This tool will run a program in an isolated network namespace, allowing the program to connect only to a single TCP address such as a SOCKS proxy. This can help prevent accidental proxy-bypass issues that could leak non-proxied requests.
Support for unprivileged user namespaces is required to run socksns. This is enabled by default in the mainline kernel and most distributions, but you may want to make sure that /proc/sys/kernel/unprivileged_userns_clone
is not 0
.
```bash
git clone https://github.com/stevenengler/socksns.git cd socksns && cargo install --path .
cargo install socksns ```
If you have a SOCKS proxy (for example Tor) running on port 9050:
bash
socksns torsocks curl google.com
socksns curl --proxy socks5h://localhost:9050 google.com
``` This tool will run a program in an isolated network namespace, allowing the program to connect only to a single TCP address such as a SOCKS proxy
Usage: socksns [OPTIONS]
Arguments:
Options:
--debug
Show debug-level log messages
--proxy