From owner-freebsd-hackers Tue Dec 10 21:47:55 1996 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.4/8.8.4) id VAA17233 for hackers-outgoing; Tue, 10 Dec 1996 21:47:55 -0800 (PST) Received: from alpo.whistle.com (alpo.whistle.com [207.76.204.38]) by freefall.freebsd.org (8.8.4/8.8.4) with ESMTP id VAA17227 for ; Tue, 10 Dec 1996 21:47:52 -0800 (PST) Received: from current1.whistle.com (current1.whistle.com [207.76.205.22]) by alpo.whistle.com (8.8.2/8.8.2) with SMTP id VAA17462; Tue, 10 Dec 1996 21:44:13 -0800 (PST) Message-ID: <32AE4A07.167EB0E7@whistle.com> Date: Tue, 10 Dec 1996 21:43:35 -0800 From: Julian Elischer Organization: Whistle Communications X-Mailer: Mozilla 3.0Gold (X11; I; FreeBSD 2.2-CURRENT i386) MIME-Version: 1.0 To: "Daniel O'Callaghan" CC: Steve Sims , Mark Tinguely , freebsd-hackers@FreeBSD.ORG Subject: Re: PPP with network address translation References: Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Sender: owner-hackers@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk Daniel O'Callaghan wrote: > > Next question with the PPP Nat, is: who is going to hack this to work > with divert(4) sockets, so we can have a NAT box on ethernet, without the > need for a PPP link? > > Danny that's what we do here.. (why we wrote divert sockets actually) but it;s inherrently kinked with the proprietary part of our system so we can't just give it away. (we'd like to however). but it really is a simple job. we're hoping someone just 'does it' as our hands are tied on this one.. sos BTW has a purely in-kernel version of NAT (or is it HAT?) ours is a process that works on packets that come up via the divert sockets.