-
Notifications
You must be signed in to change notification settings - Fork 275
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support iptables-like filtering #140
Comments
(I was looking into this to limit the bandwidth used by the contained service) |
Maybe filtering on a syscall level could work for this, using https://github.com/google/kafel? Otherwise I'd think you'd need to create a new virtual interface, add iptable rules, and then pass that to the jailed process. |
Hmm interesting. @happyCoder92 WDYT? |
Keep in mind that when passing a virtual interface you need to use |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Seems like it's possible to do ip packet filtering inside network namespaces. Not sure how something like this could be implemented, so just throwing it out there as an idea.
https://github.com/deitch/ctables/blob/master/ctables
https://stackoverflow.com/questions/35695840/iptables-not-working-on-macvlan-traffic-in-container
The text was updated successfully, but these errors were encountered: