Network pipes
Luigi Rizzo
rizzo at icir.org
Thu Jul 24 12:00:29 PDT 2003
On Thu, Jul 24, 2003 at 10:36:41AM -0700, John-Mark Gurney wrote:
> Diomidis Spinellis wrote this message on Thu, Jul 24, 2003 at 14:04 +0300:
> > separate command "netpipe". Netpipe takes as arguments the originating
> > host, the socket port, the command to execute, and its arguments.
> > Netpipe opens the socket back to the originating host, redirects its I/O
> > to the socket, and execs the specified command.
>
> This breaks nat firewalls. It is very common occurance to only accept
> incoming connections, and only on certain ports. This means any system
> of firewill will probably be broken by this. :(
actually it is the other way around -- this solution simply won't
work on firewalled systems. But to tell the truth, i doubt you'd
do a multi-gb backup through a nat and be worried about the encryption
overhead.
cheers
luigi
> i.e. behind a nat to a public system, the return connection can't be
> established. From any system to a nat redirected ssh server, the
> incoming connection won't make it to the destination machine.
>
> I think this should just be a utility like Luigi suggested. This will
> help "solve" these problems.
>
> --
> John-Mark Gurney Voice: +1 415 225 5579
>
> "All that I will do, has been done, All that I have, has not."
More information about the freebsd-hackers
mailing list