josiah wrote:

> I put these in my diald filter file and it works great- i don't think
> that udp is needed though?
> 
> accept tcp 200 tcp.dest=tcp.ssh
> accept tcp 200 tcp.source=tcp.ssh
> 
> accept udp 200 udp.dest=udp.ssh
> accept udp 200 udp.source=udp.ssh

OK, that works for me, too.

Problem is, 200sec is too short (I want to be able to go away for a
time from my ssh connection (without doing something funny like having
something on the remote side constantly sending my data to keep the 
line up), for example to read news articles etc. without fear that
diald will cut the link because the 200sec expired.

Right now, I set the timeout to 600sec.

But the problem is that after I close the ssh link, this timeout is
not shortened to 5sec by the !tcp.live rule, as I would expect. I
already tried putting the ssh accept rules before and after the
!tcp.live stuff, but to no avail. I still end up with a link staying
up for 600sec *after* I have closed the ssh link.

Does this shortening of the ssh timeout for closed connections work
for you, or are you, too, stuck with the regular 200sec timeout af-
ter you have closed the connection?

Of course, this is not a grave problem, because I can always manually 
shut down the link, thereby flushing the queue, and then switch to 
demand dialling again, but as I'm using ssh so often to remotely ad-
minister another machine, it gets a little annoying over time.

I'm a little short on spare time at the moment, but next thing I will
try is commenting out the line which makes diald ignore any packet 
shorter than 40bytes. It might well be that this is what keeps diald
from seeing the keepup messages.

I'll keep you posted on my success ...

Greetings,

        -Chris

-- 
---------------------------------------------------------------------
   Christian Hamacher    |   phone: +49-241-80 7912   |  So I cheered 
 Communication Networks  |   fax : +49-241-8888 242   |  up, and sure 
University of Technology | [EMAIL PROTECTED] | enough, things
    Aachen, Germany      |                            |  got worse ...
             WWW: http://www.comnets.rwth-aachen.de/~ham
   PGP-fingerprint: 85 04 81 E2 8D BC B3 E1 06 7D 1C 45 25 28 6C B6
        public key available at keyserver or from my homepage

-
To unsubscribe from this list: send the line "unsubscribe linux-diald" in
the body of a message to [EMAIL PROTECTED]

Reply via email to