Re: [PATCH] ACL to control TPROXY spoofing

From: Steve Hill <steve_at_opendium.com>
Date: Thu, 28 Feb 2013 16:47:24 +0000

On 26.02.13 21:56, Amos Jeffries wrote:

> I'm happy with the use-case too now. If the code adjusted to 3.HEAD
> still looks good I think it could go in.

I've attached a patch against 3.HEAD. I've tested it, although I would
appreciate it if you could double check that I'm using
HttpRequest::Pointer correctly in client_side.cc.

As well as the spoof_client_ip ACL, this introduces a new request flag
called interceptTproxy, which is set for all TPROXY requests. The
spoofClientIp flag is now only set for TPROXY requests that we want to
spoof.

Many thanks.

-- 
  - Steve Hill
    Technical Director
    Opendium Limited     http://www.opendium.com
Direct contacts:
    Instant messager: xmpp:steve_at_opendium.com
    Email:            steve_at_opendium.com
    Phone:            sip:steve_at_opendium.com
Sales / enquiries contacts:
    Email:            sales_at_opendium.com
    Phone:            +44-844-9791439 / sip:sales_at_opendium.com
Support contacts:
    Email:            support_at_opendium.com
    Phone:            +44-844-4844916 / sip:support_at_opendium.com

Received on Thu Feb 28 2013 - 16:47:33 MST

This archive was generated by hypermail 2.2.0 : Fri Mar 01 2013 - 12:00:07 MST