>Cant you get services to use cloaked keys? this way you can 'decrypt' the encrypted parts, allowing for proper functionality. This only works if the encrypted IP is actually sent; if the client's host resolves, or if the fake host is set to something else, there's no IP information to decode in the first place. --Andrew Church achurch at achurch.org http://achurch.org/