From owner-freebsd-hackers Tue Sep 17 09:40:05 1996 Return-Path: owner-hackers Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id JAA21674 for hackers-outgoing; Tue, 17 Sep 1996 09:40:05 -0700 (PDT) Received: from brasil.moneng.mei.com (brasil.moneng.mei.com [151.186.109.160]) by freefall.freebsd.org (8.7.5/8.7.3) with ESMTP id JAA21616 for ; Tue, 17 Sep 1996 09:39:55 -0700 (PDT) Received: (from jgreco@localhost) by brasil.moneng.mei.com (8.7.Beta.1/8.7.Beta.1) id LAA07486; Tue, 17 Sep 1996 11:38:45 -0500 From: Joe Greco Message-Id: <199609171638.LAA07486@brasil.moneng.mei.com> Subject: Re: tun0 device To: SimsS@Infi.Net (Steve Sims) Date: Tue, 17 Sep 1996 11:38:44 -0500 (CDT) Cc: hackers@FreeBSD.org In-Reply-To: <199609161836.OAA27880@mh004.infi.net> from "Steve Sims" at Sep 16, 96 02:36:17 pm X-Mailer: ELM [version 2.4 PL24] Content-Type: text Sender: owner-hackers@FreeBSD.org X-Loop: FreeBSD.org Precedence: bulk > Where's the seminal reference on the tunnel device? =20 > > `apropos tunnel` yields nada. Ditto for `man tun`. > > I don't have a *recent* handbook, but the one I have mentions it only in = > passing. > > Muchas Gracias in advance.... RTFS :-) It's actually quite trivial (at least from my experience) and quite nice: The tun device looks and acts like any other Point to Point network interface. Configure it as such. Open the corresponding /dev/tunX device and you can read packets that the system sent with your program, and/or you can inject packets back into the system's IP processing. It is fairly straightforward from what little I've played with it. ... JG