On Tue, May 18, 1999 at 03:11:19PM +0200, Ste wrote:
> Hi,
> 
> my firewall runs diald 0.16.5 on rh 5.2; clients run dialmon.
> Sometimes diald dials again after a client disconnects and shuts down
> the browser (Netscape 4.5).

I think you can configure Netscape not to do this, but I 
can't remember how.

> I clocked debug to 1 and logged the traffic: it seems that the local IP
> address, as provided from my ISP last time the firewall connected,
> continues to send packets towards the last IP address the client visited
> before shutting down.
> Packets start from ports like 61028 or 61030 and are received on port
> 80.
> 
> What's happening ?

You have a new IP address, but the old sockets keep the old address
so the system can't close them down, because each time it sends out
a packet that packet has the old address, and each time the remote
end answers you don't get the answer packet.

RST-provoking is a hack to get around this.  If you have a 2.0 kernel
newer than 2.0.35 and some versions of 2.0.34 you can switch it on
with

echo 5 > /proc/sys/net/ipv4/ip_dynaddr

eg in /etc/rc.d/rc.local

You can find doc in /usr/src/linux/Documentation/networking/ip_dynaddr.txt

There is also a patch for 2.1/2.2.

-- 
Erik Corry [EMAIL PROTECTED]           Ceterum censeo, Microsoftem esse delendam!

-
To unsubscribe from this list: send the line "unsubscribe linux-diald" in
the body of a message to [EMAIL PROTECTED]

Reply via email to