Enable source spoofing for the client
alexxroche opened this issue · 2 comments
alexxroche commented
In the config.toml $RUROCO_IP is invaluable for being able to add a dynamic IP to a firewall config. It could be nice if the client had the option to spoof the source address so that I can add nftables rules on behalf of other servers.
because /etc/rurocu/config.toml doesn't permit
open_192.168.7.123 = "nft insert rule ip filter INPUT ip saddr ${COMMAND#*_} tcp dport 22 counter accept"
and is messy anyway because it has to anticipate the address, which could be a problem with dhcp.
beac0n commented
Would that be solved with #9 ?
You could define the IP and set --strict to false
The only difference would then be that the server has to pick the IP from the data payload and not from the UDP packet IP src
beac0n commented
implemented and will be available with next release