https://github.com/akihirosuda/go-netfilter-queue
Go bindings for libnetfilter_queue (Forked from openshift/geard)
https://github.com/akihirosuda/go-netfilter-queue
Last synced: about 2 months ago
JSON representation
Go bindings for libnetfilter_queue (Forked from openshift/geard)
- Host: GitHub
- URL: https://github.com/akihirosuda/go-netfilter-queue
- Owner: AkihiroSuda
- License: apache-2.0
- Created: 2015-12-14T06:55:50.000Z (almost 10 years ago)
- Default Branch: master
- Last Pushed: 2023-03-10T00:32:10.000Z (over 2 years ago)
- Last Synced: 2025-08-13T18:44:25.033Z (about 2 months ago)
- Language: Go
- Homepage:
- Size: 24.4 KB
- Stars: 117
- Watchers: 5
- Forks: 44
- Open Issues: 6
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
go-netfilter-queue
==================
[](https://godoc.org/github.com/AkihiroSuda/go-netfilter-queue)Go bindings for libnetfilter_queue
_Forked from [openshift/geard@be0423a](https://github.com/openshift/geard/tree/be0423a67449bc4be1419e03e8bdf459ff0df07e/pkg/go-netfilter-queue)_ for supporting recent environments.
This library provides access to packets in the IPTables netfilter queue (NFQUEUE).
The libnetfilter_queue library is part of the [Netfilter project](http://netfilter.org/projects/libnetfilter_queue/).Example
=======use IPTables to direct all outgoing Ping/ICMP requests to the queue 0:
iptables -A OUTPUT -p icmp -j NFQUEUE --queue-num 0
You can then use go-netfilter-queue to inspect the packets:
package main
import (
"fmt"
"github.com/AkihiroSuda/go-netfilter-queue"
"os"
)
func main() {
var err error
nfq, err := netfilter.NewNFQueue(0, 100, netfilter.NF_DEFAULT_PACKET_SIZE)
if err != nil {
fmt.Println(err)
os.Exit(1)
}
defer nfq.Close()
packets := nfq.GetPackets()
for true {
select {
case p := <-packets:
fmt.Println(p.Packet)
p.SetVerdict(netfilter.NF_ACCEPT)
}
}
}To inject a new or modified packet in the place of the original packet, use:
p.SetVerdictWithPacket(netfilter.NF_ACCEPT, byte_slice)
Instead of:
p.SetVerdict(netfilter.NF_ACCEPT)
To undo the IPTables redirect. Run:
iptables -D OUTPUT -p icmp -j NFQUEUE --queue-num 0