image1

splinter

Unprivileged user packet filtering.

This program redirects IPv4 TCP connections to other destinations based on the source address, an alternative approach to kernel controlled firewalling.

An example configuration:

listen = :8090
default = 0
!www = 127.0.0.1:80

127.0.0.1 = !www
10.0.2.7 = 0
10.0.2.0/24 = !www
The results of some connections:
$ ./splinter -f conf.txt 
2017-08-29 16:21:30 127.0.0.1:60802 -> 127.0.0.1:60828 -> 127.0.0.1:80
2017-08-29 16:21:35 127.0.0.1:60802 -> 127.0.0.1:60828 -> 127.0.0.1:80 (5.726s)
2017-08-29 16:22:12 10.0.2.5:42600 -> 127.0.0.1:60832 -> 127.0.0.1:80
2017-08-29 16:22:14 10.0.2.5:42600 -> 127.0.0.1:60832 -> 127.0.0.1:80 (2.702s)
2017-08-29 16:22:21 10.0.2.7:49994 -> 0
2017-08-29 16:22:28 10.0.2.6:51336 -> 127.0.0.1:60836 -> 127.0.0.1:80
2017-08-29 16:22:30 10.0.2.6:51336 -> 127.0.0.1:60836 -> 127.0.0.1:80 (2.398s)
^C

Get the source: splinter-0.1.8.tar.gz View the changelog: changelog.txt. Released under BSD style license.

Run options:
-f (configuration file) (mandatory)
-t (ip) test ip address
-l dump listing
-d daemonize
-e verbose tcp level error messages

While splinter has logging the destination service doesn't see the client IP.

Credit

Splinter is an extension of jumpgate by Patroklos Argyroudis.

Email the author.

Back to my home page.