'Twas brillig, and Kevin Fox at 14/01/10 00:43 did gyre and gimble: > devices", why not "Poke hole in local firewall"? Is there a standard way to do this? I guess running ip[6]tables directly would work if you had root permissions.... is there some kind of framework (via presumably policykit) to achieve this? Col -- Colin Guthrie gmane(at)colin.guthr.ie http://colin.guthr.ie/ Day Job: Tribalogic Limited [http://www.tribalogic.net/] Open Source: Mandriva Linux Contributor [http://www.mandriva.com/] PulseAudio Hacker [http://www.pulseaudio.org/] Trac Hacker [http://trac.edgewall.org/]