<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=gb2312">
<META content="MSHTML 6.00.2800.1400" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT face=Arial size=2>I test Zorp 3.0.14b + 2.0.6
cttproxy for kernel 2.6.17 and It work fine for me, but I found client
can</FONT></DIV>
<DIV><FONT face=Arial size=2>see ip address of dummy interface that I
can't understand.</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2>client(192.168.88.166) <--> zorp(dummy ip
172.16.44.10) <--> server(192.168.88.10)</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV>
<DIV><FONT face=Arial size=2># iptables -t tproxy -I PREROUTING -p tcp --dport
80 -j TPROXY --on-ip 172.16.44.10 --on-port 60080</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV></DIV>
<DIV><FONT face=Arial size=2>instances.conf:</FONT></DIV>
<DIV><FONT face=Arial size=2>http -T -v 1 -s core.error:0 -p
/usr/local/etc/zorp/http.py -B 172.16.44.10</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2>http.py:</FONT></DIV>
<DIV><FONT face=Arial size=2>.</FONT></DIV>
<DIV><FONT face=Arial size=2>.</FONT></DIV>
<DIV><FONT face=Arial size=2>.</FONT></DIV>
<DIV><FONT face=Arial size=2>def zorp():<BR> Service("http", MyHttp,
router=TransparentRouter(forge_addr=TRUE, forge_port=Z_PORT_EXACT))<BR>
Listener(SockAddrInet(172.16.44.10, 60080), "http", transparent=TRUE,
mark_tproxy=TRUE)</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2>
<DIV><FONT face=Arial size=2>when I make a new http request from client to
server and tcpdump will display the information below</FONT></DIV></FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2>tcpdump on client</FONT></DIV>
<DIV><FONT face=Arial size=2># tcpdump | grep 172.16.44.10</FONT></DIV>
<DIV><FONT face=Arial size=2>16:10:57.975579 802.1Q vlan#3 P0 172.16.44.10.60080
> 192.168.88.166.2883: P 0:32(32) ack 1 win 11680 (DF)<BR>16:10:57.975611
172.16.44.10.60080 > 192.168.88.166.2883: P 0:32(32) ack 1 win 11680
(DF)<BR>16:10:57.975831 192.168.88.166.2883 > 172.16.44.10.60080: R
3812615646:3812615646(0) win 0<BR>16:10:57.975860 802.1Q vlan#3 P0
192.168.88.166.2883 > 172.16.44.10.60080: R 3812615646:38126156</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2>tcpdump on server</FONT></DIV>
<DIV><FONT face=Arial size=2>
<DIV><FONT face=Arial size=2># tcpdump | grep
172.16.44.10</FONT></DIV></FONT></DIV>
<DIV><FONT face=Arial size=2>16:10:57.538207 arp who-has 192.168.88.10 tell
172.16.44.10</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2>my question is how to avoid client see dummy
ip address?</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2>ZhouLi</FONT></DIV>
<BR>
____ KILL邮件安全网关 已经扫描了这封邮件 ____<BR>
</BODY></HTML>