> Basically you need a way of masquerading packets from your UML to look
> like they come from the host, for example using iptables, OR make the
> UML to be a real part of your network if possible.
His packets are coming back to the host, so masquerading isn't a problem:
> host# tcpdump eth0 icmp tcpdump: listening on eth0
> 10:05:28.038066 192.168.0.2 > 126.96.36.199: icmp: echo request (DF)
> 10:05:28.040853 188.8.131.52 > 192.168.0.2: icmp: echo reply (DF)
The host isn't sending them back through the tap device. Routing is OK
since the UML can ping the host. My next guess would be firewalling on
the host getting in the way.