From owner-freebsd-hackers Mon Jul 15 16:20:59 1996 Return-Path: owner-hackers Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id QAA28406 for hackers-outgoing; Mon, 15 Jul 1996 16:20:59 -0700 (PDT) Received: from carver.pinc.com (carver.pinc.com [199.60.118.2]) by freefall.freebsd.org (8.7.5/8.7.3) with ESMTP id QAA28397 for ; Mon, 15 Jul 1996 16:20:56 -0700 (PDT) Received: from harley.UUCP (uucp@localhost) by carver.pinc.com (8.7.1/8.7.3) with UUCP id QAA21035 for freebsd-hackers@freebsd.org; Mon, 15 Jul 1996 16:20:54 -0700 (PDT) Received: by mcduck.harleystreet.com with Microsoft Mail id <01BB7268.FFC9C880@mcduck.harleystreet.com>; Mon, 15 Jul 1996 16:16:37 -0700 Message-ID: <01BB7268.FFC9C880@mcduck.harleystreet.com> From: Noel Burton-Krahn To: "'freebsd-hackers@freebsd.org'" Subject: IP masquerading over tunel device Date: Mon, 15 Jul 1996 16:16:36 -0700 MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Sender: owner-hackers@freebsd.org X-Loop: FreeBSD.org Precedence: bulk I'm condidering hacking IP masquerading into FreeBSD. Options include: 1) something like PPP which extracts packets from the tunnel device, = edits them, and retransmits. 2) modifying the kernel firewall code a la Linux. option #1 seems more elegant to me, but I don't have any docs on the = tunnel device, other than the PPP source. Could someone supply me with = docs? Of course if someone is already trying this, let me know. --Noel