Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 11 Jun 2002 17:10:03 -0500 (CDT)
From:      Nick Rogness <nick@rogness.net>
To:        John Nielsen <hackers@jnielsen.net>
Cc:        hackers@FreeBSD.ORG
Subject:   Re: gif(4) tunnel through MSN DSL modem
Message-ID:  <Pine.BSF.4.21.0206111700530.41533-100000@cody.jharris.com>
In-Reply-To: <019001c2118d$1a7ee560$0900a8c0@max>

next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 11 Jun 2002, John Nielsen wrote:

> > On Tue, 11 Jun 2002, John Nielsen wrote:
> > >
> > >
> > My best guess would be that the modem is doing some anti-spoofing
> > between it's interfaces to prevent packets coming from the inside
> > having it's outside IP.  You will be able to tell if NO ipencap
> > packets are received on the remote BSD machine.
> 
> Could you elaborate on this?  Since that does seem to be the problem (or at
> least a strong candidate), what would I have to do to work around this?  I
> don't suppose it's possible to create a gif tunnel inside an ssh tunnel, is
> it?

	Well it's simple.  The modem has 2 interfaces, one with the
	public_ip and one with the private_ip (which connects to your
	network).  To prevent spoofing, the modem could only allow traffic
	from certain private IP's and/or not allow packets with it's
	public address in/out via it's private interface.


Nick Rogness <nick@rogness.net>
 - Don't mind me...I'm just sniffing your packets


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0206111700530.41533-100000>