From mboxrd@z Thu Jan 1 00:00:00 1970 From: Patrick McHardy Subject: Re: Resend [patch 2/2] iptables: add random option to SNAT Date: Mon, 12 Feb 2007 20:38:59 +0100 Message-ID: <45D0C253.5020309@trash.net> References: <1170681950.5631.4.camel@localhost.localdomain> <45C747D9.102@trash.net> <1170690933.5631.11.camel@localhost.localdomain> <45D06E3D.4070008@trash.net> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-15 Content-Transfer-Encoding: 7bit Cc: netfilter-devel@lists.netfilter.org, Pablo Neira Ayuso , Eric Leblond To: Jan Engelhardt Return-path: In-Reply-To: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: netfilter-devel-bounces@lists.netfilter.org Errors-To: netfilter-devel-bounces@lists.netfilter.org List-Id: netfilter-devel.vger.kernel.org Jan Engelhardt wrote: > On Feb 12 2007 14:40, Patrick McHardy wrote: > >>Eric Leblond wrote: >> >>>I make this choice because iptables had the capabilities to have >>>multiple NAT ranges and hence randomization has to be linked with the >>>range. >> >>Not anymore since since rustynat changes (~2.6.12). > > > So what's the proper way to do that then? There is none, nobody was using it.