Date: Thu, 19 Apr 2007 08:47:56 +0700 From: zen <zen@tk-pttuntex.com> To: Adrian Chadd <adrian@freebsd.org>, freebsd-stable@freebsd.org Subject: Re: tproxy on freebsd Message-ID: <4626CA4C.7000104@tk-pttuntex.com> In-Reply-To: <d763ac660704172157q73cbefd8p9cb13597075eda7c@mail.gmail.com> References: <46247471.9030503@tk-pttuntex.com> <200704172129.22275.sanya-spb@list.ru> <20070418095903.12432@caamora.com.au> <462575D4.2010801@tk-pttuntex.com> <20070418115654.30422@caamora.com.au> <46257D1A.7050808@tk-pttuntex.com> <d763ac660704172157q73cbefd8p9cb13597075eda7c@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Adrian Chadd wrote: > > A little birdie has told me that this mode of transparent > client-spoofing is possible with FreeBSD with a little kernel hackery > (much less than whats needed for TPROXY.) > > Maybe someone who "knows" the code better than I could comment on how > difficult it'd be to add in functionality to FreeBSD to spoof the > local IP of a connected socket for outbound connections. This of > course assumes symmetric traffic flows but thats already a given in a > setup like this. > > if there is any such thing , i'm willing to be a tester . i will deploy it on my server and enviroment ( live one) > Adrian > TIA Zen
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4626CA4C.7000104>