docker – How to configure Dante SOCKS proxy server to listen on VMware’s public interface?

I am using kizzx2/docker-wireguard-socks-proxy to convert a VPN into a SOCKS proxy.

I am exposing the port using the -p argument, so Docker should bind to 0.0.0.0.

sudo docker run -it --rm --cap-add=NET_ADMIN
     --name wireguard-socks-proxy
     --volume /directory/containing/your/wireguard/conf/file/:/etc/wireguard/:ro
     -p 1080:1080
     kizzx2/wireguard-socks-proxy

I can access the SOCKS5 proxy at 127.0.0.1 and 172.17.0.2 (Docker IP) but not 192.168.231.144 (VMware IP) on port 1080.

nmap:

nmap 192.168.231.144
Starting Nmap 7.80 ( https://nmap.org ) at 2020-10-27 12:35 EDT
Nmap scan report for Ubuntu0 (192.168.231.144)
Host is up (0.00012s latency).
Not shown: 996 closed ports
PORT     STATE    SERVICE
80/tcp   open     http
1080/tcp filtered socks
1083/tcp open     ansoft-lm-1
3306/tcp open     mysql

Nmap done: 1 IP address (1 host up) scanned in 1.35 seconds

nmap 172.17.0.2
Starting Nmap 7.80 ( https://nmap.org ) at 2020-10-27 12:35 EDT
Nmap scan report for 172.17.0.2
Host is up (0.00013s latency).
Not shown: 999 closed ports
PORT     STATE SERVICE
1080/tcp open  socks

Nmap done: 1 IP address (1 host up) scanned in 0.13 seconds

nmap 127.0.0.1
Starting Nmap 7.80 ( https://nmap.org ) at 2020-10-27 12:40 EDT
Nmap scan report for localhost (127.0.0.1)
Host is up (0.00011s latency).
Not shown: 995 closed ports
PORT     STATE SERVICE
80/tcp   open  http
631/tcp  open  ipp
1080/tcp open  socks
1083/tcp open  ansoft-lm-1
3306/tcp open  mysql

Nmap done: 1 IP address (1 host up) scanned in 0.10 seconds

/etc/sockd.conf:

logoutput: stderr

internal: eth0 port = 1080
external: wg0

user.unprivileged: sockd

socksmethod: none
clientmethod: none

client pass {
    from: 0.0.0.0/0 to: 0.0.0.0/0
    log: error
}

socks pass {
    from: 0.0.0.0/0 to: 0.0.0.0/0
}

I am receiving connections on VMware’s public interface (ens33), but the Dante SOCKS proxy server is not listening on 192.168.231.144:1080.

sudo tcpdump -i ens33 -n port 1080

listening on ens33, link-type EN10MB (Ethernet), capture size 262144 bytes
12:27:06.372746 IP 192.168.231.1.25307 > 192.168.231.144.1080: Flags (S), seq 2040900223, win 64240, options (mss 1460,nop,wscale 8,nop,nop,sackOK), length 0
...