Hi there
 
I have successfully managed to configure diald to work in conjunction with a 2.2.5 kernel and masqing using ipchains. In addition, I am also running squid as a caching http proxy.
I am using the tcl/tk script 'dctrl' that diald came with to monitor the status of the link. Now for my question: Is there a way to demasq ip packets that are being sent out by squid? Diald would normally demasq only packets that it can obviously recognise as not originating on localhost. I have tried the 'demasq' option in my diald.conf file, and this did not seem to help. I have even recompiled diald and changed the range on ip-numbers it would scan for demasqing all to no avail. I would not mind writing a small patch/program to do demasquerading, but I would need some pointers in the right direction for resources.
 
Rgrds
Stephan

Reply via email to