Jump to content

Slirp

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Jdimpson (talk | contribs) at 00:02, 23 October 2020 (Missing "P" from my username; corrected!). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Slirp
Developer(s)Danny Gasparovski, Kelly Price (maintainer)
Initial releaseMarch 30, 1995
Stable release
1.0.17 / January 8, 2006
Operating systemUnix-like
Platformshell account
TypeDial-up access
LicenseBSD-like, modified 4-clause BSD license
Websiteslirp.sf.net

Slirp (sometimes capitalized SLiRP) is a software program that emulates a PPP, SLIP, or CSLIP connection to the Internet via a shell account. It is largely obsolete for its original purpose, as dedicated dial-up PPP connections and broadband Internet access have in turn become widely available and inexpensive. It remains useful for connecting mobile devices, such as PDAs, via their serial ports. Another significant current use-case is firewall piercing/port forwarding,[1][2] which is typically but not necessarily done by way of an SSH connection on which port forwarding is restricted.

Usage

Shell accounts normally only allow the use of command line or text-based software, but by logging into a shell account and running Slirp on the remote server, a user can transform their shell account into a SLIP/PPP connection, allowing them to run any TCP/IP-based application—including standard GUI software such as the formerly popular Netscape Navigator—on their computer. This was especially useful in the 1990s because simple shell accounts were less expensive and/or more widely available than full SLIP/PPP accounts.[3]

In the mid-1990s, numerous universities provided dial-up shell accounts (to their faculty, staff, and students). These command line-only connections became more versatile with SLIP/PPP, enabling the use of arbitrary TCP/IP-based applications. Many guides to using university dial-up connections with Slirp were published online (e.g. [1], [2], [3], [4]). Use of TCP/IP emulations software like Slirp, and its commercial competitor TIA was banned by some shell account providers, who believed its users violated their terms of service or consumed too much bandwidth.[4][5]

Slirp is also useful for connecting PDAs and other mobile devices to the Internet: by connecting such a device to a computer running Slirp, via a serial cable or USB, the mobile device can connect to the Internet.[6]

Limitations

Unlike a true SLIP/PPP connection, provided by a dedicated server, a Slirp connection does not strictly obey the principle of end-to-end connectivity envisioned by the Internet protocol suite. The remote end of the connection, running on the shell account, cannot allocate a new IP address and route traffic to it.[7] Thus the local computer cannot accept arbitrary incoming connections, although Slirp can use port forwarding to accept incoming traffic for specific ports.

This limitation is similar to that of network address translation. It does provide enhanced security as a side effect, effectively acting as a firewall between the local computer and the Internet.[7]

Current status

Slirp is free software licensed under a BSD-like, modified 4-clause BSD license by its original author. After the original author stopped maintaining it, Kelly Price took over as maintainer.[8] However, there have been no releases since 2006. Debian maintainers have taken over some maintenance tasks, such as modifying Slirp to work correctly on 64-bit computers.[9]

Influence on other projects

Despite being largely obsolete, Slirp made a great influence on the networking stacks used in virtual machines and other virtualized environments. The established practice of connecting the virtual machines to the host's network stack was to use the various packet injection mechanisms. Raw sockets, being one of such mechanisms, were originally used for that purpose, and, due to many problems and limitations, were later replaced with the TAP device.

Packet injection is a privileged operation that may introduce a security threat, something that the introduction of TAP device solved only partially. Slirp-derived NAT implementation brought a solution to this long-standing problem. It was discovered that Slirp has the full NAPT implementation as a stand-alone user-space code, whereas other NAT engines are usually embedded into a network protocol stack and/or do not cooperate with the host OS when doing PAT (use their own port ranges and require packet injection). QEMU project have adopted the appropriate code portions of the Slirp package and got the permission from its original authors to re-license it under 3-clause BSD license.[10] Such license change allowed many other FOSS projects to adopt the QEMU-provided Slirp portions, which was (and still is) not possible with the original Slirp codebase because of the license compatibility problems. Some of the notable adopters are VDE and VirtualBox projects. Even though the Slirp-derived code was heavily criticized,[11] to date there is no competing implementation available.

See also

References

  1. ^ Rideau, François-René (2001), Firewall Piercing mini-HOWTO, Secure solution: piercing using ssh
  2. ^ JDIMPSON (2008), pppsshslirp: create a PPP session through SSH to a remote machine to which you don't have root
  3. ^ Jim Knoble (1996-08-01). "Almost Internet with SLiRP and PPP". Linux Journal. Retrieved 2009-08-28.
  4. ^ Craig J. Miller (1995-03-15). "Intermind discussion of TIA on TENET". Retrieved 2009-08-31.
  5. ^ "Everybody's Internet Update (section 1.5)". Electronic Frontier Foundation. September 1994. Retrieved 2009-08-31.
  6. ^ Kelly Price. "Slirp Maintenance Project home page". Retrieved 2009-08-31.
  7. ^ a b Glen Reesor (2001-02-21). "SLIP/PPP Emulator mini-HOWTO". Retrieved 2009-08-29.
  8. ^ Kelly Price. "Slirp FAQ". Retrieved 2009-08-28.
  9. ^ "Debian Changelog slirp". Retrieved 2009-08-28.
  10. ^ "[Qemu-devel] Remove the advertising clause from the slirp license".
  11. ^ "[Qemu-devel] Re: slirp-related crash".