On Saturday 02 November 2002 14:41, Pekka Savola wrote:
> > Does this incremental patch fix that?
>
> Unfortunately not .. 0.0.0.0 will be used as the source address instead.

Does this base patch do the trick then?

cheers,
Bart

--- linux-2.4.19/net/ipv4/netfilter/ipt_REJECT.c.old2   Sat Nov  2 15:29:40 2002
+++ linux-2.4.19/net/ipv4/netfilter/ipt_REJECT.c        Sat Nov  2 15:57:45 2002
@@ -72,6 +72,8 @@
        nf_conntrack_put(nskb->nfct);
        nskb->nfct = NULL;
        nskb->nfcache = 0;
+       nskb->physindev = NULL;
+       nskb->physoutdev = NULL;
 #ifdef CONFIG_NETFILTER_DEBUG
        nskb->nf_debug = 0;
 #endif
@@ -209,6 +211,8 @@
        if (ip_route_output(&rt, iph->saddr, saddr, RT_TOS(tos), 0))
                return;
 
+       saddr = iph->daddr;
+
        /* RFC says return as much as we can without exceeding 576 bytes. */
        length = skb_in->len + sizeof(struct iphdr) + sizeof(struct icmphdr);
 
@@ -243,7 +247,7 @@
        iph->ttl = MAXTTL;
        ip_select_ident(iph, &rt->u.dst, NULL);
        iph->protocol=IPPROTO_ICMP;
-       iph->saddr=rt->rt_src;
+       iph->saddr=saddr;
        iph->daddr=rt->rt_dst;
        iph->check=0;
        iph->check = ip_fast_csum((unsigned char *)iph, iph->ihl);

_______________________________________________
Bridge mailing list
[EMAIL PROTECTED]
http://www.math.leidenuniv.nl/mailman/listinfo/bridge

Reply via email to