Author: adrian.chadd
Date: Wed Jun 17 00:25:23 2009
New Revision: 14099
Added:
wiki/LuscaArchitectureNetworkTransparentInterception.wiki
Log:
Created wiki page through web user interface.
Added: wiki/LuscaArchitectureNetworkTransparentInterception.wiki
==============================================================================
--- (empty file)
+++ wiki/LuscaArchitectureNetworkTransparentInterception.wiki Wed Jun 17
00:25:23 2009
@@ -0,0 +1,35 @@
+#summary The hooks into network transparency.
+
+= Introduction =
+
+Lusca supports client-side and server-side IPv4 address spoofing for a
variety of platforms.
+
+= Background =
+
+Squid has supported client-side interception for a number of years. The
support includes a variety of possible code paths for each operating system
and firewall type (IPFilter, IPFW, Netfilter, PF.) Recently, support for
the Balabit TPROXY2 and TPROXY4 interception frameworks allow Squid to
intercept both client and server facing traffic, presenting a (mostly!)
seamless transparency to both sides of the connection.
+
+The idea is being developed out in Lusca to provide transparent
interception support to any application written which uses the Lusca
network core.
+
+= Components =
+
+== Client connection interception ==
+
+== Client-side address spoofing ==
+
+= Implementation notes =
+
+== Linux TPROXY2 ==
+
+== Linux TPROXY4 ==
+
+== FreeBSD-current BIND_ANY ==
+
+== NetBSD/OpenBSD BIND_ANY ==
+
+= Future work =
+
+== WCCPv2 integration ==
+
+== Proxy bypass ==
+
+== Non-HTTP protocols ==
\ No newline at end of file
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups
"lusca-commit" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to
[email protected]
For more options, visit this group at
http://groups.google.com/group/lusca-commit?hl=en
-~----------~----~----~----~------~----~------~--~---