On Wed, Jul 26, 2006 at 12:19:18AM -0300, Gustavo Rios wrote:
| May some one point me a reference information on implementation
| tunnels with pf without security.

Not necesarilly better than gre(4), but you should also look into
gif(4), tun(4) and ppp(4)/ppp(8)/pppd(8)/pppoe(8). Last of all,
there's a new feature in ssh(1) that lets you tunnel traffic alongside
your ssh session (but this gives you a certain type of security).

On that note, what do you mean by "with pf without security" ? If you
pass the traffic required for the tunneltype you're using in pf(4),
it'll work. If you block the outer tunnel-traffic, your tunnel will
not work. Other than that, you can (of course) filter on the inside of
the tunnel. Please elaborate on this point.

Cheers,

Paul 'WEiRD' de Weerd

--
>++++++++[<++++++++++>-]<+++++++.>+++[<------>-]<.>+++[<+
+++++++++++>-]<.>++[<------------>-]<+.--------------.[-]
                 http://www.weirdnet.nl/

[demime 1.01d removed an attachment of type application/pgp-signature]

Reply via email to