-
Notifications
You must be signed in to change notification settings - Fork 0
Open
Description
On top of HTTP(S) proxy based on env vars and applications cooperating, let's implement arbitrary TCP/UDP mode, especially useful for containers.
Assumptions:
- TCP/UDP mode will work for specific domains.
- For each whitelisted domain, sandworm acquires a unique IP address (assuming we're in a comfy docker network with lots of addresses available).
- Each container populates its
/etc/hostswith a mapping from whitelisted domain to its unique IP assigned as above. - When a TCP connection or a UDP packet comes, sandworm can deduce the requested domain simply by looking up which destination address was used to contact it.
- sandworm needs to maintain a set of ports open to be able to properly serve as raw proxy. We should have sensible defaults for those ports, as well as allowing users to ask for specific port numbers to be open. Or just open the whole range ¯\_(ツ)_/¯
- what about protocols with complex handshakes? Probably won't work atm. SSH will likely also insist on a scary message about mismatched fingerprint, but should otherwise work with a simple forwarding.
Metadata
Metadata
Assignees
Labels
No labels