From owner-freebsd-hackers Thu Dec 14 7:44: 1 2000 From owner-freebsd-hackers@FreeBSD.ORG Thu Dec 14 07:43:59 2000 Return-Path: Delivered-To: freebsd-hackers@freebsd.org Received: from gradient.cis.upenn.edu (GRADIENT.CIS.UPENN.EDU [158.130.67.48]) by hub.freebsd.org (Postfix) with ESMTP id EDBEE37B400 for ; Thu, 14 Dec 2000 07:43:58 -0800 (PST) Received: from localhost (localhost [127.0.0.1]) by gradient.cis.upenn.edu (8.10.1/8.10.1) with ESMTP id eBEFhvt16045 for ; Thu, 14 Dec 2000 10:43:57 -0500 (EST) Date: Thu, 14 Dec 2000 10:43:57 -0500 (EST) From: Alwyn Goodloe To: freebsd-hackers@FreeBSD.org Subject: Firewall question Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG Guys, First I would like to thank everyone who responded to last weeks question. This time around my question is a little more detailed (as I managed to learn more :-) ). I was going to filter on a particular condition and divert those packets to a divert socket where some processing was to take place and if the proper conditions are met we would send the little guys on their way. But as I read the code the packet is basically gone from the routing software at that point. Any idea how to send the packets on their way once I've diverted them. I know this may be an easy question to those who do this sort of thing alot. As a last resort I was just going to hack the ip_fw_chk() fn (in ip_fw.c). Of course I don't like hacking systems internals if there is an easy way around it. Thanks for your help. Alwyn Goodloe agoodloe@gradient.cis.upenn.edu To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message