From: “Perry E. Metzger” <perry@imsi.com>
To: Matthew J Ghio <mg5n+@andrew.cmu.edu>
Message Hash: ddce5cd7a91266a6a8a929b5cafd29bce467d37a7e45535b912fca856496a61c
Message ID: <9502060008.AA03105@snark.imsi.com>
Reply To: <YjBJeLe00bkR9JllAy@andrew.cmu.edu>
UTC Datetime: 1995-02-06 00:08:37 UTC
Raw Date: Sun, 5 Feb 95 16:08:37 PST
From: "Perry E. Metzger" <perry@imsi.com>
Date: Sun, 5 Feb 95 16:08:37 PST
To: Matthew J Ghio <mg5n+@andrew.cmu.edu>
Subject: Re: The SKRONK protocols (version 0.6)
In-Reply-To: <YjBJeLe00bkR9JllAy@andrew.cmu.edu>
Message-ID: <9502060008.AA03105@snark.imsi.com>
MIME-Version: 1.0
Content-Type: text/plain
Matthew J Ghio says:
> sdw@lig.net (Stephen D. Williams) wrote:
>
> > UDP won't get through most firewalls.
>
> I'm working on a program that gets around this. It creates a IP tunnel
> by setting up a SLIP interface on a encrypted TCP stream and routes
> packets through that. It's not completely finished but it does work.
> Send me mail if you want it.
Pardon but... why? Whats the reason for wanting to do this?
If a firewall has been set up to stop UDP, then it should stop UDP. If
the firewall has not been set up to stop UDP, or has a mechanism like
the experimental versions of "socks" currently being played with that
relay UDP, then there is no reason to want to do the above. I don't
really understand what the idea is here.
Perry
Return to February 1995
Return to “strick at The Yak <strick@yak.net>”