You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
One feature that is nice to have in Honeyd is the ability for proxied services
to look up the source and destination IP of incoming requests. This way, they
can tailor their responses based on the destination IP address and port. This
would provide similar function to the HONEYD_IP_SRC, HONEYD_IP_DST,
HONEYD_SRC_PORT, and HONEYD_DST_PORT that are passed to subsystems.
I have attached a patch which causes Honeyd to create a new unix domain socket
(/var/run/honeyd-proxy.sock) which can be used to subscribe to information
about proxied requests. Using this interface, a backend server providing
proxied services can look up the original source and destination ip address and
port. It receives two types of messages - one when the proxied connection is
initiated, and another when the proxied connection is closed.
The patch file also makes the following changes:
- Allows users to provide CFLAGS via configure instead of always using
hardcoded CFLAGS.
- Lower logging level of syslog messages which are sent on every connection.
- Set the permissions on the Honeyd UI and proxy sockets to allow
administration of these from the UID/GID that Honeyd runs under.
Original issue reported on code.google.com by [email protected] on 1 Sep 2010 at 8:09
The text was updated successfully, but these errors were encountered:
Original issue reported on code.google.com by
[email protected]
on 1 Sep 2010 at 8:09The text was updated successfully, but these errors were encountered: