Kodachi networking binaries combine Tor orchestration, multi-protocol routing, DNS hardening, and IP verification into a unified operational stack that can be used interactively or in scripted security workflows.
5 Core Binaries184 Commands11 Routing Protocols50+ DNS ResolversLeak Detection
Traffic and Routing Layer
Flow
tor-switch and routing-switch control exit paths, balancing, and protocol failover, while ip-fetch validates effective network identity from multiple sources.
dns-switch and dns-leak provide encrypted resolver control and immediate leak diagnostics to confirm that anonymization settings are effective end to end.
44 DNS CommandsDoH + DoT + DNSCryptReal-Time Checks
Documentation Navigation
Navigate the documentation:
Quick Start - Installation guide and getting started
Enterprise-Grade Network and Anonymization Infrastructure
The network tools in Kodachi OS provide comprehensive control over network routing, anonymization, DNS management, and IP operations. These production-ready binaries enable secure and anonymous network communications through multiple protocols, advanced Tor orchestration, and intelligent routing mechanisms.
Core Architecture Principles - Verified
Multi-Protocol Support: 11 routing protocols including VPN, proxies, and Tor
Defense Against Surveillance: Complete traffic anonymization and DNS leak prevention
Intelligent Routing: Automatic failover, load balancing, and protocol optimization
Zero Information Leakage: Multi-source verification and comprehensive leak testing
# Start and configure Torsudotor-switchstart-tor
sudotor-switchcreate-multiple-instances3sudotor-switchset-load-balancing-moderound-robin
# Prefer nftables for torrification; load-balancing is handled by instance/HA settingssudotor-switchtorrify-system-nftables
# Verify anonymizationip-fetchcheck-tor--json
dns-leaktest--json
Multi-Protocol Routing Configuration
# List available protocols with scoresrouting-switchlist-protocols
# Connect through fastest protocolsudorouting-switchauto-select
# Configure specific protocolsudorouting-switchconnectshadowsocks
# Export configurationrouting-switchshowconfigqr
DNS Security Setup
# Pick reputable DNS (randomized)sudodns-switchrandom--typereputable
# Enable DNSCrypt (choose resolver explicitly)sudodns-switchdnscrypt-set--resolvercloudflare
# Test for leaksdns-leaktest--json
# Enable Pi-hole filteringsudodns-switchpihole-enable
Network Testing and Verification
# Complete network checkip-fetchtest-all
# DNS leak testingdns-leakdiscover
dns-leaktestdns-leakreport
# Tor verificationip-fetchcheck-tor--json
sudotor-switchverify-tor-dns-all
Advanced Tor Operations
# Set exit node countrysudotor-switchset-exit-nodeUS
# Exclude certain countriessudotor-switchset-exclude-nodeCN,RU
# Configure HAProxy load balancingsudotor-switchgenerate-haproxy-configroundrobin8118sudotor-switchhaproxy-start
# Set automatic IP rotationsudotor-switchupdate-ip-all-timer600# Every 10 minutes
Implemented in the factory (protocols/mod.rs:139) but deliberately omitted from PROTOCOL_SECURITY_SCORES — prefer VLESS/Reality or Trojan for new deployments
Mita/Mieru
routing-switch
Yes
Traffic obfuscation
Hysteria2
routing-switch
Yes
UDP optimization
DNS Protocols
Protocol
Binary
Security
Privacy
Standard DNS
dns-switch
None
Low
DNSCrypt
dns-switch
Encrypted
High
DNS-over-TLS
dns-switch
TLS
High
DNS-over-HTTPS
dns-switch
HTTPS
High
Network Security Features
Traffic Analysis Prevention
Feature
Description
Tor Load Balancing
Distribute traffic across instances
Protocol Rotation
Automatic protocol switching
DNS Randomization
Rotate DNS servers
IP Rotation
Timed identity changes
Leak Prevention
Feature
Description
DNS Leak Testing
Continuous monitoring
WebRTC Blocking
Prevent IP leaks
IPv6 Management
Disable when needed
Kill Switch
Network isolation on failure
Connection Security
Feature
Description
Certificate Pinning
TLS verification
Authentication
Secure credential management
Encryption
End-to-end encryption
Obfuscation
Traffic disguising
Integration Points
The network tools integrate with:
Integration Type
Services/Components
Security Services
health-control, online-auth
System Services
logs-hook, permission-guard
Firewall Systems
iptables, nftables, ufw
Network Managers
NetworkManager, systemd-networkd
Proxy Software
HAProxy, redsocks, tun2socks
Troubleshooting
Common Issues
Issue
Solution
Prevention
Tor connection fails
Check firewall, restart service
Monitor logs
DNS leaks detected
Enable kill switch, check config
Regular testing
Routing fails
Verify credentials, check protocol
Use fallback
IP not changing
New circuit, check exit nodes
Timer automation
Diagnostic Commands
# Check Tor statussudotor-switchtor-status-all
sudotor-switchcheck-tor-all
# Test routingrouting-switchstatus
routing-switchtest-protocolopenvpn
sudorouting-switchrecover
# Verify DNSdns-switchstatus
dns-switchhealth--typereputable
# Network connectivityip-fetchtest-all
Security Considerations
Important Security Notice
Network anonymization tools should be used responsibly and in accordance with local laws. These tools are designed for legitimate privacy protection and security testing purposes only.