Blame view

Documentation/networking/tproxy.rst 3.81 KB
4ac0b122e   Mauro Carvalho Chehab   docs: networking:...
1
2
3
  .. SPDX-License-Identifier: GPL-2.0
  
  =========================
d2f26037a   KOVACS Krisztian   netfilter: Add do...
4
5
6
7
  Transparent proxy support
  =========================
  
  This feature adds Linux 2.2-like transparent proxy support to current kernels.
fd158d79d   Florian Westphal   netfilter: tproxy...
8
9
  To use it, enable the socket match and the TPROXY target in your kernel config.
  You will need policy routing too, so be sure to enable that as well.
d2f26037a   KOVACS Krisztian   netfilter: Add do...
10

1bfc2bc7a   Máté Eckl   netfilter: doc: A...
11
  From Linux 4.18 transparent proxy support is also available in nf_tables.
d2f26037a   KOVACS Krisztian   netfilter: Add do...
12
13
14
15
16
  
  1. Making non-local sockets work
  ================================
  
  The idea is that you identify packets with destination address matching a local
4ac0b122e   Mauro Carvalho Chehab   docs: networking:...
17
  socket on your box, set the packet mark to a certain value::
d2f26037a   KOVACS Krisztian   netfilter: Add do...
18

4ac0b122e   Mauro Carvalho Chehab   docs: networking:...
19
20
21
22
      # iptables -t mangle -N DIVERT
      # iptables -t mangle -A PREROUTING -p tcp -m socket -j DIVERT
      # iptables -t mangle -A DIVERT -j MARK --set-mark 1
      # iptables -t mangle -A DIVERT -j ACCEPT
d2f26037a   KOVACS Krisztian   netfilter: Add do...
23

4ac0b122e   Mauro Carvalho Chehab   docs: networking:...
24
  Alternatively you can do this in nft with the following commands::
1bfc2bc7a   Máté Eckl   netfilter: doc: A...
25

4ac0b122e   Mauro Carvalho Chehab   docs: networking:...
26
27
28
      # nft add table filter
      # nft add chain filter divert "{ type filter hook prerouting priority -150; }"
      # nft add rule filter divert meta l4proto tcp socket transparent 1 meta mark set 1 accept
1bfc2bc7a   Máté Eckl   netfilter: doc: A...
29
30
  
  And then match on that value using policy routing to have those packets
4ac0b122e   Mauro Carvalho Chehab   docs: networking:...
31
  delivered locally::
1bfc2bc7a   Máté Eckl   netfilter: doc: A...
32

4ac0b122e   Mauro Carvalho Chehab   docs: networking:...
33
34
      # ip rule add fwmark 1 lookup 100
      # ip route add local 0.0.0.0/0 dev lo table 100
d2f26037a   KOVACS Krisztian   netfilter: Add do...
35
36
37
38
  
  Because of certain restrictions in the IPv4 routing output code you'll have to
  modify your application to allow it to send datagrams _from_ non-local IP
  addresses. All you have to do is enable the (SOL_IP, IP_TRANSPARENT) socket
4ac0b122e   Mauro Carvalho Chehab   docs: networking:...
39
40
41
42
43
44
45
46
47
48
49
  option before calling bind::
  
      fd = socket(AF_INET, SOCK_STREAM, 0);
      /* - 8< -*/
      int value = 1;
      setsockopt(fd, SOL_IP, IP_TRANSPARENT, &value, sizeof(value));
      /* - 8< -*/
      name.sin_family = AF_INET;
      name.sin_port = htons(0xCAFE);
      name.sin_addr.s_addr = htonl(0xDEADBEEF);
      bind(fd, &name, sizeof(name));
d2f26037a   KOVACS Krisztian   netfilter: Add do...
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
  
  A trivial patch for netcat is available here:
  http://people.netfilter.org/hidden/tproxy/netcat-ip_transparent-support.patch
  
  
  2. Redirecting traffic
  ======================
  
  Transparent proxying often involves "intercepting" traffic on a router. This is
  usually done with the iptables REDIRECT target; however, there are serious
  limitations of that method. One of the major issues is that it actually
  modifies the packets to change the destination address -- which might not be
  acceptable in certain situations. (Think of proxying UDP for example: you won't
  be able to find out the original destination address. Even in case of TCP
  getting the original destination address is racy.)
  
  The 'TPROXY' target provides similar functionality without relying on NAT. Simply
4ac0b122e   Mauro Carvalho Chehab   docs: networking:...
67
  add rules like this to the iptables ruleset above::
d2f26037a   KOVACS Krisztian   netfilter: Add do...
68

4ac0b122e   Mauro Carvalho Chehab   docs: networking:...
69
70
      # iptables -t mangle -A PREROUTING -p tcp --dport 80 -j TPROXY \
        --tproxy-mark 0x1/0x1 --on-port 50080
d2f26037a   KOVACS Krisztian   netfilter: Add do...
71

1bfc2bc7a   Máté Eckl   netfilter: doc: A...
72
73
74
  Or the following rule to nft:
  
  # nft add rule filter divert tcp dport 80 tproxy to :50080 meta mark set 1 accept
d2f26037a   KOVACS Krisztian   netfilter: Add do...
75
76
  Note that for this to work you'll have to modify the proxy to enable (SOL_IP,
  IP_TRANSPARENT) for the listening socket.
1bfc2bc7a   Máté Eckl   netfilter: doc: A...
77
78
79
80
  As an example implementation, tcprdr is available here:
  https://git.breakpoint.cc/cgit/fw/tcprdr.git/
  This tool is written by Florian Westphal and it was used for testing during the
  nf_tables implementation.
d2f26037a   KOVACS Krisztian   netfilter: Add do...
81

1bfc2bc7a   Máté Eckl   netfilter: doc: A...
82
83
  3. Iptables and nf_tables extensions
  ====================================
d2f26037a   KOVACS Krisztian   netfilter: Add do...
84

1bfc2bc7a   Máté Eckl   netfilter: doc: A...
85
  To use tproxy you'll need to have the following modules compiled for iptables:
4ac0b122e   Mauro Carvalho Chehab   docs: networking:...
86

1bfc2bc7a   Máté Eckl   netfilter: doc: A...
87
88
   - NETFILTER_XT_MATCH_SOCKET
   - NETFILTER_XT_TARGET_TPROXY
d2f26037a   KOVACS Krisztian   netfilter: Add do...
89

1bfc2bc7a   Máté Eckl   netfilter: doc: A...
90
  Or the floowing modules for nf_tables:
4ac0b122e   Mauro Carvalho Chehab   docs: networking:...
91

1bfc2bc7a   Máté Eckl   netfilter: doc: A...
92
93
   - NFT_SOCKET
   - NFT_TPROXY
d2f26037a   KOVACS Krisztian   netfilter: Add do...
94
95
96
97
98
99
100
101
102
103
104
105
106
107
  
  4. Application support
  ======================
  
  4.1. Squid
  ----------
  
  Squid 3.HEAD has support built-in. To use it, pass
  '--enable-linux-netfilter' to configure and set the 'tproxy' option on
  the HTTP listener you redirect traffic to with the TPROXY iptables
  target.
  
  For more information please consult the following page on the Squid
  wiki: http://wiki.squid-cache.org/Features/Tproxy4