[3769] in linux-net channel archive
Re: CONFIG_IP_TRANSPARENT_PROXY sample programs?
daemon@ATHENA.MIT.EDU (Jos Vos)
Fri Jul 19 22:24:29 1996
From: Jos Vos <jos@xos.nl>
To: linux-net@vger.rutgers.edu
Date: Thu, 18 Jul 1996 14:57:44 +0200 (MET DST)
In-Reply-To: <199607122015.NAA03172@torment.sealabs.com> from "David Bonn" at Jul 12, 96 01:15:17 pm
> The trick is to use getsockname() on the proxied client. This returns
> the address that the client thinks it is connecting to.
>
> My current thinking is that transparent proxies can be used quite
> efficiently to manage ip masquerading connections. [...]
Maybe a bit off-topic, but I want to emphasize that the transparent
proxy facilities in the Linux kernel are developed to enable the
development of user-level proxy servers (only).
Any relation to the masquerading facilities is "purely accidental"
(sounds like a real disclaimer, isn't it? :-)).
I didn't completely follow the discussion about this topic, but the
idea of kernel-level transparent proxies that came up recently certainly
has no relation to the generic idea of transparent proxies: the latter
provide additional functionality, like authentication, filtering and
selection, caching, logging, etcetera (that's why a proxy is needed),
things that a "kernel-level proxy" could never provide.
--
-- Jos Vos <jos@xos.nl>
-- X/OS Experts in Open Systems BV | Phone: +31 20 6938364
-- Amsterdam, The Netherlands | Fax: +31 20 6948204