Linux-Networking Digest #279, Volume #12 Wed, 18 Aug 99 22:13:34 EDT
Contents:
Re: pppd in 'setuid-root' mode (John Hasler)
Re: Securing Linux NFS (Garrett Wollman)
Re: tn3270 questions; need help (Cokey de Percin)
Dynamic IP addressing with KDE ("Nick")
Now that I have IP Masq running.... (Eric Rouse)
Re: Linux and MSExchange Mail (sandrews)
dhcpcd and MAC address (Don Jerman)
Can't check mail on the OE or Netscape Messanger.. ([EMAIL PROTECTED])
Re: repost solution to: "why it takes 20years to telnet to RedHat Linux" (sandrews)
Artisoft AE-2 Ethernet Cards....Anyone had any luck? (Chris)
Re: C++ templates: More than Turing Complete? (David Schwartz)
Re: PPP problem (ggarside)
----------------------------------------------------------------------------
From: John Hasler <[EMAIL PROTECTED]>
Crossposted-To: comp.os.linux.misc
Subject: Re: pppd in 'setuid-root' mode
Date: Wed, 18 Aug 1999 21:57:51 GMT
Clifford Kite writes:
> Only for root or if the device file name comes from a privileged source.
As it should. Users should not be configuring network interfaces. Pppd
should not be passed any command line option other than 'call <provider>'
by users. The less said about .ppprc the better.
> Yes, they do.
Users do not have to be able to to write to the port. Pppd on Debian works
just fine without it.
--
John Hasler This posting is in the public domain.
[EMAIL PROTECTED] Do with it what you will.
Dancing Horse Hill Make money from it if you can; I don't mind.
Elmwood, Wisconsin Do not send email advertisements to this address.
------------------------------
From: [EMAIL PROTECTED] (Garrett Wollman)
Crossposted-To: comp.protocols.kerberos
Subject: Re: Securing Linux NFS
Date: 19 Aug 1999 00:52:31 GMT
In article <[EMAIL PROTECTED]>, Ken Raeburn <[EMAIL PROTECTED]> wrote:
>That still leaves open the question of what principal on the client
>side is doing the authenticating. Using a per-host principal would
>probably be easiest.
The Berkeley/Guelph NFS implementation does it per-user. Here's
the gory details from nfssvc(2):
NFSSVC(2) FreeBSD System Calls Manual NFSSVC(2)
NAME
nfssvc - NFS services
SYNOPSIS
#include <sys/param.h>
#include <sys/mount.h>
#include <sys/time.h>
#include <nfs/rpcv2.h>
#include <nfs/nfs.h>
#include <unistd.h>
int
nfssvc(int flags, void *argstructp)
DESCRIPTION
The nfssvc() function is used by the NFS daemons to pass information into
and out of the kernel and also to enter the kernel as a server daemon.
The flags argument consists of several bits that show what action is to
be taken once in the kernel and the argstructp points to one of three
structures depending on which bits are set in flags.
On the client side, nfsiod(8) calls nfssvc() with the flags argument set
to NFSSVC_BIOD and argstructp set to NULL to enter the kernel as a block
I/O server daemon. For NQNFS, mount_nfs(8) calls nfssvc() with the
NFSSVC_MNTD flag, optionally or'd with the flags NFSSVC_GOTAUTH and
NFSSVC_AUTHINFAIL along with a pointer to a
struct nfsd_cargs {
char *ncd_dirp; /* Mount dir path */
uid_t ncd_authuid; /* Effective uid */
int ncd_authtype; /* Type of authenticator */
int ncd_authlen; /* Length of authenticator string */
u_char *ncd_authstr; /* Authenticator string */
int ncd_verflen; /* and the verifier */
u_char *ncd_verfstr;
NFSKERBKEY_T ncd_key; /* Session key */
};
structure. The initial call has only the NFSSVC_MNTD flag set to specify
service for the mount point. If the mount point is using Kerberos, then
the mount_nfs(8) daemon will return from nfssvc() with errno == ENEEDAUTH
whenever the client side requires an ``rcmd'' authentication ticket for
the user. Mount_nfs(8) will attempt to get the Kerberos ticket, and if
successful will call nfssvc() with the flags NFSSVC_MNTD and
NFSSVC_GOTAUTH after filling the ticket into the ncd_authstr field and
setting the ncd_authlen and ncd_authtype fields of the nfsd_cargs struc-
ture. If mount_nfs(8) failed to get the ticket, nfssvc() will be called
with the flags NFSSVC_MNTD, NFSSVC_GOTAUTH and NFSSVC_AUTHINFAIL to de-
note a failed authentication attempt.
On the server side, nfssvc() is called with the flag NFSSVC_NFSD and a
pointer to a
struct nfsd_srvargs {
struct nfsd *nsd_nfsd; /* Pointer to in kernel nfsd struct */
uid_t nsd_uid; /* Effective uid mapped to cred */
u_long nsd_haddr; /* Ip address of client */
struct ucred nsd_cr; /* Cred. uid maps to */
int nsd_authlen; /* Length of auth string (ret) */
u_char *nsd_authstr; /* Auth string (ret) */
int nsd_verflen; /* and the verfier */
u_char *nsd_verfstr;
struct timeval nsd_timestamp; /* timestamp from verifier */
u_long nsd_ttl; /* credential ttl (sec) */
NFSKERBKEY_T nsd_key; /* Session key */
};
to enter the kernel as an nfsd(8) daemon. Whenever an nfsd(8) daemon re-
ceives a Kerberos authentication ticket, it will return from nfssvc()
with errno == ENEEDAUTH. The nfsd(8) will attempt to authenticate the
ticket and generate a set of credentials on the server for the ``user
id'' specified in the field nsd_uid. This is done by first authenticat-
ing the Kerberos ticket and then mapping the Kerberos principal to a lo-
cal name and getting a set of credentials for that user via. getpwnam(3)
and getgrouplist(3). If successful, the nfsd(8) will call nfssvc() with
the NFSSVC_NFSD and NFSSVC_AUTHIN flags set to pass the credential map-
ping in nsd_cr into the kernel to be cached on the server socket for that
client. If the authentication failed, nfsd(8) calls nfssvc() with the
flags NFSSVC_NFSD and NFSSVC_AUTHINFAIL to denote an authentication fail-
ure.
The master nfsd(8) server daemon calls nfssvc() with the flag
NFSSVC_ADDSOCK and a pointer to a
struct nfsd_args {
int sock; /* Socket to serve */
caddr_t name; /* Client address for connection based sockets */
int namelen;/* Length of name */
};
to pass a server side NFS socket into the kernel for servicing by the
nfsd(8) daemons.
RETURN VALUES
Normally nfssvc() does not return unless the server is terminated by a
signal when a value of 0 is returned. Otherwise, -1 is returned and the
global variable errno is set to specify the error.
ERRORS
[ENEEDAUTH] This special error value is really used for authentication
support, particularly Kerberos, as explained above.
[EPERM] The caller is not the super-user.
SEE ALSO
mount_nfs(8), nfsd(8), nfsiod(8)
HISTORY
The nfssvc() function first appeared in 4.4BSD.
BUGS
The nfssvc() system call is designed specifically for the NFS support
daemons and as such is specific to their requirements. It should really
return values to indicate the need for authentication support, since
ENEEDAUTH is not really an error. Several fields of the argument struc-
tures are assumed to be valid and sometimes to be unchanged from a previ-
ous call, such that nfssvc() must be used with extreme care.
BSD June 9, 1993 2
--
Garrett A. Wollman | O Siem / We are all family / O Siem / We're all the same
[EMAIL PROTECTED] | O Siem / The fires of freedom
Opinions not those of| Dance in the burning flame
MIT, LCS, CRS, or NSA| - Susan Aglukark and Chad Irschick
------------------------------
From: Cokey de Percin <[EMAIL PROTECTED]>
Crossposted-To: comp.unix.aix,comp.os.linux.misc
Subject: Re: tn3270 questions; need help
Date: Thu, 19 Aug 1999 01:36:12 +0000
Raymonds Doetjes wrote:
>
> What kinda terminal srever do you have?
>
> Raymond
>
> "J. Otto Tennant" wrote:
>
> > This is a question about tn3270 in general, not about the particular
> > operating system it is running on.
> >
> > There is a central computer and several remote terminals. (They
> > happen to be IBM 3101s, but they could be anything, even an ADM-3a.)
> > The remote terminals are connected to a "terminal server" which
> > has an IP address (192.168.10.2, just to be definite.) The several
> > remote terminals respond to ports 2000, 2001, 2002, and so on as
> > telnet sessions.
> >
> > When I boot up the central computer, I want to treat these remote
> > terminals as 3270s and splash a legacy logon screen to them.
> >
I don't believe you really want to treat the remote terminals as 3270s.
A 3270 is a rather special breed of terminal and is only used to access
IBM OS/MVS or AS/400 (or similar) machines, usually EBCDIC - NOT ascii
based machines.
I haven't worked with terminal servers, but I would suspect that there
is a way to display a login banner. How this is done might vary between
terminal servers.
> > I also need to hook them up to a daemon which receives requests,
> > processes them, and responds to them.
AFAIK, there should be a piece of software that talks to the terminal
server and runs on your central machine that does this. This is similar
to getty running on a machine and talking to one port on a multiport
serial board only in this case the board itself in remote and connected
by an ip network.
> >
> > I have exhausted my knowledge of networking, although I'm fairly
> > certain the solution must be straightforward.
> >
> > In principle, if I could write:
> >
> > tn3270 host port <192.168.10.2:2000 >192.168.10.2:2000
> >
> > it would work like magic (I think).
I don't believe that that will work. Tn3270 is special type of terminal
emulator, and will not connect/talk to a terminal server in the way you're
trying to do.
> >
> > What I need to do is associate a pty with the remote IP/port.
> >
> > (The terminal server also provides ports 3000, 3001, etc. which
> > are more "raw" than a telnet port, but I've forgotten the name
> > of the service.)
> >
> > I'm not certain I have explained the problem well enough for
> > anyone to comment.
> >
> > --
> > J.Otto Tennant [EMAIL PROTECTED]
> > Forsan et haec olim meminisse juvabit.
> > Charter Member of the Vast Right Wing Conspiracy
Best
Cokey
--
==================================================================
Cokey de Percin, DBA Email:
Policy Management Systems Corp. Work - [EMAIL PROTECTED]
Columbia, South Carolina Home - [EMAIL PROTECTED]
------------------------------
From: "Nick" <[EMAIL PROTECTED]>
Subject: Dynamic IP addressing with KDE
Date: Wed, 18 Aug 1999 18:31:37 -0700
I was wondering if anyone could help a new person configure a Dynamically
Allocating IP client so that I can dial my ISP under Linux. I am running
SuSE Linux 6.1 which has KDE 1.1 and Gnome 1.0. Any help is appreciated.
Thank you.
Nick
------------------------------
From: [EMAIL PROTECTED] (Eric Rouse)
Subject: Now that I have IP Masq running....
Date: Thu, 19 Aug 1999 01:34:17 GMT
I tried to connect to the gateway machine via telnet... I was
presented with the login screen as I expected but the system wouldn't
let me log in... I didn't change anything other then the settings in
the How-To I was following.
Any thoughts?
Regards,
Eric
------------------------------
From: sandrews <[EMAIL PROTECTED]>
Subject: Re: Linux and MSExchange Mail
Date: Wed, 18 Aug 1999 21:34:35 -0400
On Wed, 18 Aug 1999, [EMAIL PROTECTED] wrote:
>i was wondering if there were any packages which would allow me to
>receive our internal e-mail which is handled by Exchange server. I can
>receive internet mail, however. Any help would be appreciated.
>
>
>Sent via Deja.com http://www.deja.com/
>Share what you know. Learn what you don't.
It may not be YOUR problem......................
Try to telnet into the exchange server on port 25 (SMTP) and port 110 (POP3).
If you can't it's not your problem it's your administrators problem. I have
had the same problem as you but in my case I have to try to get our brain dead
MS admin's to look into the problem ( Yes it's a bitch, they don't understand
shit). If both ports are open then you can use any standard email client.
------------------------------
From: Don Jerman <[EMAIL PROTECTED]>
Subject: dhcpcd and MAC address
Date: Wed, 18 Aug 1999 21:14:36 -0400
Can anyone help me get my DHCP client to use a spoofed MAC address to
talk to the server? I'm lazy and I want to be able to use the same
network link with more than one machine by un-plugging (as well as
building a masquerading set-up, but let's solve this first).
Ok, I have figured out the hardware problem (I think) and got my d-link
530TX+ recognized by the system (TX-errors == 0 now, and on boot it
finds the right MAC address). In the meantime I got my DSL provider to
configure their DHCP server to talk to my laptop's ethercard (which does
not respond to attempts to change its MAC address). I've use ifconfig
eth0 hw ether xxxxxxxxxxxxxxx to reconfigure my big box's address, but I
get no response from the server (although ifconfig reports packets sent
and received). pump and dhcpcd both report no answer to the
DHCP_DISCOVER message and time out. The card is working now under
Win98 with the reconfigured MAC address. (yes, I had to install the
virus to get them to install the ADSL, and no, they won't help me with
Linux).
Do these programs do something evil with ioctl() that's getting around
whatever ifconfig is doing? I did read the source, but I'm not sure
where that business is going on yet... I did try dhcpcd -I xxxxxxxxxxxx
-h djerman -d to test and got the same answer.
(I was on call tonight and I couldn't afford 20 minutes on hold to the
ISP -- I'll test with the real MAC address and set up the hub to test
the cards tomorrow).
Thanks!
-d
------------------------------
From: [EMAIL PROTECTED]
Subject: Can't check mail on the OE or Netscape Messanger..
Date: Thu, 19 Aug 1999 01:00:10 GMT
I'm using qpopper ver. 2.53 on the Redhat Linux 5.0.
And it compiled not support shadow passwd.
(My linuxbox doesn't using shadow passwd)
And i can see it work well with
# telnet localhost 110
user
pass
But I can't check my mailbox on the OE or Netscape Messanger.
It always give me "The passwd you given is wrong..."
What makes me embrassed is this problem applied all the E-mail IDs.
Only some ID does.
Help me....
Sent via Deja.com http://www.deja.com/
Share what you know. Learn what you don't.
------------------------------
From: sandrews <[EMAIL PROTECTED]>
Subject: Re: repost solution to: "why it takes 20years to telnet to RedHat Linux"
Date: Wed, 18 Aug 1999 21:41:35 -0400
On Wed, 18 Aug 1999, Lindoze 2000 wrote:
>can someone please repost the solution to why it takes 2minutes to
>telnet to
>RedHat dist.?
>
>--
>Thank you for your valuable input. Your useful answers will benifit
>other users as well.
>You are Linux!
>
>
>
Fix your DNS or your resolver order. It's probly looking for DNS then hosts in
the hosts config file. What is happening is telnet waits for the DNS to time
out and then goes to the host file where it most likely finds the IP it's
looking for.
------------------------------
From: [EMAIL PROTECTED] (Chris)
Subject: Artisoft AE-2 Ethernet Cards....Anyone had any luck?
Date: Thu, 19 Aug 1999 01:00:52 GMT
I just got 2 Artisoft AE2 ethernet cards from a guy I work
with. Currently they are not on the supported list but I am wondering
if anyone else out there has found a compatible module for this card.
Any help is appreciated.
Thx, Chris
------------------------------
From: David Schwartz <[EMAIL PROTECTED]>
Crossposted-To: comp.os.linux.development.apps,comp.os.linux.development.system
Subject: Re: C++ templates: More than Turing Complete?
Date: Wed, 18 Aug 1999 18:01:19 -0700
> In fact, given any script which terminates (in any scripting language)
> it should be at least *possible* to produce an equivalent assembly
> program (or equivalent C program or whatever) of finite length and
> complexity, should it not?
This question only seems interesting because you are not being precise
in your use of the word 'equivalent'.
DS
------------------------------
From: ggarside <[EMAIL PROTECTED]>
Subject: Re: PPP problem
Date: Thu, 19 Aug 1999 01:09:15 GMT
Hmmm, I don't use RedHat (I use Slackware) so I may be all wet......
I don't like the look of the two default routes in your routing table
(0.0.0.0 in the destination column). Take a look in your boot files (in Slackware
they're things like /etc/rc.d/rc.inet1) and see if the default setup inserts a
default route. It'll likely be to your localnet (the 192.168.1.254).
On Slackware it looks like this:
/sbin/route add default gw ${GATEWAY} netmask 0.0.0.0 metric 1
If so, comment this out, so your routing table has no default before establishing the
ppp link. Make sure that you have the defaultroute option included for the ppp
scheme. Then, when you negotiate your ip address from the ISP, you should also find
just one default route gets put in the table, and things should work 8-)
HTH,
Geoff.
[EMAIL PROTECTED] wrote:
> Hi,
>
> I am a little new to the Linux world and would like some help on getting
> my ppp working. I installed RH6.0 a few days ago and have still not been
> successful with ppp.
>
> When I execute the ppp and chat scripts (copied and changed from
> /usr/doc), the modem dials out and I get an IP address allocated to my
> machine, but I am not able to ping anyplace except the IP address I am
> assigned. I have checked /etc/resolv.conf for an erroneous entry, and to
> me it looks ok. It doesn't matter if I use an IP address or a domain
> name in the ping. There is still no response.
>
> Entries in my log:
>
> Aug 18 15:13:51 zeus kernel: CSLIP: code copyright 1989 Regents of the
> University of California
> Aug 18 15:13:51 zeus kernel: PPP: version 2.3.3 (demand dialling)
> Aug 18 15:13:51 zeus kernel: PPP line discipline registered.
> Aug 18 15:13:51 zeus kernel: registered device ppp0
> Aug 18 15:13:51 zeus pppd[1631]: pppd 2.3.7 started by root, uid 0
> Aug 18 15:13:52 zeus chat[1632]: timeout set to 3 seconds
> Aug 18 15:13:52 zeus chat[1632]: abort on (\nBUSY\r)
> Aug 18 15:13:52 zeus chat[1632]: abort on (\nNO ANSWER\r)
> Aug 18 15:13:52 zeus chat[1632]: abort on (\nRINGING\r\n\r\nRINGING\r)
> Aug 18 15:13:52 zeus chat[1632]: send (rAT^M)
> Aug 18 15:13:52 zeus chat[1632]: expect (OK)
> Aug 18 15:13:52 zeus chat[1632]: rAT^M^M
> Aug 18 15:13:52 zeus chat[1632]: OK
> Aug 18 15:13:52 zeus chat[1632]: -- got it
> Aug 18 15:13:52 zeus chat[1632]: send (ATH0^M)
> Aug 18 15:13:52 zeus chat[1632]: timeout set to 30 seconds
> Aug 18 15:13:52 zeus chat[1632]: expect (OK)
> Aug 18 15:13:52 zeus chat[1632]: ^M
> Aug 18 15:13:53 zeus chat[1632]: ATH0^M^M
> Aug 18 15:13:53 zeus chat[1632]: OK
> Aug 18 15:13:53 zeus chat[1632]: -- got it
> Aug 18 15:13:53 zeus chat[1632]: send (ATDT594-9858^M)
> Aug 18 15:13:53 zeus chat[1632]: expect (CONNECT)
> Aug 18 15:13:53 zeus chat[1632]: ^M
> Aug 18 15:14:09 zeus chat[1632]: ATDT594-9858^M^M
> Aug 18 15:14:09 zeus chat[1632]: CONNECT
> Aug 18 15:14:09 zeus chat[1632]: -- got it
> Aug 18 15:14:09 zeus chat[1632]: send (^M)
> Aug 18 15:14:09 zeus chat[1632]: expect (sername:)
> Aug 18 15:14:09 zeus chat[1632]: 14400/ARQ/V32/LAPM/V42BIS^M
> Aug 18 15:14:10 zeus chat[1632]: ^M
> Aug 18 15:14:10 zeus chat[1632]: Annex Command Line Interpreter *
> Copyright 1991 Xylogics, Inc.^M
> Aug 18 15:14:10 zeus chat[1632]: ^M
> Aug 18 15:14:10 zeus chat[1632]: Checking authorization, Please
> wait...^M
> Aug 18 15:14:10 zeus chat[1632]: username:
> Aug 18 15:14:10 zeus chat[1632]: -- got it
> Aug 18 15:14:10 zeus chat[1632]: send (my_userid^M)
> Aug 18 15:14:11 zeus chat[1632]: expect (assword:)
> Aug 18 15:14:11 zeus chat[1632]: my_userid^M
> Aug 18 15:14:11 zeus chat[1632]: password:
> Aug 18 15:14:11 zeus chat[1632]: -- got it
> Aug 18 15:14:11 zeus chat[1632]: send (my_password^M)
> Aug 18 15:14:11 zeus chat[1632]: expect (nnex:)
> Aug 18 15:14:11 zeus chat[1632]: ^M
> Aug 18 15:14:11 zeus chat[1632]: ^M
> Aug 18 15:14:11 zeus chat[1632]: Permission granted; Type telnet or ppp
> for network connection^M
> Aug 18 15:14:11 zeus chat[1632]:
> -------------------------------------------------------------------------------^M
>
> Aug 18 15:14:11 zeus chat[1632]:
> Aug 18 15:14:11 zeus chat[1632]: To start ppp connection type ppp at the
> annex prompt after logging in.^M
> Aug 18 15:14:11 zeus chat[1632]: ^Iannex:
> Aug 18 15:14:11 zeus chat[1632]: -- got it
> Aug 18 15:14:11 zeus chat[1632]: send (ppp^M)
> Aug 18 15:14:11 zeus pppd[1631]: Serial connection established.
> Aug 18 15:14:11 zeus pppd[1631]: Using interface ppp0
> Aug 18 15:14:11 zeus pppd[1631]: Connect: ppp0 <--> /dev/ttyS1
> Aug 18 15:14:13 zeus kernel: PPP BSD Compression module registered
> Aug 18 15:14:13 zeus kernel: PPP Deflate Compression module registered
> Aug 18 15:14:16 zeus pppd[1631]: local IP address 128.198.66.19
> Aug 18 15:14:16 zeus pppd[1631]: remote IP address 128.198.66.66
>
> Output of my netstat -rn is as follows:
>
> Kernel IP routing table
> Destination Gateway Genmask Flags MSS Window irtt
> Iface
> 192.168.1.1 0.0.0.0 255.255.255.255 UH 0 0 0
> eth0
> 128.198.66.66 0.0.0.0 255.255.255.255 UH 0 0 0
> ppp0
> 192.168.1.0 192.168.1.1 255.255.255.0 UG 0 0 0
> eth0
> 192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0
> eth0
> 127.0.0.0 0.0.0.0 255.0.0.0 U 0 0 0
> lo
> 0.0.0.0 128.198.66.66 0.0.0.0 UG 0 0 0
> ppp0
> 0.0.0.0 192.168.1.254 0.0.0.0 UG 0 0 0
> eth0
>
> Output of ifconfig is as follows:
>
> eth0 Link encap:Ethernet HWaddr 00:00:21:62:61:8D
> inet addr:192.168.1.1 Bcast:192.168.1.255 Mask:255.255.255.0
>
> UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
> RX packets:0 errors:0 dropped:0 overruns:0 frame:0
> TX packets:514 errors:0 dropped:0 overruns:0 carrier:0
> collisions:0 txqueuelen:100
> Interrupt:12 Base address:0x280
>
> lo Link encap:Local Loopback
> inet addr:127.0.0.1 Mask:255.0.0.0
> UP LOOPBACK RUNNING MTU:3924 Metric:1
> RX packets:275 errors:0 dropped:0 overruns:0 frame:0
> TX packets:275 errors:0 dropped:0 overruns:0 carrier:0
> collisions:0 txqueuelen:0
>
> ppp0 Link encap:Point-to-Point Protocol
> inet addr:128.198.66.19 P-t-P:128.198.66.66
> Mask:255.255.255.255
> UP POINTOPOINT RUNNING NOARP MULTICAST MTU:1500 Metric:1
> RX packets:6 errors:0 dropped:0 overruns:0 frame:0
> TX packets:6 errors:0 dropped:0 overruns:0 carrier:0
> collisions:0 txqueuelen:10
>
> I have been looking for ideas in this newsgroup and have looked at the
> PPP-HOWTO as well. I don't know what I am missing. I am very thankful
> for any help offered.
>
> Thanks,
> Krishna.
------------------------------
** FOR YOUR REFERENCE **
The service address, to which questions about the list itself and requests
to be added to or deleted from it should be directed, is:
Internet: [EMAIL PROTECTED]
You can send mail to the entire list (and comp.os.linux.networking) via:
Internet: [EMAIL PROTECTED]
Linux may be obtained via one of these FTP sites:
ftp.funet.fi pub/Linux
tsx-11.mit.edu pub/linux
sunsite.unc.edu pub/Linux
End of Linux-Networking Digest
******************************