soxy-driver

command module
v0.0.0-...-789973c Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Sep 26, 2018 License: Apache-2.0 Imports: 9 Imported by: 0

README

soxy-driver

image Build Status

A Linux docker networking driver that transparently tunnels underlying networks TCP traffic through a proxy. The driver uses docker's core networking library libnetwork and benefits thus from its stability.

With respect to TCP-tunneling, redsocks is used behind the scenes, supporting therefore many proxy tunneling strategies : socks4, socks5, http-connect, http-relay.

The driver embeds a tor instance that is used as a fallback socks proxy.

Usage

The following example uses implicitly the driver embedded fallback tor proxy:

  1. Pull the image
    docker pull yassine/soxy-driver
    
  2. Run the driver container
    docker run -d -v '/var/run/docker.sock':'/var/run/docker.sock' -v '/run/docker/plugins':'/run/docker/plugins' --net host --name soxy-driver --privileged yassine/soxy-driver
    
  3. Create a network based on the driver
    docker network create -d soxy-driver soxy_network
    

Note : If you want to test against another proxy than the embedded tor-based one, you can pass the proxy params using the -o label. For example : docker network create -d soxy-driver soxy_network -o "soxy.proxyaddress"="%PROXY_HOST%" -o "soxy.proxyport"="%PROXY_PORT%", see the next section for all available configuration options.

You can now create a container that uses the network formerly created and test the tunneling:

docker run --rm -it --dns 8.8.8.8 --net soxy_network uzyexe/curl -s https://check.torproject.org/api/ip

Output : {"IsTor":true,"IP":"%SOME_TOR_EXIT_NODE_IP_HERE%"}

Note : It is mandatory to specify a DNS server when creating containers, as by default docker will configure one through the loopback interface (127.0.0.22 as bind address). As per se, it is impossible otherwise for the driver to intercept/tunnel the DNS traffic and prevent from dns-leaks.

Configuration options

Configuration options are passed when creating a given network (See example above). Available options are :

Option Description Default
soxy.proxyaddress The address of the proxy through which the traffic is redirected localhost
soxy.proxyport The proxy port A random port that maps to the embedded tor instance socks port
soxy.proxytype The proxy type socks5 (available choices : socks4, socks5, http-connect, http-relay)
soxy.proxyuser The proxy user if the proxy requires Authentication none
soxy.proxypassword The proxy password if the proxy requires Authentication none
soxy.blockUDP Block networks outgoing UDP traffic but DNS false

Configuration params maps to one given network only, therefore it would be passed when creating any network through docker network create. If the network configuration is skipped, the driver falls-back on the singleton embedded tor instance socks proxy.

Namespacing

If for some reason you want to run multiple instances of the driver on a given docker host, the driver supports a namespacing feature. When running the driver container, you can pass an environment variable DRIVER_NAMESPACE while creating its container.

Example:

  1. Assume a namespace 'my-namespace'
  2. You would run the driver container as follows:
    docker run -d -e DRIVER_NAMESPACE='my-namespace' -v '/var/run/docker.sock':'/var/run/docker.sock' -v '/run/docker/plugins':'/run/docker/plugins' --net host --privileged yassine-soxy-driver
    
  3. The driver name you would use should now be prefixed by my-namespace__ as follows :
    docker network create -d my-namespace__soxy-driver namespaced_driver_soxy_network
    

Documentation

The Go Gopher

There is no documentation for this package.

Directories

Path Synopsis

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL