Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 28 Oct 2002 15:06:06 +0000
From:      Baldur Gislason <baldur@foo.is>
To:        Don Bowman <don@sandvine.com>
Cc:        freebsd-net@freebsd.org
Subject:   Re: spoofing source code in kernel
Message-ID:  <20021028150607.10248AB93@tesla.foo.is>
In-Reply-To: <FE045D4D9F7AED4CBFF1B3B813C8533701022DA4@mail.sandvine.com>
References:  <FE045D4D9F7AED4CBFF1B3B813C8533701022DA4@mail.sandvine.com>

next in thread | previous in thread | raw e-mail | index | archive | help
ipfw allows you to catch the connections, but it doesn't enable your 
application to spoof the proxied connection as if it was coming straight from 
the client.

Baldur

On Monday 28 October 2002 15:01, you wrote:
> From: sepehr sohrabi [mailto:sepehr_soh@hotmail.com]
>
> > Hi list
> > Anyone has source code for spoofing (in kernel) for all input
> > Tcp/IP packets
> > .For any TCP/IP packet recieve it creates an ACK for it .
> > someThing like spoofing GW
> > CLIENT <-----> GW <-------> server
> >         connections are spoofed
> > THANX
>
> ipfw with a 'fwd' rule will let you do something like this.
> Run a user-mode application on port X, then do
> ipfw fwd localhost,X tcp from any to any recv myinterface
>
> and any inbound TCP connection will be terminated locally.
>
> --don (don@sandvine.com www.sandvine.com p2p)
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-net" in the body of the message

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-net" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20021028150607.10248AB93>