So now I'm getting confused. I'm pretty sure that if I want to use a working h323 implementation, then I need the CVS. So I grabbed it both with the snapshot and with the cvs command and tried to compile it. However I got the following:
[root@blue iptables]# make patch-o-matic make: *** No rule to make target `extensions/libip6t_eui64.c', needed by `extensions/libip6t_eui64.d'. Stop. I've looked all in the cvs, and even went back a couple days worth of snapshots and still can't find a libipt_eui64.c. Does anyone know bout this? Also, some people tell me I need to do a make patch-pending, and then a make patch-o-matic. Some say just patch-o-matic. Which is it? The only thing I need is simple SNAT, DNAT, ftp conn track, irc conntrack, and h323 conntrac (although I'd like to try out some of the others). Thanks guyz. -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of Patrick Schaaf Sent: Saturday, March 23, 2002 1:02 AM To: Glover George Cc: [EMAIL PROTECTED] Subject: Re: NewNat Patch help On Fri, Mar 22, 2002 at 10:19:06PM -0600, Glover George wrote: > Hi. I'm new to actually using the iptables source, and was wondering if > someone can give me some general tips at attempting this newnat patch. > I simply want to try out the h.323 stuff in newnat. I've been watching > the list and I see that for it to work, all submitted patches must be > applied first. Is this doing "make pending-patches" or "make > patch-o-matic"? It is "make pending-patches". Look at the names of the patches presented when you do that; they will start with either 'submitted/' or 'pending/'. You need all the submitted, and 0-newnat13 from pending. If you successfully do that, try whether you can compile the kernel. If all goes well, and you are still missing some modules, also do 'make patch-o-matic' and see whether you want something from the really optional parts. BTW, to adventurous persons, 0-newnat13 does not apply cleanly to the current 2.4.19-pre4. There is one reject in net/ipv4/netfilter/Makefile, due to the recent addition of arp_tables.o to export-objs. Easily done by hand, but as I've done that yesterday, find below the "resulting" Makefile. good luck Patrick # # Makefile for the netfilter modules on top of IPv4. # # Note! Dependencies are done automagically by 'make dep', which also # removes any old dependencies. DON'T put your own dependencies here # unless it's something special (ie not a .c file). # # Note 2! The CFLAGS definition is now in the main makefile... O_TARGET := netfilter.o export-objs = ip_conntrack_standalone.o ip_fw_compat.o ip_nat_standalone.o ip_tables.o arp_tables.o # Multipart objects. list-multi := ip_conntrack.o iptable_nat.o ipfwadm.o ipchains.o # objects for the conntrack and NAT core (used by standalone and backw. compat) ip_nf_conntrack-objs := ip_conntrack_core.o ip_conntrack_proto_generic.o ip_conntrack_proto_tcp.o ip_conntrack_proto_udp.o ip_conntrack_proto_icmp.o ip_nf_nat-objs := ip_nat_core.o ip_nat_helper.o ip_nat_proto_unknown.o ip_nat_proto_tcp.o ip_nat_proto_udp.o ip_nat_proto_icmp.o # objects for the standalone - connection tracking / NAT ip_conntrack-objs := ip_conntrack_standalone.o $(ip_nf_conntrack-objs) iptable_nat-objs := ip_nat_standalone.o ip_nat_rule.o $(ip_nf_nat-objs) # objects for backwards compatibility mode ip_nf_compat-objs := ip_fw_compat.o ip_fw_compat_redir.o ip_fw_compat_masq.o $(ip_nf_conntrack-objs) $(ip_nf_nat-objs) ipfwadm-objs := $(ip_nf_compat-objs) ipfwadm_core.o ipchains-objs := $(ip_nf_compat-objs) ipchains_core.o # connection tracking obj-$(CONFIG_IP_NF_CONNTRACK) += ip_conntrack.o # connection tracking helpers obj-$(CONFIG_IP_NF_FTP) += ip_conntrack_ftp.o ifdef CONFIG_IP_NF_NAT_FTP export-objs += ip_conntrack_ftp.o endif obj-$(CONFIG_IP_NF_IRC) += ip_conntrack_irc.o ifdef CONFIG_IP_NF_NAT_IRC export-objs += ip_conntrack_irc.o endif # NAT helpers obj-$(CONFIG_IP_NF_NAT_FTP) += ip_nat_ftp.o obj-$(CONFIG_IP_NF_NAT_IRC) += ip_nat_irc.o # generic IP tables obj-$(CONFIG_IP_NF_IPTABLES) += ip_tables.o # the three instances of ip_tables obj-$(CONFIG_IP_NF_FILTER) += iptable_filter.o obj-$(CONFIG_IP_NF_MANGLE) += iptable_mangle.o obj-$(CONFIG_IP_NF_NAT) += iptable_nat.o # matches obj-$(CONFIG_IP_NF_MATCH_LIMIT) += ipt_limit.o obj-$(CONFIG_IP_NF_MATCH_MARK) += ipt_mark.o obj-$(CONFIG_IP_NF_MATCH_MAC) += ipt_mac.o obj-$(CONFIG_IP_NF_MATCH_PKTTYPE) += ipt_pkttype.o obj-$(CONFIG_IP_NF_MATCH_MULTIPORT) += ipt_multiport.o obj-$(CONFIG_IP_NF_MATCH_OWNER) += ipt_owner.o obj-$(CONFIG_IP_NF_MATCH_TOS) += ipt_tos.o obj-$(CONFIG_IP_NF_MATCH_AH_ESP) += ipt_ah.o ipt_esp.o obj-$(CONFIG_IP_NF_MATCH_LENGTH) += ipt_length.o obj-$(CONFIG_IP_NF_MATCH_TTL) += ipt_ttl.o obj-$(CONFIG_IP_NF_MATCH_STATE) += ipt_state.o obj-$(CONFIG_IP_NF_MATCH_CONNTRACK) += ipt_conntrack.o obj-$(CONFIG_IP_NF_MATCH_UNCLEAN) += ipt_unclean.o obj-$(CONFIG_IP_NF_MATCH_TCPMSS) += ipt_tcpmss.o # targets obj-$(CONFIG_IP_NF_TARGET_REJECT) += ipt_REJECT.o obj-$(CONFIG_IP_NF_TARGET_MIRROR) += ipt_MIRROR.o obj-$(CONFIG_IP_NF_TARGET_TOS) += ipt_TOS.o obj-$(CONFIG_IP_NF_TARGET_DSCP) += ipt_DSCP.o obj-$(CONFIG_IP_NF_TARGET_MARK) += ipt_MARK.o obj-$(CONFIG_IP_NF_TARGET_MASQUERADE) += ipt_MASQUERADE.o obj-$(CONFIG_IP_NF_TARGET_REDIRECT) += ipt_REDIRECT.o obj-$(CONFIG_IP_NF_NAT_SNMP_BASIC) += ip_nat_snmp_basic.o obj-$(CONFIG_IP_NF_TARGET_LOG) += ipt_LOG.o obj-$(CONFIG_IP_NF_TARGET_ULOG) += ipt_ULOG.o obj-$(CONFIG_IP_NF_TARGET_TCPMSS) += ipt_TCPMSS.o # generic ARP tables obj-$(CONFIG_IP_NF_ARPTABLES) += arp_tables.o # just filtering instance of ARP tables for now obj-$(CONFIG_IP_NF_ARPFILTER) += arptable_filter.o # backwards compatibility obj-$(CONFIG_IP_NF_COMPAT_IPCHAINS) += ipchains.o obj-$(CONFIG_IP_NF_COMPAT_IPFWADM) += ipfwadm.o obj-$(CONFIG_IP_NF_QUEUE) += ip_queue.o include $(TOPDIR)/Rules.make ip_conntrack.o: $(ip_conntrack-objs) $(LD) -r -o $@ $(ip_conntrack-objs) iptable_nat.o: $(iptable_nat-objs) $(LD) -r -o $@ $(iptable_nat-objs) ipfwadm.o: $(ipfwadm-objs) $(LD) -r -o $@ $(ipfwadm-objs) ipchains.o: $(ipchains-objs) $(LD) -r -o $@ $(ipchains-objs)
