From owner-freebsd-hackers Tue Jul 16 10:34:16 1996 Return-Path: owner-hackers Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id KAA15603 for hackers-outgoing; Tue, 16 Jul 1996 10:34:16 -0700 (PDT) Received: from ref.tfs.com ([206.245.251.1]) by freefall.freebsd.org (8.7.5/8.7.3) with ESMTP id KAA15597 for ; Tue, 16 Jul 1996 10:34:14 -0700 (PDT) Received: (from julian@localhost) by ref.tfs.com (8.7.5/8.7.3) id KAA02469; Tue, 16 Jul 1996 10:33:24 -0700 (PDT) Message-Id: <199607161733.KAA02469@ref.tfs.com> Subject: Re: IP masquerading over tunel device To: noel@harleystreet.com (Noel Burton-Krahn) Date: Tue, 16 Jul 1996 10:33:23 -0700 (PDT) From: "JULIAN Elischer" Cc: freebsd-hackers@FreeBSD.org In-Reply-To: <01BB7268.FFC9C880@mcduck.harleystreet.com> from "Noel Burton-Krahn" at Jul 15, 96 04:16:36 pm X-Mailer: ELM [version 2.4 PL25 ME8b] MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: owner-hackers@FreeBSD.org X-Loop: FreeBSD.org Precedence: bulk wait, wait! we've already got code to do this.... we're hoping we get permission to check it in this week! > > I'm condidering hacking IP masquerading into FreeBSD. Options include: > 1) something like PPP which extracts packets from the tunnel device, edits them, and retransmits. > 2) modifying the kernel firewall code a la Linux. > > option #1 seems more elegant to me, but I don't have any docs on the tunnel device, other than the PPP source. Could someone supply me with docs? > > Of course if someone is already trying this, let me know. we did! two ways.. look at the new "divert" feature in -current's ipfw code! also there is a new ppp daemon coming that has translation built in too.. with luck we'll be able to check in the ppp daemin this week. and while the translationdaemon may not be so easy to talk management into, the divert code in -current should make it a snap for you.. the guy here wrote the generic ip-translation daemon in a day or so. > > --Noel > >