Jaroslaw Rafa wrote:
> Darren Reed napisal(a):
>   
>> "auth" rules are used for trapping packets into user space for
>> determining whether
>> or not to "pass", "block", "log", "keep state", etc, with a packet.
>>     
>
> This looks useful... If I could write a program that can associate a packet
> with the application that sent it (I don't know how yet, but maybe I'll find
> a way), that program could make such a decision...
> Any documentation how to write such programs?
>   

You might want to have a look at samples/userauth.c in the IPFilter .tar.gz

Cheers,
Darren

Reply via email to