![]() |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > OK, can I make any changes to the source code and tell it to use specific > ports, or somehow limit the range of ports it is allowed to use ? Sorry to step into the discussion after having missed the very first question of the thread. If you are looking for "masquerading" type of solution, I think you can easily deduce from Linux's ip_masq_ftp module how to act. As for more generic "forwarding proxy" solution, I think it shouldn't be difficult to parse the protocol and look for PORT a,b,c,d,e,f lines (change them, and behave accordingly). At least when I played with FTP, this seemed pretty trivial. -----BEGIN PGP SIGNATURE----- Version: PGP 6.0.2 -- QDPGP 2.60 Comment: http://community.wow.net/grt/qdpgp.php iQA/AwUBN4ntDVMwP8g7qbw/EQI/EwCfbQGtVapX191bjD9RjgbzLYS812EAoKaH sxL4JWqw04v8Ej3sJJuAOolO =xSaV -----END PGP SIGNATURE----- -- Petr Novotny, ANTEK CS Petr.Novotny@antek.cz http://www.antek.cz PGP key ID: 0x3BA9BC3F -- Don't you know there ain't no devil there's just God when he's drunk. [Tom Waits]