08-19-2014
SSH tunnels are an alternative sort of secure remote access. VPN generally creates am IP device that gets everything but VPN packets, and produces everything but VPN packets, but there are newer variations that run over a TCP/IP connection. One problem original VPN had was that full size packets would grow and have to be fragmented, making them suboptimal is size and less reliable as a lost packet fails reassembly, and the unlost part is discarded, a waste. With a tcp output, a stream not IP datagrams, there can be full sized tcp packets serving VPN of all IP apps and all internal packets sizes with no fragmentation.
Reading RFCs may seem steep, but that is where the real skinny is.
9 More Discussions You Might Find Interesting
1. IP Networking
Hi,
I am involved in a project on Debian. One of my requirement is to route an IP packet in my application to a proxy server and receive the reply from the proxy server as an IP packet. My application handles data at the IP frame level. My application creates an IP packet(with all the necessary... (0 Replies)
Discussion started by: Rajesh_BK
0 Replies
2. UNIX for Dummies Questions & Answers
on ubuntu try without saving changes
i'm trying to do root stuff with sudo & su
I tried to change permissions (on files) but unsuccessfully
whoami is ubuntu
i'm doing this to experiment with root & sudo
error msgs i'm gettin
useradd: unable to lock password file
help?
thanks:) (2 Replies)
Discussion started by: JudoMan
2 Replies
3. Ubuntu
Hi all,
I am trying to configure and connect Cisco VPN on Ubuntu 10.04.
I've imported .pcf file. The new vpn conn appears in the VPN Connections option. Now when I select it, it doesn't connect. Nothing happens.
I am not able to connect to VPN at all. I tried using kvpnc as well but it... (10 Replies)
Discussion started by: morningSunshine
10 Replies
4. Ubuntu
Hi I have an Ubuntu 10.10 machine. I want to recover root password. I know it have to be done while booting but in boot shell.
I tried to do it but failed.
Please remedy my problem. (2 Replies)
Discussion started by: nixhead
2 Replies
5. SuSE
Hello All,
I'm using my Ubuntu 10.04 client connected via SSH to a SuSE Linux server (SuSE Linux Enterprise Server 11 (x86_64) version 11 patchlevel=1).
I'm trying to run an install of WebSphere Portal but can't seem to be able to run the GUI installer.
Running xclock as root returns this... (7 Replies)
Discussion started by: kartrait
7 Replies
6. Solaris
Hi All
After downloading ZFS documentation from oracle site, I am able to successfully migrate UFS root FS without zones to ZFS root FS. But in case of UFS root file system with zones , I am successfully able to migrate global zone to zfs root file system but zone are still in UFS root file... (2 Replies)
Discussion started by: sb200
2 Replies
7. UNIX for Dummies Questions & Answers
I have a dell pc with Ubuntu as the only OS, however, the only admin user no longer works here.
Due to my requirements, I have to either remove Ubuntu (12.04) and install XP or do a dual boot by adding XP. Any thoughts on how to either change the pw to allow me to make changes or take Ubuntu... (1 Reply)
Discussion started by: kuriosity_prime
1 Replies
8. IP Networking
I need to configure a proxy on my local machine to use an upstream proxy (installed on another machine). The upstream proxy requires Digest/NTLM authorization. I want the local proxy to deal with the upstream proxy's authorization details and provides authorization free access to users that connect... (0 Replies)
Discussion started by: Russel
0 Replies
9. UNIX for Beginners Questions & Answers
I have created a cronjob that successfully executes and among other thing runs aria2c to download several files and save them to a folder. However, since it executes as sudo, the downloaded folder is saved with those permissions.
Is there a way to execute the cronjob so that the downloaded folder... (4 Replies)
Discussion started by: cmccabe
4 Replies
PK(4) Kernel Interfaces Manual PK(4)
NAME
pk - packet driver
DESCRIPTION
The packet driver implements a full-duplex end-to-end flow control strategy for machine-to-machine communication. Packet driver protocol
is established by calling pkon(2) with a character device file descriptor and a desired packet size in bytes. The packet size must be a
power of 2, 32<=size<=4096. The file descriptor must represent an 8-bit data path. This is normally obtained by setting the device in
raw mode (see ioctl(2)).
The actual packet size, which may be smaller than the desired packet size, is arrived at by negotiation with the packet driver at the
remote end of the data link.
The packet driver maintains two data areas for incoming and outgoing packets. The output area is needed to implement retransmission on
errors, and arriving packets are queued in the input area. Data arriving for a file not open for reading is discarded. Initially the size
of both areas is set to two packets.
It is not necessary that reads and writes be multiples of the packet size although there is less system overhead if they are. Read opera-
tions return the maximum amount of data available from the input area up to the number of bytes specified in the system call. The buffer
sizes in write operations are not normally transmitted across the link. However, writes of zero length are treated specially and are
reflected at the remote end as a zero-length read. This facilitates marking the serial byte stream, usually for delimiting files.
When one side of a packet driver link is shut down by close(2)or pkoff (see pkon(2)), read(2) on the other side will return 0, and write on
the other side will raise a SIGPIPE signal.
SEE ALSO
pkon(2), pkopen(3)
local PK(4)