From: Marius B. <ma...@un...> - 2002-05-08 20:13:58
|
William Stearns <wst...@po...> writes: > Although I present this in the light of your firewall request above, > this would certainly work with squid running inside UML and > transparent proxying for your second request, it's not transparent enough. I'm planning on making a protocol change in NNTP's handling of CANCEL posts, and as you know, nntp servers act different based on what ip address connects to them. So in order to make a solution that works with ALL nntp daemons(some of which are closed source as well as unmaintained), I need to be able to not only intercept the connection, but repoduce, and alter, it with the same source IP. I have been told OpenBSD allows this to be done, but I simply don't have any hardware available for testing or implementing. :-/ Marius |