>> -A POSTROUTING -s 192.168.0.64/26 -o eth1 -m multiport -p udp --dport 53,123 
>> -j MASQUERADE
>> -A POSTROUTING -s 192.168.0.64/26 -o eth1 -m multiport -p tcp --dport 
>> 22,80,119,443 -j MASQUERADE

> This config allows packets with private addresses to escape to eth1. Fix it.

Granted.  However, please note the rule immediately before the two you
quoted and the source address of the packets in the tcpdump output.

I did not do more fact-gathering because I had to get my immediate
problem solved right away.  Other hosts on the network had the same
problem described in the upstream thread.  Rebooting the 3.0 kernel
solved the problem temporarily, and reverting to 2.6.39 stopped it
completely.

Someone else in the upstream thread with the same problem has since
reported that it's fixed with the mentioned patches.  I'm new to
this--am I correct in assuming that that means the fix in the kernel
that ships with Debian will come from upstream eventually?

-- 
Troy


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/capwawvidgbz18qnrypkzbwe8wxbuessxtfrxxzhspj17gcg...@mail.gmail.com

Reply via email to