[3674] in linux-net channel archive
Re: CONFIG_IP_TRANSPARENT_PROXY sample programs?
daemon@ATHENA.MIT.EDU (David Bonn)
Sat Jul 13 19:43:22 1996
Date: Fri, 12 Jul 1996 13:15:17 -0700
From: David Bonn <david@sealabs.com>
To: Matthias Urlichs <smurf@smurf.noris.de>
Cc: linux-net@vger.rutgers.edu
In-Reply-To: <96Jul11.210441+0100met_dst.2226-3354+78@work.smurf.noris.de>
>>>>> "Matthias" == Matthias Urlichs <smurf@smurf.noris.de> writes:
Matthias> Are there sample programs which show how to use transparent proxying?
Matthias> I'd like to use the kernel masquerade feature instead (copying the data
Matthias> twice is _ugly_), but I also need to reassign different IP addresses to the
Matthias> relayed connections, which Linux cannot do (yet?).
The trick is to use getsockname() on the proxied client. This returns
the address that the client thinks it is connecting to.
My current thinking is that transparent proxies can be used quite
efficiently to manage ip masquerading connections. Using a
transparent proxy for the ftp control connection won't have a
noticable performance impact, but makes for cleaner, more robust code
when it comes to building ip masquerading entries for the data
connection.
dwb