Author: adrian.chadd
Date: Wed Jun 17 00:25:23 2009
New Revision: 14099

Added:
    wiki/LuscaArchitectureNetworkTransparentInterception.wiki

Log:
Created wiki page through web user interface.

Added: wiki/LuscaArchitectureNetworkTransparentInterception.wiki
==============================================================================
--- (empty file)
+++ wiki/LuscaArchitectureNetworkTransparentInterception.wiki   Wed Jun 17  
00:25:23 2009
@@ -0,0 +1,35 @@
+#summary The hooks into network transparency.
+
+= Introduction =
+
+Lusca supports client-side and server-side IPv4 address spoofing for a  
variety of platforms.
+
+= Background =
+
+Squid has supported client-side interception for a number of years. The  
support includes a variety of possible code paths for each operating system  
and firewall type (IPFilter, IPFW, Netfilter, PF.) Recently, support for  
the Balabit TPROXY2 and TPROXY4 interception frameworks allow Squid to  
intercept both client and server facing traffic, presenting a (mostly!)  
seamless transparency to both sides of the connection.
+
+The idea is being developed out in Lusca to provide transparent  
interception support to any application written which uses the Lusca  
network core.
+
+= Components =
+
+== Client connection interception ==
+
+== Client-side address spoofing ==
+
+= Implementation notes =
+
+== Linux TPROXY2 ==
+
+== Linux TPROXY4 ==
+
+== FreeBSD-current BIND_ANY ==
+
+== NetBSD/OpenBSD BIND_ANY ==
+
+= Future work =
+
+== WCCPv2 integration ==
+
+== Proxy bypass ==
+
+== Non-HTTP protocols ==
\ No newline at end of file

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"lusca-commit" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to 
[email protected]
For more options, visit this group at 
http://groups.google.com/group/lusca-commit?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to