From a6e0c7e8f0c20276f2f7cb2d9332a806e8493c18 Mon Sep 17 00:00:00 2001 From: smill Date: Sat, 3 Sep 2016 12:22:09 +0000 Subject: Introduced the capability to spoof the source address of outgoing sessions + an accompanying shim loader. --- netlib/tcp.py | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) (limited to 'netlib/tcp.py') diff --git a/netlib/tcp.py b/netlib/tcp.py index e5c84165..aaea9459 100644 --- a/netlib/tcp.py +++ b/netlib/tcp.py @@ -605,7 +605,7 @@ class ConnectionCloser(object): class TCPClient(_Connection): - def __init__(self, address, source_address=None): + def __init__(self, address, source_address=None, spoof_source_address=None): super(TCPClient, self).__init__(None) self.address = address self.source_address = source_address @@ -613,6 +613,7 @@ class TCPClient(_Connection): self.server_certs = [] self.ssl_verification_error = None # type: Optional[exceptions.InvalidCertificateException] self.sni = None + self.spoof_source_address = spoof_source_address @property def address(self): @@ -729,6 +730,11 @@ class TCPClient(_Connection): def connect(self): try: connection = socket.socket(self.address.family, socket.SOCK_STREAM) + if self.spoof_source_address: + if os.geteuid() != 0: + raise RuntimeError("Insufficient privileges to set socket option") + else: + connection.setsockopt(socket.SOL_IP, 19, 1) if self.source_address: connection.bind(self.source_address()) connection.connect(self.address()) -- cgit v1.2.3