From owner-freebsd-ipfw Mon Jan 31 8:32: 1 2000 Delivered-To: freebsd-ipfw@freebsd.org Received: from www.scancall.no (www.scancall.no [195.139.183.5]) by hub.freebsd.org (Postfix) with SMTP id 1CC5A14BC9 for ; Mon, 31 Jan 2000 08:31:58 -0800 (PST) (envelope-from marius@marius.scancall.no) Received: from marius.scancall.no [195.139.183.64] by www with smtp id BSWNAEWK; Mon, 31 Jan 00 16:30:15 GMT (PowerWeb version 4.04r6) Received: from localhost (marius@localhost) by marius.scancall.no (8.9.3/8.9.3) with ESMTP id RAA19288 for ; Mon, 31 Jan 2000 17:31:45 +0100 (CET) (envelope-from marius@marius.scancall.no) Date: Mon, 31 Jan 2000 17:31:44 +0100 (CET) From: Marius Bendiksen To: freebsd-ipfw@freebsd.org Subject: Contracted firewall hack Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-ipfw@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG We've got a third party application which we need to route through our firewall, which is based on FreeBSD 3.4-R in a bridging setup. The application in question communicates over TCP port 1500, whence it requests a port for parts of the traffic sort of like what FTP does. We would be willing to pay to have a custom modification to the IPFW code which allows us to do this in a sensible manner. (I'm not on the list, so send any answers directly to me) Marius To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ipfw" in the body of the message