BoreConnect: Streamlining Public URL Exposure via a Unified Web Interface for Bore CLI

Authors

  • Tejas Sadashiv Jondhale
  • Pavani Rao V
  • Likhita L
  • Devandla Balaji Udaysankar
  • Abirami A

Keywords:

CLI orchestration, Endpoint discovery, NAT traversal, Network tunnelling, Output streaming, Process management, Spring Boot, Usability evaluation

Abstract

Public URL exposure of local services is frequently required during rapid prototyping, remote debugging, and short-lived integration testing. Although tunnelling utilities such as Bore offer a lightweight mechanism for NAT traversal, their terminal-centric workflow introduces avoidable operational friction: manual command construction, repeated context switching between terminal and browser, and error-prone transcription of relay-assigned endpoints. This paper presents BoreConnect, a Spring Boot control plane that manages an unmodified Bore CLI instance as a supervised operating-system process and publishes the discovered public endpoint through a web interface and REST endpoints. BoreConnect continuously drains the CLI output stream to prevent blocking, extracts the relay-assigned port using regular-expression matching, and exposes the resulting public URL via a status API for near-real-time consumption by a browser client. A test structure takes shape through clear cause-and-effect measures, built around numbers that track how fast tunnels form, how often they work, mistakes by users, shifts between tasks, and system load. Variables are split into what changes and what responds, forming a backbone for checking real-world performance without guesswork creeping in. Metrics land firmly on timing, accuracy, repetition, effort gaps, and demand on tools. Each piece connects not just logically but through observable results piling up over trials.

References

E. Dahl et al., “Bore: A modern, simple TCP tunnel in Rust,” GitHub, Jun. 09, 2025.

B. Ford, P. Srisuresh, and D. Kegel. 2005. “Peer-to-Peer communication across network address translators.” USENIX Annual Technical Conference, 2025, pp. 179–192.

Y. Wei, D. Yamada, S. Yoshida, and S. Goto, “A new method for symmetric NAT traversal in UDP and TCP,” Asia Pacific Advanced Network Conference, Jan. 2008.

VMware Inc. Spring Boot Reference Documentation. Online documentation, Jul. 2025.

J. E. F. Friedl, Mastering regular expressions, 3rd ed. O’Reilly, 2006.

Oracle, “ProcessBuilder (Java Platform SE 17),” Java SE 17 API Documentation, 2026.

V. Mulder, A. Mermoud, V. Lenders, and B. Tellenbach, Eds., Trends in data protection and encryption technologies. Springer, 2023.

Z. Sui, H. Shu, F. Kang, Y. Huang, and G. Huo, “A comprehensive review of tunnel detection on multilayer protocols: From traditional to machine learning approaches,” Applied Sciences, vol. 13, no. 3, Feb. 2023.

N. Xue, Y. Malla, Z. Xia, C. Pöpper, and M. Vanhoef. “Bypassing tunnels: Leaking VPN client traffic by abusing routing tables.” Proceedings of the 32nd USENIX Security Symposium, 2023, pp. 5719–5736.

LocalTunnel Contributors, “LocalTunnel: Expose yourself to the world,” GitHub repository, 2026.

Ngrok Inc. Ngrok Documentation. Online documentation. 2026.

WHATWG. HTML Living standard: Server-Sent events. Online specification, 2026.

R. T. Fielding, Architectural styles and the design of network-based software architectures, Ph.D. dissertation, Univ. California, Irvine, CA, USA, 2000.

R. Fielding and J. Reschke, “RFC 7231: Hypertext Transfer Protocol (HTTP/1.1): Semantics and content,” Internet Engineering Task Force (IETF), Jun. 2014.

T. Berners-Lee, R. Fielding, and L. Masinter. “RFC 3986: Uniform Resource Identifier (URI): Generic Syntax,” Network Working Group, Jan. 2005.

K. K. Jyothi and B. I. Reddy, “Study on Virtual Private Network (VPN), VPN’s protocols and security,” International Journal of Scientific Research in Computer Science, Engineering and Information Technology, vol. 3, no. 5, pp. 919–932, 2018.

Published

2026-04-08