Hinrich Eilts, Author of ipxtund, Where are You? 55
Leandro Dardini is desperately seeking Hinrich: "As consultant for a local provider, I have to present a solution for a big problem: tunnel IPX over IP to permit old application users to connect via Internet. After digging google, I found ipxtund,
written by Hinrich Eilts in 1998. It works great even after 4 years, but I have a question to the author. The author vanished. After searching again in Google, I found the last clue of Hinrich in a post on 23 Jul 1999, then nothing. I don't want to think the worst, but, Hinrich Eilts, where are you?"
He's dead Jim (Score:1, Offtopic)
Re:He's dead Jim (Score:4, Funny)
It frightens me that this comment is almost more interesting than the article. (So what happened?)
--
Evan
Re:He's dead Jim (Score:2, Funny)
Nothing too serious. Just a lot of noise. Someone's going to have to build that wall up again.
Re:He's dead Jim (Score:3, Funny)
Well, next time someone posts an Ask Slashdot wondering where Hinrich is, tell us how the rebuild went.
--
Evan
Completely offtopic (Score:1)
It takes a decent amount of force to bend that reinforcing reinforcing bar.
(It's comments like this that make me wish 'no bonus' was the default.)
/me waves (Score:2, Funny)
Hmm... (Score:2, Funny)
(kidding)
Re:Hmm... (Score:1)
And while we are at it... (Score:2)
Mainly... David Nebinger, 'Uncle George', Makoto Kato, and Thierry LeBouil.
Re:And while we are at it... (Score:2, Informative)
copyright on the pppd (not ppp) code, because
their license does not explicitly permit
modification and pppd is in danger of being removed.
Re:And while we are at it... (Score:1)
use Cisco GRE tunnels (Score:1)
Multiple solutions here (Score:3, Informative)
LSM links:
ipxtunnel [unc.edu] by Andreas Godzina, from May 2000 (free for non-commercial purposes)
ipxtund [unc.edu] by Hinrich Eilts, from August 1998 (GPL) - the one you referenced
& ipxbridge [unc.edu] by Kir Kostuchenko, from January 2000 (GPL)
And, to be sure, any IPX-compatible VPN will also solve your problem, permitting IPX traffic to traverse an IP-only link.
But if it were me, I'd go to the source. If you are using IPX, you are most likely using Novell's Netware. Any recent version (5.x, 6.0) will support IPX tunneling using CMD (Compatibility-mode) drivers. This solution has the advantage of being commercially supported (an important consideration for an ISP), relatively easy to configure, and, if you are running the appropriate version of Netware already, won't cost you anything additional.
Out of curiosity, what is the application? Doom? Not many applications (aside from old IPX-only Netware clients and compatibles such as ncpfs) require IPX exclusively.
Re:Multiple solutions here (Score:2, Informative)
Well we have the same problem at the agency I work for. We use two very old in house programs (uniscope and AREV) that tie all the client pc's to our mainframe in Austin, and it was designed stricktly for IPX. Oh, and we JUST finished upgrading all 800+ file servers from netware 3.12 to 5.1, so CMD definatly wasn't an option.
Disappearware? (Score:1)
Throwing this out as an 'Ask Slashdot' topic makes it a hard-data example that entities pushing proprietary software, i.e. Microsoft, can point to when making the case that 'you won't have anybody to call' with Free Software.
Re:Disappearware? (Score:2)
Re:Disappearware? (Score:1)
That is absolutely false. Lying is no more and no less than an attempt to control the thoughts and actions of another person by controlling the information they base their decisions on. It doesn't matter if you give false information, or you withold relevant information. If your intent is to control their actions, you are lying.
Doesn't all software end up being Disappearware? (Score:4, Insightful)
Hmmm, as far as I know Microsoft doesn't support Win95 any more. Isn't that just the way of all old software, free or non-free?
Re:Doesn't all software end up being Disappearware (Score:1)
Re:Doesn't all software end up being Disappearware (Score:1)
Re:Doesn't all software end up being Disappearware (Score:2)
Re:Disappearware? (Score:1)
Dear Slashdot, (Score:4, Funny)
Help! I've been desparately looking for this missing, uh... coder.. yeah. Her name is Anna Kournikova. I've tried contacting all of the email addresses that I've found listed but she is unreachable. If anyone could give me her current contact information, I would sure appreciate it. Thanks!
Re:Dear Slashdot, (Score:1)
Here you go
AnnaKounikova.jpg.vbs
E-Mail Address (Score:3, Informative)
Re:E-Mail Address (Score:3, Informative)
That last server apparently is non-existant now, sorry. However, this much older page [freebsd.org] from the FreeBSD mail archives lists his e-mail as eilts@iwte01.dialin.rrze.uni-erlangen.de [mailto], which suggests that he went to that university at some point in time. Perhaps you could get contact information from them?
you can use tunneled ethernet bridging too... (Score:2, Interesting)
On both sides I create bridges which enslave a physical nic, and the "virtual" tap device.
Since this is an ethernet, not an IP tunnel, it tunnels appletalk, and should tunnel IPX and other traffic too.
It can be compressed and (of course) encrypted too. Performance is very good, even for multiple tunnel, and can be tweaked according to the processor power available.
This way I have even bridged more than two geographical locations too. For instance with 3 connections 1,2,3 I had connections between 1-2, 2-3 and 3-1. But because of the bridging code Spanning Tree Protocol, those redundant connections will only buy you "backup" connections, there's still going to be two nodes that have to communicate via a third. (If you use vtun to do IP tunneling instead of ethernet tunneling, you can use proper routing of course.)
I'm very happy with vtun, it's easy and extremely versatile.
IPX over IP (Score:2, Interesting)
I like to play Red Alert 2 with my brother and a couple other friends. While it uses IP on the internet it needs IPX to run LAN games (dumb). I was thinking about IPX over IP tunnels over cable network so we can all play together every so often when we get the bug.
I dismissed the idea pretty quick at first because it was really unnecessary and silly to mess with. I later came back and thought it would be a good way to learn more about the intricacies of networking. I learned way more about networking running an Unreal Tournament server than a lot of books will teach. It's great for learning how much you can do with your bandwidth, tune for lowest latency possible, learn how the various tradeoffs affect it all, how ram/cpu affect performance, etc.
I played around with a borrowed Mac and atalkd to support the Macs at work (a few in Media Arts only). They bought new one and when 100% OS X so Appletalk went away. I still played with appletalk to my linux box for experience anyway. They got a piece of hardware that they needed but it didn't support OS X. The storage they wanted to connect to supported Appletalk but was in another subnet. The netadmin refused to add Appletalk to his routing/bridging/etc. for one machine (the network here is complex enough already). I put up a basic Linux box to connect to the storage by NFS and reshared it with atalkd on the subnet with the OS9 machine on it. I looked like a hero and this was right before reviews/raises.
I don't underestimate learning a skill even if it is just for game or hacking for hacking sake. You never know when it could help you later. At least a game/whatever is an application you can test against and have some goals
ERE I AM (Score:2)
I'm kidding, of course, but that was the first thing I thought of when I read the article.
Sorry if I spelled it wrong, it's been a long time since I last watched Brazil.
Re:ERE I AM (Score:1)
J. H."
"I always wondered if they were real!"
"...What, my ears?"
" -