Return-Path: Delivered-To: apmail-new-httpd-archive@apache.org Received: (qmail 57707 invoked by uid 500); 30 Mar 2000 00:25:07 -0000 Mailing-List: contact new-httpd-help@apache.org; run by ezmlm Precedence: bulk X-No-Archive: yes Reply-To: new-httpd@apache.org list-help: list-unsubscribe: list-post: Delivered-To: mailing list new-httpd@apache.org Received: (qmail 57692 invoked from network); 30 Mar 2000 00:25:06 -0000 Date: Wed, 29 Mar 2000 16:25:05 -0800 (PST) From: Dean Gaudet To: new-httpd@apache.org Subject: Re: SOCK_RAW to achieve ip-tunneling In-Reply-To: Message-ID: X-comment: visit http://arctic.org/~dean/legal for information regarding copyright and disclaimer. MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=ISO-8859-1 Content-Transfer-Encoding: 8BIT X-Spam-Rating: locus.apache.org 1.6.2 0/1000/N see http://www.linux-vs.org/, specifically "virtual server via ip tunneling" on the "how" page. you might be able to do this with apache 2.0... but i'm really doubting it's worth it/efficient enough. Dean On Wed, 29 Mar 2000, Iniaki Fernandez Villanueva wrote: > Hi, > > Could apache (1.3/2.0) core use SOCK_RAW and handle IP datagrams to > implement > ip-tunneling whithin apache? . The idea is to send a request to > another web server to achieve an efficient load balancing dispatcher > within apache (I'd prefer to implement this whitin a module, but I think > this is impossible). > > SOCK_RAW require to run within a "root process". Apache's childs do > connections but they run under an unprivileged user ID, so like apache's > log file, can childs have a copy of the still open socket descriptors to > handle SOCK_RAW with read and write access? > > Thanks, > > ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ > .~. I�aki Fern�ndez Villanueva > DEBIAN/GNU /V\ siae0080@gc.ehu.es > // \\ Linux registered user #93164 > SLINK 2.1 /( )\ Student in Computer Engineering > ^^-^^ University of San Sebastian (Spain) > www.debian.org > ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ > > >