Hi to all. A simple question. I imagine that de - masquerading packets pertaining to a masquerade connection, for instance for ppp0 interface are registered in NF_INET_PRE_ROUTING hook with priority NF_IP_PRI_NAT_DST (*) Is that right? Placing a network traffic analyzer (wireshark) listening to ppp0 i see de masq packets coming back with ppp0's network address. Writing a simple module that hooks as above and changes DST address makes the traffic analyzer show reply packets (de masqueraded) with their new address already set... For this I am asking whether the assumptions in (*) are correct. Thanks -- Giacomo S. http://www.giacomos.it - - - - - - - - - - - - - - - - - - - - - - * Aprile 2008: iqfire-wall, un progetto open source che implementa un filtro di pacchetti di rete per Linux, e` disponibile per il download qui: http://sourceforge.net/projects/ipfire-wall * Informazioni e pagina web ufficiale: http://www.giacomos.it/iqfire/index.html - - - - - - - - - - - - - - - - - - - - - - . '' `. : :' : `. ` ' `- Debian GNU/Linux -- The power of freedom http://www.debian.org -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html