I set up masquerading and diald on a friend's computer recently. A little while
ago I did a netstat on a mail server that I administer, and saw a connection to
a foreign address of 192.168.0.253. This connection was from my friend's
masquerading box, and 192.168.0.253 is what I used for one of the addresses
that diald employs for the fake SLIP connection that it maintains when the PPP
connection isn't up.
So the question is: how the hell did a packet with that address get itself out
of the box? This doesn't always occur with his setup -- in fact it normally
doesn't.
His setup is pretty generic, with minimal forwarding rules -- just the default
deny policy and the rule to masquerade his 192.168.0.0 network. diald is set up
to use 192.168.0.253 and 254 for its fake SLIP connection.
The only explanation I can conceive of is that diald (or pppd) isn't setting
the local IP (which is dynamically supplied by the ISP) correctly when the
connection comes up, and that this may be a result of some confusion about the
fake SLIP addresses being in the same network as his internal class C (this is
the first time I set up diald, and this didn't occur to me at the time).
Any ideas?
Chris
---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]
For daily digest info, email [EMAIL PROTECTED]