[3769] in linux-net channel archive

home help back first fref pref prev next nref lref last post

Re: CONFIG_IP_TRANSPARENT_PROXY sample programs?

daemon@ATHENA.MIT.EDU (Jos Vos)
Fri Jul 19 22:24:29 1996

From: Jos Vos <jos@xos.nl>
To: linux-net@vger.rutgers.edu
Date: 	Thu, 18 Jul 1996 14:57:44 +0200 (MET DST)
In-Reply-To: <199607122015.NAA03172@torment.sealabs.com> from "David Bonn" at Jul 12, 96 01:15:17 pm

> The trick is to use getsockname() on the proxied client.  This returns
> the address that the client thinks it is connecting to.
> 
> My current thinking is that transparent proxies can be used quite
> efficiently to manage ip masquerading connections.  [...]

Maybe a bit off-topic, but I want to emphasize that the transparent
proxy facilities in the Linux kernel are developed to enable the
development of user-level proxy servers (only).
Any relation to the masquerading facilities is "purely accidental"
(sounds like a real disclaimer, isn't it? :-)).

I didn't completely follow the discussion about this topic, but the
idea of kernel-level transparent proxies that came up recently certainly
has no relation to the generic idea of transparent proxies: the latter
provide additional functionality, like authentication, filtering and
selection, caching, logging, etcetera (that's why a proxy is needed),
things that a "kernel-level proxy" could never provide.

-- 
--    Jos Vos <jos@xos.nl>
--    X/OS Experts in Open Systems BV   |   Phone: +31 20 6938364
--    Amsterdam, The Netherlands        |     Fax: +31 20 6948204


home help back first fref pref prev next nref lref last post