NNTPS pointers / NNSP
Grant Taylor
gtaylor at tnetconsulting.net
Thu Oct 28 02:26:52 UTC 2021
On 10/27/21 3:27 PM, Julien ÉLIE wrote:
> Hi Grant,
Hi Julien,
> Awesome!
:-)
> It's worth adding that information in our FAQ if you're OK with that.
Agreed. Yes, I'm okay with it.
Though I might suggest holding off for a little while longer. I have
managed to use iproute2 policy based routing and stunnel (no iptables
required) to get INN to act as a client to a TLS enabled NNSP (NNTPS)
server.
I'd like to spend some more time working on things, or discuss what I've
done with someone else interested in reproducing what I've done. Use
that effort to make the directions consistent.
E.g. is iptables connection marking required or not? -- iptables or
fancier iproute2 PBR rules achieve the same goal. Also, compare and
contrast stunnel with socat. The latter of the two sets are how I did
the client portion.
> I can reference the iptables commands you found out. Any other
> configuration to mention?
Ya. More details on the client and unifying of the server (previous
message) and client (yet to be fully described) methods.
But, yes, the spirit is sharing this so that others can utilize it if
they so choose.
--
Grant. . . .
unix || die
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 4013 bytes
Desc: S/MIME Cryptographic Signature
URL: <https://lists.isc.org/pipermail/inn-workers/attachments/20211027/0da5e009/attachment.bin>
More information about the inn-workers
mailing list