker image to run udp-proxy-2020 in docker make docker

You can get a full list of make targets and basic info about them by running: make help.


When should I use --no-listen?

Starting with v0.0.11, udp-proxy-2020 now by default creates a UDP listening socket on the specified --port(s). This prevents the underlying OS from issuing ICMP Port Unreachable messages which can break certain clients (noteably the Roon iOS client).

The only time you should need to use the --no-listen flag is if there is another piece of software that is running on the same host as udp-proxy-2020.

Does udp-proxy-2020 support running on the same host as Roon/etc?

As of v0.1.0, yes. You need to specify --deliver-local and --no-listen options so that it delivers packets via the loopback interface.

When should I use --pcap and --pcap-path?

These flags are for debugging problems with udp-proxy-2020. You should use these flags when I direct you to do so as part of a ticket you have opened for udp-proxy-2020.

Where can I download precompiled binaries?

From the releases page on Github.

So is it a "proxy"? Are there any proxy config settings I need to configure in my app?

Nope, it's not a proxy. It's more like a router. You don't need to make any changes other than running it on your home router/firewall.

Then why did you call it udp-proxy-2020?

Honestly, I didn't really think much about the name and this was the first thing that came to my mind. Also, naming is hard.

What network interface types are supported?

  • Ethernet
  • WiFi interfaces which appear as Ethernet
  • tun interfaces, like those used by OpenVPN
  • raw interfaces, like those used by Wireguard
  • vti interfaces for site-to-site IPSec

Note that L2TP VPN tunnels on Linux are not compatible with udp-proxy-2020 because the Linux kernel exposes those interfaces as Linux SLL which does not provide an accurate decode of the packets.

How can I get udp-proxy-2020 working with Wireguard on Ubiquiti USG?

So I haven't done this myself, but Bart Verhoeven over on the Roon Community forums wrote up this really detailed how to.

What binary is right for me?

udp-proxy-2020 is built for multiple OS and hardware platforms:

  • MacOS/Intel x86_64: darwin-amd64
  • Linux/Intel x86_64: linux-amd64
  • Linux/ARM64: linux-arm64 (RasPi 2 V1.2 and above, Ubiquiti UniFi Dream Machine)
  • Linux/ARMv7 (hardware floating point): linux-armv7 (RasPi 2 V1.1 and below)
  • Linux/ARMv6 (hardware floating point): linux-armv6
  • Linux/ARMv5 (software floating point): linux-armv5
  • Linux/MIPS64: linux-mips64 (Ubiquiti USG/EdgeRouter)
  • FreeBSD/Intel x86_64: freebsd-amd64 (works with pfSense on x86)
  • FreeBSD/ARMv8: freebsd-arm64 (Netgate SG-1100 & SG-2100)
  • FreeBSD/ARMv7: freebsd-armv7 (Netgate SG-3100)

How can I say thanks?

Honestly, just send me an email saying thanks or "star" this project in GitHub is enough thanks.

Occasionally, someone will ask about giving me a few bucks, but I really don't need any money. If you still would like to throw a few bucks my way, I'd much rather you donate to Second Harvest Food Bank which is local to me and could put your money to better work than I would.