Re: [PATCH] Runtime interception method switch

To: LVS Devel <lvs-devel@xxxxxxxxxxxxxxx>
Subject: Re: [PATCH] Runtime interception method switch
From: Joseph Mack NA3T <jmack@xxxxxxxx>
Date: Mon, 14 Jan 2008 01:42:00 -0800 (PST)
On Mon, 14 Jan 2008, Raphael Vallazza wrote:

I think this has nothing to with the input method,

I'd assumed that it would be fixed by hooking the FORWARD chain because then the packets wouldn't bypass netfilter.

it's more a problem of the *xmit* function. Packets for realservers don't seem to flow through the SNAT chain, this way it's not possible to change the source IP.


This could probably be implemented either by letting the packets flow through the iptables/SNAT (it seems that the patch on does this),

can this be put into the standard ipvs?

or to implement SNAT in the IPVS/NAT method.

can you do either of these?

Thanks Joe

Joseph Mack NA3T EME(B,D), FM05lw North Carolina
jmack (at) wm7d (dot) net - azimuthal equidistant map
generator at
Homepage It's GNU/Linux!
To unsubscribe from this list: send the line "unsubscribe lvs-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at

<Prev in Thread] Current Thread [Next in Thread>