With the latest fixes to diald to get the kernel to reroute buffered
packets one can have an almost completely transparent dial on demand
solution when dynamic IP addresses are in use. Except for one thing. This
doesn't work on the local machine. Outgoing TCP connections will get the IP
address of the slip virtual device if opened before the link is up.
So thats all I want to know. When will masquerading be enabled for the
local machine? (This could possibly be done with a new special ip-chain?)
When that happens, we can claim that, for dial-on-demand and dynamic
addresses: "Our Hack is Complete".
..Brian
---
E-mail: [EMAIL PROTECTED]
Home page: http://users.lia.net/jonnes/
-
To unsubscribe from this list: send the line "unsubscribe linux-diald" in
the body of a message to [EMAIL PROTECTED]