The Official Unofficial Zorp project
Overview| Examples| Bugs| FAQ | White papers | Download | Help wanted | SourceForge Project page | Filltable utility Project News: Zorp unofficial
  • zorp 2.0.9-6 has been released
  • iptables-utils zorp-unoff version has been released
  • New whitepaper, even more FAQs
  • Zorp whitepapers released, new FAQs
  • New tproxy versions
  • New Zorp version: get the DN
  • The best bughunter
  • Bughunting contest extended
  • Valentine day bughunting contest!
  • Site updates: FAQ, design
  • Project File Releases: Zorp unofficial
  • zorp 2.0.9-6 released (Mon, 01 Nov 2004 21:49:58 GMT)
  • zorp 2.0.9-6 released (Mon, 01 Nov 2004 21:40:56 GMT)
  • iptables-utils 1.21-1 released (Mon, 01 Nov 2004 21:19:42 GMT)
  • zorp 2.0.9-1 released (Sat, 12 Jun 2004 00:00:00 GMT)
  • zorplibll released (Sat, 12 Jun 2004 00:00:00 GMT)
  • zorp zorp_2.0.8-1 released (Thu, 11 Dec 2003 00:00:00 GMT)
  • zorp zorp_2.0.7-2 released (Wed, 03 Dec 2003 00:00:00 GMT)
  • zorp zorp_2.0.7-1 released (Tue, 11 Nov 2003 00:00:00 GMT)
  • zorplibll zorplibll_2.0.26.23-1 released (Mon, 10 Nov 2003 00:00:00 GMT)
  • Next Previous Contents

    1. Overview of the project

    The Official Unofficial Zorp Project is the focal point for enhancements to zorp-gpl, the free application level modular proxy firewall.

    1.1 Status of the project

    Well, the project itself is just started. However you can find here several code. These are in two categories yet:

    One is the freshest zorp and libzorpll code. This is in some aspects even fresher than the one you can find in the official zorp download site, and at least as fresh as the one you can find in Debian. The reason is simple: I am one of the Debian maintainers of zorp and libzorpll, and you can find the mirror of my gnu arch repository here.

    The other kind of code is the result of some experiments with Zorp. Don't even expect them to work, but you can find them useful to grab ideas of what can be done with Zorp, or if you find the ideas worth trying, the code can be a starting point to create something interesting. These experiments are gone in two directions: there are almost ready :) proxy modules, and close-to working :) decision layer enhancements. You can expect the following modules to appear in the repository one by one, as I have time to reread them to make sure that there is no confidental data is released with them:

    • An ldap based config generator.

    • An ldap based config. Yes, it reads the actual configuration from an LDAP tree.

    • A decision layer featuring more fine-grained zone definition (with ports), and Mandatory Access Control.

    • An add-on which allows for a more intuitive configuration style than the one you can find in the upstream. This one is actually works for me.

    • A replacement of the AnyPy proxy module, with another design and less shortcomings.

    • A H.323 proxy module draft. Unfortunately it depends on ptlib and openh323, which means C++.

    1.2 Plans for the long run

    I plan to make this a place, where you can find:

    • configuration examples

    • documentation

    • code which is not yet integrated to the mainstream zorp-gpl code

    • features too advanced for the average firewall administrator

    • enhancements which diverge from the official zorp-gpl

    • experimental code from the developers of BalaBit

    • code, configuration and documentation provided by the community (You)

    • zorp-gpl itself

    Next Previous Contents