Jaroslaw Rafa wrote: > Darren Reed napisal(a): > >> "auth" rules are used for trapping packets into user space for >> determining whether >> or not to "pass", "block", "log", "keep state", etc, with a packet. >> > > This looks useful... If I could write a program that can associate a packet > with the application that sent it (I don't know how yet, but maybe I'll find > a way), that program could make such a decision... > Any documentation how to write such programs? >
You might want to have a look at samples/userauth.c in the IPFilter .tar.gz Cheers, Darren
