Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 19 Apr 2007 08:47:56 +0700
From:      zen <zen@tk-pttuntex.com>
To:        Adrian Chadd <adrian@freebsd.org>,  freebsd-stable@freebsd.org
Subject:   Re: tproxy on freebsd
Message-ID:  <4626CA4C.7000104@tk-pttuntex.com>
In-Reply-To: <d763ac660704172157q73cbefd8p9cb13597075eda7c@mail.gmail.com>
References:  <46247471.9030503@tk-pttuntex.com>	 <200704172129.22275.sanya-spb@list.ru>	 <20070418095903.12432@caamora.com.au>	 <462575D4.2010801@tk-pttuntex.com>	 <20070418115654.30422@caamora.com.au>	 <46257D1A.7050808@tk-pttuntex.com> <d763ac660704172157q73cbefd8p9cb13597075eda7c@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Adrian Chadd wrote:

>
> A little birdie has told me that this mode of transparent
> client-spoofing is possible with FreeBSD with a little kernel hackery
> (much less than whats needed for TPROXY.)
>
> Maybe someone who "knows" the code better than I could comment on how
> difficult it'd be to add in functionality to FreeBSD to spoof the
> local IP of a connected socket for outbound connections. This of
> course assumes symmetric traffic flows but thats already a given in a
> setup like this.
>
>
if there is any such thing , i'm willing to be a tester .
i will deploy it on my server and enviroment ( live one)

> Adrian
>
TIA

Zen



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4626CA4C.7000104>