From owner-freebsd-questions Tue Jun 2 19:12:50 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id TAA00684 for freebsd-questions-outgoing; Tue, 2 Jun 1998 19:12:50 -0700 (PDT) (envelope-from owner-freebsd-questions@FreeBSD.ORG) Received: from megaweapon.zigg.com (ip68.grand-rapids.mi.pub-ip.psi.net [38.11.210.68]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id TAA00652 for ; Tue, 2 Jun 1998 19:12:37 -0700 (PDT) (envelope-from matt@megaweapon.zigg.com) Received: from megaweapon.zigg.com (megaweapon.zigg.com [192.168.0.1]) by megaweapon.zigg.com (8.8.8/8.8.8) with SMTP id WAA19965 for ; Tue, 2 Jun 1998 22:12:43 -0400 (EDT) (envelope-from matt@megaweapon.zigg.com) Date: Tue, 2 Jun 1998 22:12:43 -0400 (EDT) From: Matt Behrens To: questions@FreeBSD.ORG Subject: security & ppp tunneling Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG I recently discovered ppp's ability to use a network socket as a device. Pretty cool, quick, and dirty. :) I'm wondering, is there any way (easy or otherwise) to encrypt said traffic? I may resort to using skip but I'd like easier options if possible. :) Thanks! Matt Behrens | http://www.zigg.com/ Network Operations, The Iserv Company | Proudly running FreeBSD; sworn MIS, Michigan Kenworth, Inc. | enemy of Linux, a free hack OS Chanop Script Coordinator, WWFIN | and Windows, a non-free hack OS! To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message