# options to use when starting oidentd as daemon: # -m lookup masquaraded connections in /etc/oidentd_masq.users # -f forward requests for masquaraded connections to real host # -q don't log connections to oidentd # -P allow forwarded connectsions from this host. We use our own # hostname here, since connections will be forwarded from oidentd # on the vserver host. Those connections will appear to originate # from our own (and only) IP address. # see oidentd(8) for detailed list OIDENT_OPTIONS="-mf -P `hostname`" # user / group OIDENT_USER=oident OIDENT_GROUP=oident # Allow the default router to act as an oidentd proxy? (yes/no) # Since the vserver stuff messes up this autodetection, we pass in -P # above instead. OIDENT_BEHIND_PROXY=no