Re: [PATCH] Runtime interception method switch

To: Joseph Mack NA3T <jmack@xxxxxxxx>
Subject: Re: [PATCH] Runtime interception method switch
Cc: LVS Devel <lvs-devel@xxxxxxxxxxxxxxx>
From: Simon Horman <horms@xxxxxxxxxxxx>
Date: Tue, 15 Jan 2008 17:25:53 +0900
On Mon, Jan 14, 2008 at 01:42:00AM -0800, Joseph Mack NA3T wrote:
> On Mon, 14 Jan 2008, Raphael Vallazza wrote:
>> I think this has nothing to with the input method,
> I'd assumed that it would be fixed by hooking the FORWARD chain because 
> then the packets wouldn't bypass netfilter.
>> it's more a problem of the *xmit* function. Packets for realservers 
>> don't seem to flow through the SNAT chain, this way it's not possible 
>> to change the source IP.
> OK
>> This could probably be implemented either by letting the packets flow 
>> through the iptables/SNAT (it seems that the patch on  
>> does this),
> can this be put into the standard ipvs?

In principle yes, though I am a bit wary about what
side-effects it might have.

>> or to implement SNAT in the IPVS/NAT method.
> can you do either of these?


To unsubscribe from this list: send the line "unsubscribe lvs-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at

<Prev in Thread] Current Thread [Next in Thread>