Hi, I was bored (insomnia actually) so I decided to sit down and figure out how to hack dpkg-ftp to run over the TIS-FWTK FTP proxy we have here.
The chat for the firewall looks like user <Firewall User> pass <Firewall Pass> user <targ user>@<targ host> pass <targ pass> <connected..> It's an authenticated [EMAIL PROTECTED] type firewall. I know a few other ppl on the list are behind such a beast. The trick to allow dselect to run is amazingly simple, in /usr/lib/dpkg/methods/ftp edit the files install, setup and update. In each of the three files look for the line if(!$ftp->login($::username, $pass)) { print $ftp->message() Directly after that place these two lines: $ftp->_USER("[EMAIL PROTECTED]"); $ftp->_PASS("[EMAIL PROTECTED]"); Replace with the ftp server you wish to use and your email addy. Go into dselect and configure the ftp method. Set the server to be your firewall address and user + pass to be your firewall authentication. Be sure to disable passive support (n) Plug in the proper info for the rest and tada, dpkg over an evil sort of firewall. Oh, if you happen to be behind a simpler [EMAIL PROTECTED] firewall without authentication then you can bypass it transparently by setting the environment variable FTP_FIREWALL to the address of your firewall, set dpkg-ftp as if you don't have a firewall. Hopefully g'night, Jason -- TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word "unsubscribe" to [EMAIL PROTECTED] . Trouble? e-mail to [EMAIL PROTECTED] .