docker bridge network 如何实现类似旁路由的效果? - V2EX
V2EX = way to explore
V2EX 是一个关于分享和探索的地方
现在注册
已注册用户请  登录
0o0O0o0O0o
V2EX    Docker

docker bridge network 如何实现类似旁路由的效果?

  •  
  •   0o0O0o0O0o 2022-04-01 23:09:31 +08:00 1597 次点击
    这是一个创建于 1356 天前的主题,其中的信息可能已经有所发展或是发生改变。

    思路是创建两个 bridge network ,容器 gateway 相当于具备两张网卡,容器 client 只有一张网卡,并且 client 的网关设定为 gateway 同局域网的 IP ,期望 client 通过 gateway 联网,当 gateway 配置好后,client 也就享受到了透明代理。这个思路和 network_mode: "service:gateway" 有区别,没有使用过旁路由,但看描述,似乎和旁路由很相似。

    运行起来后在 client 里发出请求,在 host 上看 log ,是有 src 为 gateway wan IP 的日志的:

    IN=br-afa9afabafa5 OUT= MAC= SRC=172.30.0.2 DST=114.114.114.114 LEN=79 TOS=0x00 PREC=0x00 TTL=64 ID=43805 PROTO=UDP SPT=36940 DPT=53 LEN=59 MARK=0x1

    但是如果在 gateway 运行 wireguard ,gateway 内可以实现全局代理,而 client 里就没法使用网络了,不清楚 docker 中如何调试 iptables 日志 ,如果希望实现我期望的结果,我应该如何配置呢?希望能描述一下原理,谢谢。

    • docker-compose version 1.25.0

    • Docker version 20.10.12, build e91ed57

    [Interface] PrivateKey = <PrivateKey> Address = 10.101.0.2/32 [Peer] PublicKey = <PublicKey> AllowedIPs = 0.0.0.0/0 Endpoint = <Server>:10000 
    # docker-compose.yml version: "3" networks: lan: driver: bridge ipam: config: - subnet: 172.28.0.0/16 wan: driver: bridge ipam: config: - subnet: 172.30.0.0/16 services: gateway: container_name: gateway hostname: gateway build: context: . dockerfile: Dockerfile privileged: true sysctls: net.ipv4.ip_forward: 1 cap_add: - NET_ADMIN networks: wan: ipv4_address: 172.30.0.2 lan: ipv4_address: 172.28.0.2 command: >- sh -c 'echo && ip route del default && ip route add default via 172.30.0.1 && echo && ip rule show && route -n && echo && iptables -t nat -I POSTROUTING -j MASQUERADE && iptables -A FORWARD -i eth0 -o eth1 -j ACCEPT && iptables -A FORWARD -i eth1 -o eth0 -j ACCEPT && tail -f /dev/null' client: container_name: client hostname: client build: context: . dockerfile: Dockerfile privileged: true cap_add: - NET_ADMIN networks: lan: ipv4_address: 172.28.0.3 command: >- sh -c 'echo && ip route del default && ip route add default via 172.28.0.2 && echo "nameserver 114.114.114.114" >/etc/resolv.conf && tail -f /dev/null' 
    # Dockerfile FROM ubuntu:focal RUN apt-get update && apt-get install -y \ curl ca-certificates \ iproute2 net-tools iptables \ dnsutils \ inetutils-ping curl host mtr-tiny tcpdump \ rsyslog \ wireguard-tools openresolv kmod --no-install-recommends \ && rm -rf /var/lib/apt/lists/* 
    anubu
        1
    anubu  
       2022-04-02 08:59:18 +08:00
    似乎使用 macvlan 网络更合适些。
    0o0O0o0O0o
        2
    0o0O0o0O0o  
    OP
       2022-04-02 09:28:27 +08:00 via iPhone
    @anubu 谢谢,由于特殊原因,希望只用 docker bridge network 实现
    0o0O0o0O0o
        3
    0o0O0o0O0o  
    OP
       2022-04-02 09:29:33 +08:00 via iPhone
    昨晚发现把 iptables 命令移到 wg-quick up 后面就可以了…
    关于     帮助文档     自助推广系统     博客     API     FAQ     Solana     5509 人在线   最高记录 6679       Select Language
    创意工作者们的社区
    World is powered by solitude
    VERSION: 3.9.8.5 29ms UTC 06:36 PVG 14:36 LAX 22:36 JFK 01:36
    Do have faith in what you're doing.
    ubao msn snddm index pchome yahoo rakuten mypaper meadowduck bidyahoo youbao zxmzxm asda bnvcg cvbfg dfscv mmhjk xxddc yybgb zznbn ccubao uaitu acv GXCV ET GDG YH FG BCVB FJFH CBRE CBC GDG ET54 WRWR RWER WREW WRWER RWER SDG EW SF DSFSF fbbs ubao fhd dfg ewr dg df ewwr ewwr et ruyut utut dfg fgd gdfgt etg dfgt dfgd ert4 gd fgg wr 235 wer3 we vsdf sdf gdf ert xcv sdf rwer hfd dfg cvb rwf afb dfh jgh bmn lgh rty gfds cxv xcv xcs vdas fdf fgd cv sdf tert sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf shasha9178 shasha9178 shasha9178 shasha9178 shasha9178 liflif2 liflif2 liflif2 liflif2 liflif2 liblib3 liblib3 liblib3 liblib3 liblib3 zhazha444 zhazha444 zhazha444 zhazha444 zhazha444 dende5 dende denden denden2 denden21 fenfen9 fenf619 fen619 fenfe9 fe619 sdf sdf sdf sdf sdf zhazh90 zhazh0 zhaa50 zha90 zh590 zho zhoz zhozh zhozho zhozho2 lislis lls95 lili95 lils5 liss9 sdf0ty987 sdft876 sdft9876 sdf09876 sd0t9876 sdf0ty98 sdf0976 sdf0ty986 sdf0ty96 sdf0t76 sdf0876 df0ty98 sf0t876 sd0ty76 sdy76 sdf76 sdf0t76 sdf0ty9 sdf0ty98 sdf0ty987 sdf0ty98 sdf6676 sdf876 sd876 sd876 sdf6 sdf6 sdf9876 sdf0t sdf06 sdf0ty9776 sdf0ty9776 sdf0ty76 sdf8876 sdf0t sd6 sdf06 s688876 sd688 sdf86