From owner-freebsd-hackers Wed Oct 30 17:41:49 1996 Return-Path: owner-hackers Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id RAA16654 for hackers-outgoing; Wed, 30 Oct 1996 17:41:49 -0800 (PST) Received: from alpo.whistle.com (alpo.whistle.com [207.76.204.38]) by freefall.freebsd.org (8.7.5/8.7.3) with ESMTP id RAA16641 for ; Wed, 30 Oct 1996 17:41:44 -0800 (PST) Received: from current1.whistle.com (current1.whistle.com [207.76.205.22]) by alpo.whistle.com (8.8.2/8.8.2) with SMTP id RAA00291; Wed, 30 Oct 1996 17:39:24 -0800 (PST) Message-ID: <32780343.167EB0E7@whistle.com> Date: Wed, 30 Oct 1996 17:39:15 -0800 From: Julian Elischer Organization: Whistle Communications X-Mailer: Mozilla 3.0b6 (X11; I; FreeBSD 2.2-CURRENT i386) MIME-Version: 1.0 To: Julian Assange CC: freebsd-hackers@freebsd.org Subject: Re: FreeBSD and IP tunneling References: <199610310046.LAA10960@suburbia.net> Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Sender: owner-hackers@freebsd.org X-Loop: FreeBSD.org Precedence: bulk Julian Assange wrote: > > > Packets sent on the tun* interfaces show up as data to be read on /dev/tun*. > > Data written on /dev/tun* shows up as input packets on the tun* interfaces. > > So, if you want to do UDP encapsulated tunnelling, you should do something like > > Are there as yet no userland tools to do this? It seems like something that > should be addressed. What about IPIP? Writing can be done easily enough with > IP_HDRINCL, but how do you go about reading such packets short of bpf? > For such things we use the divert sockets here.. :)