Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Implement the pass through #161

Open
glaslos opened this issue May 8, 2024 · 4 comments
Open

Implement the pass through #161

glaslos opened this issue May 8, 2024 · 4 comments

Comments

@glaslos
Copy link
Member

glaslos commented May 8, 2024

Using TCP and UDP proxy or exclusion in the iptables rule spec (like port 22 for ssh)

@jerryyummy
Copy link

i would like to solve it. so there are something to do:

  1. Proxy all TCP/UDP traffic
  2. Support multiple excluded ports
  3. Ensure Glutton can still capture malicious traffic
    is it right?

@glaslos
Copy link
Member Author

glaslos commented Feb 5, 2025

Pretty much, yes. I.e. we have this rule:

rules:
  - match: tcp dst port 23 or port 2323 or port 23231
    type: conn_handler
    target: telnet

this feature would support a rule like:

rules:
  - match: tcp dst port 22
    type: passthrough

@jerryyummy
Copy link

@glaslos hi, i already run the porject but found that although some ports have been configured in the yaml file, but i can not use curl to access these ports, i can only access the 5000 port. so may i ask how to reproduce the situation that glutton can handle other ports(like 8080) , so i can try to implement passthrough

@jerryyummy
Copy link

pls have a check , #172

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants