bugzilla-daemon at bugzilla.netfilter.org
2012-Nov-17 00:46 UTC
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.] You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require attention. All of these bugs are in the NEW or REOPENED state, and have not been touched in 7 days or more. You need to take a look at them, and decide on an initial action. Generally, this means one of three things: (1) You decide this bug is really quick to deal with (like, it's INVALID), and so you get rid of it immediately. (2) You decide the bug doesn't belong to you, and you reassign it to someone else. (Hint: if you don't know who to reassign it to, make sure that the Component field seems reasonable, and then use the "Reset Assignee to default" option.) (3) You decide the bug belongs to you, but you can't solve it this moment. Accept the bug by setting the status to ASSIGNED. To get a list of all NEW/REOPENED bugs, you can use this URL (bookmark it if you like!): http://bugzilla.netfilter.org/buglist.cgi?bug_status=NEW&bug_status=REOPENED&assigned_to=netfilter-buglog at lists.netfilter.org Or, you can use the general query page, at http://bugzilla.netfilter.org/query.cgi Appended below are the individual URLs to get to all of your NEW bugs that haven't been touched for 7 days or more. You will get this message once a day until you've dealt with these bugs! Enhancement: Allow rules to specify ICMP type ranges. -> http://bugzilla.netfilter.org/show_bug.cgi?id=630 In IPv6 route information doesn't get flushed out when deleting and creating a new interface -> http://bugzilla.netfilter.org/show_bug.cgi?id=655 netfilters clamp-mss-to-pmtu sets bad MSS when none was set before -> http://bugzilla.netfilter.org/show_bug.cgi?id=662 Postrouting + IPsec + IPv6 -> http://bugzilla.netfilter.org/show_bug.cgi?id=663 connlimit doesn't work properly -> http://bugzilla.netfilter.org/show_bug.cgi?id=676 add PID and UID to netfilter-queue -> http://bugzilla.netfilter.org/show_bug.cgi?id=678 iptables-xml missing <match> in first <conditions> node -> http://bugzilla.netfilter.org/show_bug.cgi?id=679 Packets disappear after NAT on 2nd gateway -> http://bugzilla.netfilter.org/show_bug.cgi?id=680 Ruleset counter on -m recent match when recent table OVERFLOWED. -> http://bugzilla.netfilter.org/show_bug.cgi?id=689 Netfilter NAT engine conflicts with iproute2 routing cache purge -> http://bugzilla.netfilter.org/show_bug.cgi?id=690 SNAT is failing to maquerade some TCP RST packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=693 Files with the same name in case-insensitive file systems -> http://bugzilla.netfilter.org/show_bug.cgi?id=694 Extra tcp options for REJECT --reject-with tcp-reset-both / tcp-reset-destination -> http://bugzilla.netfilter.org/show_bug.cgi?id=696 please add new options to iptables-restore to continue on error and suppress error output -> http://bugzilla.netfilter.org/show_bug.cgi?id=699 PPPoE masqeuraded connection reset when talking to Amazon S3 -> http://bugzilla.netfilter.org/show_bug.cgi?id=701 A way to convert an iptables command to its iptables-save equivalent output -> http://bugzilla.netfilter.org/show_bug.cgi?id=705 Some accepted packets get lost -> http://bugzilla.netfilter.org/show_bug.cgi?id=708 nfq_nfnlh() and nfq_fd() should have const arguments -> http://bugzilla.netfilter.org/show_bug.cgi?id=715 double entry of nf_conntrack_max in /proc -> http://bugzilla.netfilter.org/show_bug.cgi?id=722 Errors in compiling nfqnl_test.c -> http://bugzilla.netfilter.org/show_bug.cgi?id=743 Range check for ulog-cprange is wrong -> http://bugzilla.netfilter.org/show_bug.cgi?id=748 IPv6 bridging bug -> http://bugzilla.netfilter.org/show_bug.cgi?id=751 ipq_read() will return an error (rc = -1) and the error message says "Received truncated message" -> http://bugzilla.netfilter.org/show_bug.cgi?id=752 change bugzilla account e-mail -> http://bugzilla.netfilter.org/show_bug.cgi?id=755 iptables: Memory allocation problem. -> http://bugzilla.netfilter.org/show_bug.cgi?id=756 Retry iptables command on transient failure -> http://bugzilla.netfilter.org/show_bug.cgi?id=758 "iptables -m recent" crashes a LXC host on lxc-stop -> http://bugzilla.netfilter.org/show_bug.cgi?id=759 nf_ct_sip dropping SIP messages larger then MTU -> http://bugzilla.netfilter.org/show_bug.cgi?id=760 dnat and snat not changing port numbers on sctp packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=763 Doing -Z twice in parallel breaks counters -> http://bugzilla.netfilter.org/show_bug.cgi?id=764 Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule -> http://bugzilla.netfilter.org/show_bug.cgi?id=766 Fix a compiler warning [-Wunused-variable] -> http://bugzilla.netfilter.org/show_bug.cgi?id=767 Returns the position the entry was inserted -> http://bugzilla.netfilter.org/show_bug.cgi?id=768 iptables SNAT does not handle argument --persistent -> http://bugzilla.netfilter.org/show_bug.cgi?id=769 ipt_REJECT: multi-directional tcp-reset -> http://bugzilla.netfilter.org/show_bug.cgi?id=770 nf_conntrack_proto_tcp BUG?? -> http://bugzilla.netfilter.org/show_bug.cgi?id=771 Rate Limiting -> http://bugzilla.netfilter.org/show_bug.cgi?id=772 -m owner ! --uid-owner False positive logging -> http://bugzilla.netfilter.org/show_bug.cgi?id=775 Suspect bug in __do_replace() -> http://bugzilla.netfilter.org/show_bug.cgi?id=777 NFQUEUE --queue-bypass accepts all packets when no userspace application is available -> http://bugzilla.netfilter.org/show_bug.cgi?id=778 Netfilter on bridge interface containing a defective NIC -> http://bugzilla.netfilter.org/show_bug.cgi?id=779 Memory utilization continuously increasing day by day -> http://bugzilla.netfilter.org/show_bug.cgi?id=784 Normalize iptables rules -> http://bugzilla.netfilter.org/show_bug.cgi?id=790 ulogd -d does not close all fds -> http://bugzilla.netfilter.org/show_bug.cgi?id=793 -f option used with iptables -> http://bugzilla.netfilter.org/show_bug.cgi?id=794 RELATED doesn't accommodate multicast UDP solicitation resulting in unicast reply -> http://bugzilla.netfilter.org/show_bug.cgi?id=795 ip6tables (iptables) "state" test fails to correctly determine the state of packet streams; will not jump to ACCEPT on ESTABLISHED,RELATED connections -> http://bugzilla.netfilter.org/show_bug.cgi?id=796 Match Order Matters When Using Hashlimit -> http://bugzilla.netfilter.org/show_bug.cgi?id=797 fix warning with newer automake -> http://bugzilla.netfilter.org/show_bug.cgi?id=798 LOG --log-prefix is broken does show quoted message in log -> http://bugzilla.netfilter.org/show_bug.cgi?id=799 sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook -> http://bugzilla.netfilter.org/show_bug.cgi?id=800 Bridge dropping Ipsec fragmented packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=801
bugzilla-daemon at bugzilla.netfilter.org
2012-Nov-18 00:46 UTC
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.] You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require attention. All of these bugs are in the NEW or REOPENED state, and have not been touched in 7 days or more. You need to take a look at them, and decide on an initial action. Generally, this means one of three things: (1) You decide this bug is really quick to deal with (like, it's INVALID), and so you get rid of it immediately. (2) You decide the bug doesn't belong to you, and you reassign it to someone else. (Hint: if you don't know who to reassign it to, make sure that the Component field seems reasonable, and then use the "Reset Assignee to default" option.) (3) You decide the bug belongs to you, but you can't solve it this moment. Accept the bug by setting the status to ASSIGNED. To get a list of all NEW/REOPENED bugs, you can use this URL (bookmark it if you like!): http://bugzilla.netfilter.org/buglist.cgi?bug_status=NEW&bug_status=REOPENED&assigned_to=netfilter-buglog at lists.netfilter.org Or, you can use the general query page, at http://bugzilla.netfilter.org/query.cgi Appended below are the individual URLs to get to all of your NEW bugs that haven't been touched for 7 days or more. You will get this message once a day until you've dealt with these bugs! Enhancement: Allow rules to specify ICMP type ranges. -> http://bugzilla.netfilter.org/show_bug.cgi?id=630 In IPv6 route information doesn't get flushed out when deleting and creating a new interface -> http://bugzilla.netfilter.org/show_bug.cgi?id=655 netfilters clamp-mss-to-pmtu sets bad MSS when none was set before -> http://bugzilla.netfilter.org/show_bug.cgi?id=662 Postrouting + IPsec + IPv6 -> http://bugzilla.netfilter.org/show_bug.cgi?id=663 connlimit doesn't work properly -> http://bugzilla.netfilter.org/show_bug.cgi?id=676 add PID and UID to netfilter-queue -> http://bugzilla.netfilter.org/show_bug.cgi?id=678 iptables-xml missing <match> in first <conditions> node -> http://bugzilla.netfilter.org/show_bug.cgi?id=679 Packets disappear after NAT on 2nd gateway -> http://bugzilla.netfilter.org/show_bug.cgi?id=680 Ruleset counter on -m recent match when recent table OVERFLOWED. -> http://bugzilla.netfilter.org/show_bug.cgi?id=689 Netfilter NAT engine conflicts with iproute2 routing cache purge -> http://bugzilla.netfilter.org/show_bug.cgi?id=690 SNAT is failing to maquerade some TCP RST packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=693 Files with the same name in case-insensitive file systems -> http://bugzilla.netfilter.org/show_bug.cgi?id=694 Extra tcp options for REJECT --reject-with tcp-reset-both / tcp-reset-destination -> http://bugzilla.netfilter.org/show_bug.cgi?id=696 please add new options to iptables-restore to continue on error and suppress error output -> http://bugzilla.netfilter.org/show_bug.cgi?id=699 PPPoE masqeuraded connection reset when talking to Amazon S3 -> http://bugzilla.netfilter.org/show_bug.cgi?id=701 A way to convert an iptables command to its iptables-save equivalent output -> http://bugzilla.netfilter.org/show_bug.cgi?id=705 Some accepted packets get lost -> http://bugzilla.netfilter.org/show_bug.cgi?id=708 nfq_nfnlh() and nfq_fd() should have const arguments -> http://bugzilla.netfilter.org/show_bug.cgi?id=715 double entry of nf_conntrack_max in /proc -> http://bugzilla.netfilter.org/show_bug.cgi?id=722 Errors in compiling nfqnl_test.c -> http://bugzilla.netfilter.org/show_bug.cgi?id=743 Range check for ulog-cprange is wrong -> http://bugzilla.netfilter.org/show_bug.cgi?id=748 IPv6 bridging bug -> http://bugzilla.netfilter.org/show_bug.cgi?id=751 ipq_read() will return an error (rc = -1) and the error message says "Received truncated message" -> http://bugzilla.netfilter.org/show_bug.cgi?id=752 change bugzilla account e-mail -> http://bugzilla.netfilter.org/show_bug.cgi?id=755 iptables: Memory allocation problem. -> http://bugzilla.netfilter.org/show_bug.cgi?id=756 Retry iptables command on transient failure -> http://bugzilla.netfilter.org/show_bug.cgi?id=758 "iptables -m recent" crashes a LXC host on lxc-stop -> http://bugzilla.netfilter.org/show_bug.cgi?id=759 nf_ct_sip dropping SIP messages larger then MTU -> http://bugzilla.netfilter.org/show_bug.cgi?id=760 dnat and snat not changing port numbers on sctp packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=763 Doing -Z twice in parallel breaks counters -> http://bugzilla.netfilter.org/show_bug.cgi?id=764 Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule -> http://bugzilla.netfilter.org/show_bug.cgi?id=766 Fix a compiler warning [-Wunused-variable] -> http://bugzilla.netfilter.org/show_bug.cgi?id=767 Returns the position the entry was inserted -> http://bugzilla.netfilter.org/show_bug.cgi?id=768 iptables SNAT does not handle argument --persistent -> http://bugzilla.netfilter.org/show_bug.cgi?id=769 ipt_REJECT: multi-directional tcp-reset -> http://bugzilla.netfilter.org/show_bug.cgi?id=770 nf_conntrack_proto_tcp BUG?? -> http://bugzilla.netfilter.org/show_bug.cgi?id=771 Rate Limiting -> http://bugzilla.netfilter.org/show_bug.cgi?id=772 -m owner ! --uid-owner False positive logging -> http://bugzilla.netfilter.org/show_bug.cgi?id=775 Suspect bug in __do_replace() -> http://bugzilla.netfilter.org/show_bug.cgi?id=777 NFQUEUE --queue-bypass accepts all packets when no userspace application is available -> http://bugzilla.netfilter.org/show_bug.cgi?id=778 Netfilter on bridge interface containing a defective NIC -> http://bugzilla.netfilter.org/show_bug.cgi?id=779 Memory utilization continuously increasing day by day -> http://bugzilla.netfilter.org/show_bug.cgi?id=784 Normalize iptables rules -> http://bugzilla.netfilter.org/show_bug.cgi?id=790 ulogd -d does not close all fds -> http://bugzilla.netfilter.org/show_bug.cgi?id=793 -f option used with iptables -> http://bugzilla.netfilter.org/show_bug.cgi?id=794 RELATED doesn't accommodate multicast UDP solicitation resulting in unicast reply -> http://bugzilla.netfilter.org/show_bug.cgi?id=795 ip6tables (iptables) "state" test fails to correctly determine the state of packet streams; will not jump to ACCEPT on ESTABLISHED,RELATED connections -> http://bugzilla.netfilter.org/show_bug.cgi?id=796 Match Order Matters When Using Hashlimit -> http://bugzilla.netfilter.org/show_bug.cgi?id=797 fix warning with newer automake -> http://bugzilla.netfilter.org/show_bug.cgi?id=798 sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook -> http://bugzilla.netfilter.org/show_bug.cgi?id=800 Bridge dropping Ipsec fragmented packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=801
bugzilla-daemon at bugzilla.netfilter.org
2012-Nov-19 00:46 UTC
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.] You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require attention. All of these bugs are in the NEW or REOPENED state, and have not been touched in 7 days or more. You need to take a look at them, and decide on an initial action. Generally, this means one of three things: (1) You decide this bug is really quick to deal with (like, it's INVALID), and so you get rid of it immediately. (2) You decide the bug doesn't belong to you, and you reassign it to someone else. (Hint: if you don't know who to reassign it to, make sure that the Component field seems reasonable, and then use the "Reset Assignee to default" option.) (3) You decide the bug belongs to you, but you can't solve it this moment. Accept the bug by setting the status to ASSIGNED. To get a list of all NEW/REOPENED bugs, you can use this URL (bookmark it if you like!): http://bugzilla.netfilter.org/buglist.cgi?bug_status=NEW&bug_status=REOPENED&assigned_to=netfilter-buglog at lists.netfilter.org Or, you can use the general query page, at http://bugzilla.netfilter.org/query.cgi Appended below are the individual URLs to get to all of your NEW bugs that haven't been touched for 7 days or more. You will get this message once a day until you've dealt with these bugs! Enhancement: Allow rules to specify ICMP type ranges. -> http://bugzilla.netfilter.org/show_bug.cgi?id=630 In IPv6 route information doesn't get flushed out when deleting and creating a new interface -> http://bugzilla.netfilter.org/show_bug.cgi?id=655 netfilters clamp-mss-to-pmtu sets bad MSS when none was set before -> http://bugzilla.netfilter.org/show_bug.cgi?id=662 Postrouting + IPsec + IPv6 -> http://bugzilla.netfilter.org/show_bug.cgi?id=663 connlimit doesn't work properly -> http://bugzilla.netfilter.org/show_bug.cgi?id=676 add PID and UID to netfilter-queue -> http://bugzilla.netfilter.org/show_bug.cgi?id=678 iptables-xml missing <match> in first <conditions> node -> http://bugzilla.netfilter.org/show_bug.cgi?id=679 Packets disappear after NAT on 2nd gateway -> http://bugzilla.netfilter.org/show_bug.cgi?id=680 Ruleset counter on -m recent match when recent table OVERFLOWED. -> http://bugzilla.netfilter.org/show_bug.cgi?id=689 Netfilter NAT engine conflicts with iproute2 routing cache purge -> http://bugzilla.netfilter.org/show_bug.cgi?id=690 SNAT is failing to maquerade some TCP RST packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=693 Files with the same name in case-insensitive file systems -> http://bugzilla.netfilter.org/show_bug.cgi?id=694 Extra tcp options for REJECT --reject-with tcp-reset-both / tcp-reset-destination -> http://bugzilla.netfilter.org/show_bug.cgi?id=696 please add new options to iptables-restore to continue on error and suppress error output -> http://bugzilla.netfilter.org/show_bug.cgi?id=699 PPPoE masqeuraded connection reset when talking to Amazon S3 -> http://bugzilla.netfilter.org/show_bug.cgi?id=701 A way to convert an iptables command to its iptables-save equivalent output -> http://bugzilla.netfilter.org/show_bug.cgi?id=705 Some accepted packets get lost -> http://bugzilla.netfilter.org/show_bug.cgi?id=708 nfq_nfnlh() and nfq_fd() should have const arguments -> http://bugzilla.netfilter.org/show_bug.cgi?id=715 double entry of nf_conntrack_max in /proc -> http://bugzilla.netfilter.org/show_bug.cgi?id=722 Errors in compiling nfqnl_test.c -> http://bugzilla.netfilter.org/show_bug.cgi?id=743 Range check for ulog-cprange is wrong -> http://bugzilla.netfilter.org/show_bug.cgi?id=748 IPv6 bridging bug -> http://bugzilla.netfilter.org/show_bug.cgi?id=751 ipq_read() will return an error (rc = -1) and the error message says "Received truncated message" -> http://bugzilla.netfilter.org/show_bug.cgi?id=752 change bugzilla account e-mail -> http://bugzilla.netfilter.org/show_bug.cgi?id=755 iptables: Memory allocation problem. -> http://bugzilla.netfilter.org/show_bug.cgi?id=756 Retry iptables command on transient failure -> http://bugzilla.netfilter.org/show_bug.cgi?id=758 "iptables -m recent" crashes a LXC host on lxc-stop -> http://bugzilla.netfilter.org/show_bug.cgi?id=759 nf_ct_sip dropping SIP messages larger then MTU -> http://bugzilla.netfilter.org/show_bug.cgi?id=760 dnat and snat not changing port numbers on sctp packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=763 Doing -Z twice in parallel breaks counters -> http://bugzilla.netfilter.org/show_bug.cgi?id=764 Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule -> http://bugzilla.netfilter.org/show_bug.cgi?id=766 Fix a compiler warning [-Wunused-variable] -> http://bugzilla.netfilter.org/show_bug.cgi?id=767 Returns the position the entry was inserted -> http://bugzilla.netfilter.org/show_bug.cgi?id=768 iptables SNAT does not handle argument --persistent -> http://bugzilla.netfilter.org/show_bug.cgi?id=769 ipt_REJECT: multi-directional tcp-reset -> http://bugzilla.netfilter.org/show_bug.cgi?id=770 nf_conntrack_proto_tcp BUG?? -> http://bugzilla.netfilter.org/show_bug.cgi?id=771 Rate Limiting -> http://bugzilla.netfilter.org/show_bug.cgi?id=772 -m owner ! --uid-owner False positive logging -> http://bugzilla.netfilter.org/show_bug.cgi?id=775 Suspect bug in __do_replace() -> http://bugzilla.netfilter.org/show_bug.cgi?id=777 NFQUEUE --queue-bypass accepts all packets when no userspace application is available -> http://bugzilla.netfilter.org/show_bug.cgi?id=778 Netfilter on bridge interface containing a defective NIC -> http://bugzilla.netfilter.org/show_bug.cgi?id=779 Memory utilization continuously increasing day by day -> http://bugzilla.netfilter.org/show_bug.cgi?id=784 Normalize iptables rules -> http://bugzilla.netfilter.org/show_bug.cgi?id=790 ulogd -d does not close all fds -> http://bugzilla.netfilter.org/show_bug.cgi?id=793 -f option used with iptables -> http://bugzilla.netfilter.org/show_bug.cgi?id=794 RELATED doesn't accommodate multicast UDP solicitation resulting in unicast reply -> http://bugzilla.netfilter.org/show_bug.cgi?id=795 ip6tables (iptables) "state" test fails to correctly determine the state of packet streams; will not jump to ACCEPT on ESTABLISHED,RELATED connections -> http://bugzilla.netfilter.org/show_bug.cgi?id=796 Match Order Matters When Using Hashlimit -> http://bugzilla.netfilter.org/show_bug.cgi?id=797 sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook -> http://bugzilla.netfilter.org/show_bug.cgi?id=800 Bridge dropping Ipsec fragmented packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=801
bugzilla-daemon at bugzilla.netfilter.org
2012-Nov-20 00:46 UTC
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.] You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require attention. All of these bugs are in the NEW or REOPENED state, and have not been touched in 7 days or more. You need to take a look at them, and decide on an initial action. Generally, this means one of three things: (1) You decide this bug is really quick to deal with (like, it's INVALID), and so you get rid of it immediately. (2) You decide the bug doesn't belong to you, and you reassign it to someone else. (Hint: if you don't know who to reassign it to, make sure that the Component field seems reasonable, and then use the "Reset Assignee to default" option.) (3) You decide the bug belongs to you, but you can't solve it this moment. Accept the bug by setting the status to ASSIGNED. To get a list of all NEW/REOPENED bugs, you can use this URL (bookmark it if you like!): http://bugzilla.netfilter.org/buglist.cgi?bug_status=NEW&bug_status=REOPENED&assigned_to=netfilter-buglog at lists.netfilter.org Or, you can use the general query page, at http://bugzilla.netfilter.org/query.cgi Appended below are the individual URLs to get to all of your NEW bugs that haven't been touched for 7 days or more. You will get this message once a day until you've dealt with these bugs! Enhancement: Allow rules to specify ICMP type ranges. -> http://bugzilla.netfilter.org/show_bug.cgi?id=630 In IPv6 route information doesn't get flushed out when deleting and creating a new interface -> http://bugzilla.netfilter.org/show_bug.cgi?id=655 netfilters clamp-mss-to-pmtu sets bad MSS when none was set before -> http://bugzilla.netfilter.org/show_bug.cgi?id=662 Postrouting + IPsec + IPv6 -> http://bugzilla.netfilter.org/show_bug.cgi?id=663 connlimit doesn't work properly -> http://bugzilla.netfilter.org/show_bug.cgi?id=676 add PID and UID to netfilter-queue -> http://bugzilla.netfilter.org/show_bug.cgi?id=678 iptables-xml missing <match> in first <conditions> node -> http://bugzilla.netfilter.org/show_bug.cgi?id=679 Packets disappear after NAT on 2nd gateway -> http://bugzilla.netfilter.org/show_bug.cgi?id=680 Ruleset counter on -m recent match when recent table OVERFLOWED. -> http://bugzilla.netfilter.org/show_bug.cgi?id=689 Netfilter NAT engine conflicts with iproute2 routing cache purge -> http://bugzilla.netfilter.org/show_bug.cgi?id=690 SNAT is failing to maquerade some TCP RST packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=693 Files with the same name in case-insensitive file systems -> http://bugzilla.netfilter.org/show_bug.cgi?id=694 Extra tcp options for REJECT --reject-with tcp-reset-both / tcp-reset-destination -> http://bugzilla.netfilter.org/show_bug.cgi?id=696 please add new options to iptables-restore to continue on error and suppress error output -> http://bugzilla.netfilter.org/show_bug.cgi?id=699 PPPoE masqeuraded connection reset when talking to Amazon S3 -> http://bugzilla.netfilter.org/show_bug.cgi?id=701 A way to convert an iptables command to its iptables-save equivalent output -> http://bugzilla.netfilter.org/show_bug.cgi?id=705 Some accepted packets get lost -> http://bugzilla.netfilter.org/show_bug.cgi?id=708 nfq_nfnlh() and nfq_fd() should have const arguments -> http://bugzilla.netfilter.org/show_bug.cgi?id=715 double entry of nf_conntrack_max in /proc -> http://bugzilla.netfilter.org/show_bug.cgi?id=722 Errors in compiling nfqnl_test.c -> http://bugzilla.netfilter.org/show_bug.cgi?id=743 Range check for ulog-cprange is wrong -> http://bugzilla.netfilter.org/show_bug.cgi?id=748 IPv6 bridging bug -> http://bugzilla.netfilter.org/show_bug.cgi?id=751 ipq_read() will return an error (rc = -1) and the error message says "Received truncated message" -> http://bugzilla.netfilter.org/show_bug.cgi?id=752 change bugzilla account e-mail -> http://bugzilla.netfilter.org/show_bug.cgi?id=755 iptables: Memory allocation problem. -> http://bugzilla.netfilter.org/show_bug.cgi?id=756 Retry iptables command on transient failure -> http://bugzilla.netfilter.org/show_bug.cgi?id=758 "iptables -m recent" crashes a LXC host on lxc-stop -> http://bugzilla.netfilter.org/show_bug.cgi?id=759 nf_ct_sip dropping SIP messages larger then MTU -> http://bugzilla.netfilter.org/show_bug.cgi?id=760 dnat and snat not changing port numbers on sctp packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=763 Doing -Z twice in parallel breaks counters -> http://bugzilla.netfilter.org/show_bug.cgi?id=764 Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule -> http://bugzilla.netfilter.org/show_bug.cgi?id=766 Fix a compiler warning [-Wunused-variable] -> http://bugzilla.netfilter.org/show_bug.cgi?id=767 Returns the position the entry was inserted -> http://bugzilla.netfilter.org/show_bug.cgi?id=768 iptables SNAT does not handle argument --persistent -> http://bugzilla.netfilter.org/show_bug.cgi?id=769 ipt_REJECT: multi-directional tcp-reset -> http://bugzilla.netfilter.org/show_bug.cgi?id=770 nf_conntrack_proto_tcp BUG?? -> http://bugzilla.netfilter.org/show_bug.cgi?id=771 Rate Limiting -> http://bugzilla.netfilter.org/show_bug.cgi?id=772 -m owner ! --uid-owner False positive logging -> http://bugzilla.netfilter.org/show_bug.cgi?id=775 Suspect bug in __do_replace() -> http://bugzilla.netfilter.org/show_bug.cgi?id=777 NFQUEUE --queue-bypass accepts all packets when no userspace application is available -> http://bugzilla.netfilter.org/show_bug.cgi?id=778 Netfilter on bridge interface containing a defective NIC -> http://bugzilla.netfilter.org/show_bug.cgi?id=779 Memory utilization continuously increasing day by day -> http://bugzilla.netfilter.org/show_bug.cgi?id=784 Normalize iptables rules -> http://bugzilla.netfilter.org/show_bug.cgi?id=790 ulogd -d does not close all fds -> http://bugzilla.netfilter.org/show_bug.cgi?id=793 -f option used with iptables -> http://bugzilla.netfilter.org/show_bug.cgi?id=794 RELATED doesn't accommodate multicast UDP solicitation resulting in unicast reply -> http://bugzilla.netfilter.org/show_bug.cgi?id=795 ip6tables (iptables) "state" test fails to correctly determine the state of packet streams; will not jump to ACCEPT on ESTABLISHED,RELATED connections -> http://bugzilla.netfilter.org/show_bug.cgi?id=796 Match Order Matters When Using Hashlimit -> http://bugzilla.netfilter.org/show_bug.cgi?id=797 sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook -> http://bugzilla.netfilter.org/show_bug.cgi?id=800 Bridge dropping Ipsec fragmented packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=801
bugzilla-daemon at bugzilla.netfilter.org
2012-Nov-21 00:46 UTC
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.] You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require attention. All of these bugs are in the NEW or REOPENED state, and have not been touched in 7 days or more. You need to take a look at them, and decide on an initial action. Generally, this means one of three things: (1) You decide this bug is really quick to deal with (like, it's INVALID), and so you get rid of it immediately. (2) You decide the bug doesn't belong to you, and you reassign it to someone else. (Hint: if you don't know who to reassign it to, make sure that the Component field seems reasonable, and then use the "Reset Assignee to default" option.) (3) You decide the bug belongs to you, but you can't solve it this moment. Accept the bug by setting the status to ASSIGNED. To get a list of all NEW/REOPENED bugs, you can use this URL (bookmark it if you like!): http://bugzilla.netfilter.org/buglist.cgi?bug_status=NEW&bug_status=REOPENED&assigned_to=netfilter-buglog at lists.netfilter.org Or, you can use the general query page, at http://bugzilla.netfilter.org/query.cgi Appended below are the individual URLs to get to all of your NEW bugs that haven't been touched for 7 days or more. You will get this message once a day until you've dealt with these bugs! Enhancement: Allow rules to specify ICMP type ranges. -> http://bugzilla.netfilter.org/show_bug.cgi?id=630 In IPv6 route information doesn't get flushed out when deleting and creating a new interface -> http://bugzilla.netfilter.org/show_bug.cgi?id=655 netfilters clamp-mss-to-pmtu sets bad MSS when none was set before -> http://bugzilla.netfilter.org/show_bug.cgi?id=662 Postrouting + IPsec + IPv6 -> http://bugzilla.netfilter.org/show_bug.cgi?id=663 connlimit doesn't work properly -> http://bugzilla.netfilter.org/show_bug.cgi?id=676 add PID and UID to netfilter-queue -> http://bugzilla.netfilter.org/show_bug.cgi?id=678 iptables-xml missing <match> in first <conditions> node -> http://bugzilla.netfilter.org/show_bug.cgi?id=679 Packets disappear after NAT on 2nd gateway -> http://bugzilla.netfilter.org/show_bug.cgi?id=680 Ruleset counter on -m recent match when recent table OVERFLOWED. -> http://bugzilla.netfilter.org/show_bug.cgi?id=689 Netfilter NAT engine conflicts with iproute2 routing cache purge -> http://bugzilla.netfilter.org/show_bug.cgi?id=690 SNAT is failing to maquerade some TCP RST packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=693 Files with the same name in case-insensitive file systems -> http://bugzilla.netfilter.org/show_bug.cgi?id=694 Extra tcp options for REJECT --reject-with tcp-reset-both / tcp-reset-destination -> http://bugzilla.netfilter.org/show_bug.cgi?id=696 please add new options to iptables-restore to continue on error and suppress error output -> http://bugzilla.netfilter.org/show_bug.cgi?id=699 PPPoE masqeuraded connection reset when talking to Amazon S3 -> http://bugzilla.netfilter.org/show_bug.cgi?id=701 A way to convert an iptables command to its iptables-save equivalent output -> http://bugzilla.netfilter.org/show_bug.cgi?id=705 Some accepted packets get lost -> http://bugzilla.netfilter.org/show_bug.cgi?id=708 nfq_nfnlh() and nfq_fd() should have const arguments -> http://bugzilla.netfilter.org/show_bug.cgi?id=715 double entry of nf_conntrack_max in /proc -> http://bugzilla.netfilter.org/show_bug.cgi?id=722 Errors in compiling nfqnl_test.c -> http://bugzilla.netfilter.org/show_bug.cgi?id=743 Range check for ulog-cprange is wrong -> http://bugzilla.netfilter.org/show_bug.cgi?id=748 IPv6 bridging bug -> http://bugzilla.netfilter.org/show_bug.cgi?id=751 ipq_read() will return an error (rc = -1) and the error message says "Received truncated message" -> http://bugzilla.netfilter.org/show_bug.cgi?id=752 change bugzilla account e-mail -> http://bugzilla.netfilter.org/show_bug.cgi?id=755 iptables: Memory allocation problem. -> http://bugzilla.netfilter.org/show_bug.cgi?id=756 Retry iptables command on transient failure -> http://bugzilla.netfilter.org/show_bug.cgi?id=758 "iptables -m recent" crashes a LXC host on lxc-stop -> http://bugzilla.netfilter.org/show_bug.cgi?id=759 nf_ct_sip dropping SIP messages larger then MTU -> http://bugzilla.netfilter.org/show_bug.cgi?id=760 dnat and snat not changing port numbers on sctp packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=763 Doing -Z twice in parallel breaks counters -> http://bugzilla.netfilter.org/show_bug.cgi?id=764 Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule -> http://bugzilla.netfilter.org/show_bug.cgi?id=766 Fix a compiler warning [-Wunused-variable] -> http://bugzilla.netfilter.org/show_bug.cgi?id=767 Returns the position the entry was inserted -> http://bugzilla.netfilter.org/show_bug.cgi?id=768 iptables SNAT does not handle argument --persistent -> http://bugzilla.netfilter.org/show_bug.cgi?id=769 ipt_REJECT: multi-directional tcp-reset -> http://bugzilla.netfilter.org/show_bug.cgi?id=770 nf_conntrack_proto_tcp BUG?? -> http://bugzilla.netfilter.org/show_bug.cgi?id=771 Rate Limiting -> http://bugzilla.netfilter.org/show_bug.cgi?id=772 -m owner ! --uid-owner False positive logging -> http://bugzilla.netfilter.org/show_bug.cgi?id=775 Suspect bug in __do_replace() -> http://bugzilla.netfilter.org/show_bug.cgi?id=777 NFQUEUE --queue-bypass accepts all packets when no userspace application is available -> http://bugzilla.netfilter.org/show_bug.cgi?id=778 Netfilter on bridge interface containing a defective NIC -> http://bugzilla.netfilter.org/show_bug.cgi?id=779 Memory utilization continuously increasing day by day -> http://bugzilla.netfilter.org/show_bug.cgi?id=784 Normalize iptables rules -> http://bugzilla.netfilter.org/show_bug.cgi?id=790 ulogd -d does not close all fds -> http://bugzilla.netfilter.org/show_bug.cgi?id=793 -f option used with iptables -> http://bugzilla.netfilter.org/show_bug.cgi?id=794 RELATED doesn't accommodate multicast UDP solicitation resulting in unicast reply -> http://bugzilla.netfilter.org/show_bug.cgi?id=795 ip6tables (iptables) "state" test fails to correctly determine the state of packet streams; will not jump to ACCEPT on ESTABLISHED,RELATED connections -> http://bugzilla.netfilter.org/show_bug.cgi?id=796 Match Order Matters When Using Hashlimit -> http://bugzilla.netfilter.org/show_bug.cgi?id=797 sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook -> http://bugzilla.netfilter.org/show_bug.cgi?id=800 Bridge dropping Ipsec fragmented packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=801
bugzilla-daemon at bugzilla.netfilter.org
2012-Nov-22 00:46 UTC
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.] You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require attention. All of these bugs are in the NEW or REOPENED state, and have not been touched in 7 days or more. You need to take a look at them, and decide on an initial action. Generally, this means one of three things: (1) You decide this bug is really quick to deal with (like, it's INVALID), and so you get rid of it immediately. (2) You decide the bug doesn't belong to you, and you reassign it to someone else. (Hint: if you don't know who to reassign it to, make sure that the Component field seems reasonable, and then use the "Reset Assignee to default" option.) (3) You decide the bug belongs to you, but you can't solve it this moment. Accept the bug by setting the status to ASSIGNED. To get a list of all NEW/REOPENED bugs, you can use this URL (bookmark it if you like!): http://bugzilla.netfilter.org/buglist.cgi?bug_status=NEW&bug_status=REOPENED&assigned_to=netfilter-buglog at lists.netfilter.org Or, you can use the general query page, at http://bugzilla.netfilter.org/query.cgi Appended below are the individual URLs to get to all of your NEW bugs that haven't been touched for 7 days or more. You will get this message once a day until you've dealt with these bugs! Enhancement: Allow rules to specify ICMP type ranges. -> http://bugzilla.netfilter.org/show_bug.cgi?id=630 In IPv6 route information doesn't get flushed out when deleting and creating a new interface -> http://bugzilla.netfilter.org/show_bug.cgi?id=655 netfilters clamp-mss-to-pmtu sets bad MSS when none was set before -> http://bugzilla.netfilter.org/show_bug.cgi?id=662 Postrouting + IPsec + IPv6 -> http://bugzilla.netfilter.org/show_bug.cgi?id=663 connlimit doesn't work properly -> http://bugzilla.netfilter.org/show_bug.cgi?id=676 add PID and UID to netfilter-queue -> http://bugzilla.netfilter.org/show_bug.cgi?id=678 iptables-xml missing <match> in first <conditions> node -> http://bugzilla.netfilter.org/show_bug.cgi?id=679 Packets disappear after NAT on 2nd gateway -> http://bugzilla.netfilter.org/show_bug.cgi?id=680 Ruleset counter on -m recent match when recent table OVERFLOWED. -> http://bugzilla.netfilter.org/show_bug.cgi?id=689 Netfilter NAT engine conflicts with iproute2 routing cache purge -> http://bugzilla.netfilter.org/show_bug.cgi?id=690 SNAT is failing to maquerade some TCP RST packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=693 Files with the same name in case-insensitive file systems -> http://bugzilla.netfilter.org/show_bug.cgi?id=694 Extra tcp options for REJECT --reject-with tcp-reset-both / tcp-reset-destination -> http://bugzilla.netfilter.org/show_bug.cgi?id=696 please add new options to iptables-restore to continue on error and suppress error output -> http://bugzilla.netfilter.org/show_bug.cgi?id=699 PPPoE masqeuraded connection reset when talking to Amazon S3 -> http://bugzilla.netfilter.org/show_bug.cgi?id=701 A way to convert an iptables command to its iptables-save equivalent output -> http://bugzilla.netfilter.org/show_bug.cgi?id=705 Some accepted packets get lost -> http://bugzilla.netfilter.org/show_bug.cgi?id=708 nfq_nfnlh() and nfq_fd() should have const arguments -> http://bugzilla.netfilter.org/show_bug.cgi?id=715 double entry of nf_conntrack_max in /proc -> http://bugzilla.netfilter.org/show_bug.cgi?id=722 Errors in compiling nfqnl_test.c -> http://bugzilla.netfilter.org/show_bug.cgi?id=743 Range check for ulog-cprange is wrong -> http://bugzilla.netfilter.org/show_bug.cgi?id=748 IPv6 bridging bug -> http://bugzilla.netfilter.org/show_bug.cgi?id=751 ipq_read() will return an error (rc = -1) and the error message says "Received truncated message" -> http://bugzilla.netfilter.org/show_bug.cgi?id=752 change bugzilla account e-mail -> http://bugzilla.netfilter.org/show_bug.cgi?id=755 iptables: Memory allocation problem. -> http://bugzilla.netfilter.org/show_bug.cgi?id=756 Retry iptables command on transient failure -> http://bugzilla.netfilter.org/show_bug.cgi?id=758 "iptables -m recent" crashes a LXC host on lxc-stop -> http://bugzilla.netfilter.org/show_bug.cgi?id=759 nf_ct_sip dropping SIP messages larger then MTU -> http://bugzilla.netfilter.org/show_bug.cgi?id=760 dnat and snat not changing port numbers on sctp packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=763 Doing -Z twice in parallel breaks counters -> http://bugzilla.netfilter.org/show_bug.cgi?id=764 Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule -> http://bugzilla.netfilter.org/show_bug.cgi?id=766 Fix a compiler warning [-Wunused-variable] -> http://bugzilla.netfilter.org/show_bug.cgi?id=767 Returns the position the entry was inserted -> http://bugzilla.netfilter.org/show_bug.cgi?id=768 iptables SNAT does not handle argument --persistent -> http://bugzilla.netfilter.org/show_bug.cgi?id=769 ipt_REJECT: multi-directional tcp-reset -> http://bugzilla.netfilter.org/show_bug.cgi?id=770 nf_conntrack_proto_tcp BUG?? -> http://bugzilla.netfilter.org/show_bug.cgi?id=771 Rate Limiting -> http://bugzilla.netfilter.org/show_bug.cgi?id=772 -m owner ! --uid-owner False positive logging -> http://bugzilla.netfilter.org/show_bug.cgi?id=775 Suspect bug in __do_replace() -> http://bugzilla.netfilter.org/show_bug.cgi?id=777 NFQUEUE --queue-bypass accepts all packets when no userspace application is available -> http://bugzilla.netfilter.org/show_bug.cgi?id=778 Netfilter on bridge interface containing a defective NIC -> http://bugzilla.netfilter.org/show_bug.cgi?id=779 Memory utilization continuously increasing day by day -> http://bugzilla.netfilter.org/show_bug.cgi?id=784 Normalize iptables rules -> http://bugzilla.netfilter.org/show_bug.cgi?id=790 ulogd -d does not close all fds -> http://bugzilla.netfilter.org/show_bug.cgi?id=793 -f option used with iptables -> http://bugzilla.netfilter.org/show_bug.cgi?id=794 RELATED doesn't accommodate multicast UDP solicitation resulting in unicast reply -> http://bugzilla.netfilter.org/show_bug.cgi?id=795 ip6tables (iptables) "state" test fails to correctly determine the state of packet streams; will not jump to ACCEPT on ESTABLISHED,RELATED connections -> http://bugzilla.netfilter.org/show_bug.cgi?id=796 Match Order Matters When Using Hashlimit -> http://bugzilla.netfilter.org/show_bug.cgi?id=797 sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook -> http://bugzilla.netfilter.org/show_bug.cgi?id=800 Bridge dropping Ipsec fragmented packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=801
bugzilla-daemon at bugzilla.netfilter.org
2012-Nov-23 00:46 UTC
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.] You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require attention. All of these bugs are in the NEW or REOPENED state, and have not been touched in 7 days or more. You need to take a look at them, and decide on an initial action. Generally, this means one of three things: (1) You decide this bug is really quick to deal with (like, it's INVALID), and so you get rid of it immediately. (2) You decide the bug doesn't belong to you, and you reassign it to someone else. (Hint: if you don't know who to reassign it to, make sure that the Component field seems reasonable, and then use the "Reset Assignee to default" option.) (3) You decide the bug belongs to you, but you can't solve it this moment. Accept the bug by setting the status to ASSIGNED. To get a list of all NEW/REOPENED bugs, you can use this URL (bookmark it if you like!): http://bugzilla.netfilter.org/buglist.cgi?bug_status=NEW&bug_status=REOPENED&assigned_to=netfilter-buglog at lists.netfilter.org Or, you can use the general query page, at http://bugzilla.netfilter.org/query.cgi Appended below are the individual URLs to get to all of your NEW bugs that haven't been touched for 7 days or more. You will get this message once a day until you've dealt with these bugs! Enhancement: Allow rules to specify ICMP type ranges. -> http://bugzilla.netfilter.org/show_bug.cgi?id=630 In IPv6 route information doesn't get flushed out when deleting and creating a new interface -> http://bugzilla.netfilter.org/show_bug.cgi?id=655 netfilters clamp-mss-to-pmtu sets bad MSS when none was set before -> http://bugzilla.netfilter.org/show_bug.cgi?id=662 Postrouting + IPsec + IPv6 -> http://bugzilla.netfilter.org/show_bug.cgi?id=663 connlimit doesn't work properly -> http://bugzilla.netfilter.org/show_bug.cgi?id=676 add PID and UID to netfilter-queue -> http://bugzilla.netfilter.org/show_bug.cgi?id=678 iptables-xml missing <match> in first <conditions> node -> http://bugzilla.netfilter.org/show_bug.cgi?id=679 Packets disappear after NAT on 2nd gateway -> http://bugzilla.netfilter.org/show_bug.cgi?id=680 Ruleset counter on -m recent match when recent table OVERFLOWED. -> http://bugzilla.netfilter.org/show_bug.cgi?id=689 Netfilter NAT engine conflicts with iproute2 routing cache purge -> http://bugzilla.netfilter.org/show_bug.cgi?id=690 SNAT is failing to maquerade some TCP RST packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=693 Files with the same name in case-insensitive file systems -> http://bugzilla.netfilter.org/show_bug.cgi?id=694 Extra tcp options for REJECT --reject-with tcp-reset-both / tcp-reset-destination -> http://bugzilla.netfilter.org/show_bug.cgi?id=696 please add new options to iptables-restore to continue on error and suppress error output -> http://bugzilla.netfilter.org/show_bug.cgi?id=699 PPPoE masqeuraded connection reset when talking to Amazon S3 -> http://bugzilla.netfilter.org/show_bug.cgi?id=701 A way to convert an iptables command to its iptables-save equivalent output -> http://bugzilla.netfilter.org/show_bug.cgi?id=705 Some accepted packets get lost -> http://bugzilla.netfilter.org/show_bug.cgi?id=708 nfq_nfnlh() and nfq_fd() should have const arguments -> http://bugzilla.netfilter.org/show_bug.cgi?id=715 double entry of nf_conntrack_max in /proc -> http://bugzilla.netfilter.org/show_bug.cgi?id=722 Errors in compiling nfqnl_test.c -> http://bugzilla.netfilter.org/show_bug.cgi?id=743 Range check for ulog-cprange is wrong -> http://bugzilla.netfilter.org/show_bug.cgi?id=748 IPv6 bridging bug -> http://bugzilla.netfilter.org/show_bug.cgi?id=751 ipq_read() will return an error (rc = -1) and the error message says "Received truncated message" -> http://bugzilla.netfilter.org/show_bug.cgi?id=752 change bugzilla account e-mail -> http://bugzilla.netfilter.org/show_bug.cgi?id=755 iptables: Memory allocation problem. -> http://bugzilla.netfilter.org/show_bug.cgi?id=756 Retry iptables command on transient failure -> http://bugzilla.netfilter.org/show_bug.cgi?id=758 "iptables -m recent" crashes a LXC host on lxc-stop -> http://bugzilla.netfilter.org/show_bug.cgi?id=759 nf_ct_sip dropping SIP messages larger then MTU -> http://bugzilla.netfilter.org/show_bug.cgi?id=760 dnat and snat not changing port numbers on sctp packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=763 Doing -Z twice in parallel breaks counters -> http://bugzilla.netfilter.org/show_bug.cgi?id=764 Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule -> http://bugzilla.netfilter.org/show_bug.cgi?id=766 Fix a compiler warning [-Wunused-variable] -> http://bugzilla.netfilter.org/show_bug.cgi?id=767 Returns the position the entry was inserted -> http://bugzilla.netfilter.org/show_bug.cgi?id=768 iptables SNAT does not handle argument --persistent -> http://bugzilla.netfilter.org/show_bug.cgi?id=769 ipt_REJECT: multi-directional tcp-reset -> http://bugzilla.netfilter.org/show_bug.cgi?id=770 nf_conntrack_proto_tcp BUG?? -> http://bugzilla.netfilter.org/show_bug.cgi?id=771 Rate Limiting -> http://bugzilla.netfilter.org/show_bug.cgi?id=772 -m owner ! --uid-owner False positive logging -> http://bugzilla.netfilter.org/show_bug.cgi?id=775 Suspect bug in __do_replace() -> http://bugzilla.netfilter.org/show_bug.cgi?id=777 NFQUEUE --queue-bypass accepts all packets when no userspace application is available -> http://bugzilla.netfilter.org/show_bug.cgi?id=778 Netfilter on bridge interface containing a defective NIC -> http://bugzilla.netfilter.org/show_bug.cgi?id=779 Memory utilization continuously increasing day by day -> http://bugzilla.netfilter.org/show_bug.cgi?id=784 Normalize iptables rules -> http://bugzilla.netfilter.org/show_bug.cgi?id=790 ulogd -d does not close all fds -> http://bugzilla.netfilter.org/show_bug.cgi?id=793 -f option used with iptables -> http://bugzilla.netfilter.org/show_bug.cgi?id=794 RELATED doesn't accommodate multicast UDP solicitation resulting in unicast reply -> http://bugzilla.netfilter.org/show_bug.cgi?id=795 ip6tables (iptables) "state" test fails to correctly determine the state of packet streams; will not jump to ACCEPT on ESTABLISHED,RELATED connections -> http://bugzilla.netfilter.org/show_bug.cgi?id=796 Match Order Matters When Using Hashlimit -> http://bugzilla.netfilter.org/show_bug.cgi?id=797 sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook -> http://bugzilla.netfilter.org/show_bug.cgi?id=800 Bridge dropping Ipsec fragmented packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=801
bugzilla-daemon at bugzilla.netfilter.org
2012-Nov-24 00:46 UTC
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.] You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require attention. All of these bugs are in the NEW or REOPENED state, and have not been touched in 7 days or more. You need to take a look at them, and decide on an initial action. Generally, this means one of three things: (1) You decide this bug is really quick to deal with (like, it's INVALID), and so you get rid of it immediately. (2) You decide the bug doesn't belong to you, and you reassign it to someone else. (Hint: if you don't know who to reassign it to, make sure that the Component field seems reasonable, and then use the "Reset Assignee to default" option.) (3) You decide the bug belongs to you, but you can't solve it this moment. Accept the bug by setting the status to ASSIGNED. To get a list of all NEW/REOPENED bugs, you can use this URL (bookmark it if you like!): http://bugzilla.netfilter.org/buglist.cgi?bug_status=NEW&bug_status=REOPENED&assigned_to=netfilter-buglog at lists.netfilter.org Or, you can use the general query page, at http://bugzilla.netfilter.org/query.cgi Appended below are the individual URLs to get to all of your NEW bugs that haven't been touched for 7 days or more. You will get this message once a day until you've dealt with these bugs! Enhancement: Allow rules to specify ICMP type ranges. -> http://bugzilla.netfilter.org/show_bug.cgi?id=630 In IPv6 route information doesn't get flushed out when deleting and creating a new interface -> http://bugzilla.netfilter.org/show_bug.cgi?id=655 netfilters clamp-mss-to-pmtu sets bad MSS when none was set before -> http://bugzilla.netfilter.org/show_bug.cgi?id=662 Postrouting + IPsec + IPv6 -> http://bugzilla.netfilter.org/show_bug.cgi?id=663 connlimit doesn't work properly -> http://bugzilla.netfilter.org/show_bug.cgi?id=676 add PID and UID to netfilter-queue -> http://bugzilla.netfilter.org/show_bug.cgi?id=678 iptables-xml missing <match> in first <conditions> node -> http://bugzilla.netfilter.org/show_bug.cgi?id=679 Packets disappear after NAT on 2nd gateway -> http://bugzilla.netfilter.org/show_bug.cgi?id=680 Ruleset counter on -m recent match when recent table OVERFLOWED. -> http://bugzilla.netfilter.org/show_bug.cgi?id=689 Netfilter NAT engine conflicts with iproute2 routing cache purge -> http://bugzilla.netfilter.org/show_bug.cgi?id=690 SNAT is failing to maquerade some TCP RST packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=693 Files with the same name in case-insensitive file systems -> http://bugzilla.netfilter.org/show_bug.cgi?id=694 Extra tcp options for REJECT --reject-with tcp-reset-both / tcp-reset-destination -> http://bugzilla.netfilter.org/show_bug.cgi?id=696 please add new options to iptables-restore to continue on error and suppress error output -> http://bugzilla.netfilter.org/show_bug.cgi?id=699 PPPoE masqeuraded connection reset when talking to Amazon S3 -> http://bugzilla.netfilter.org/show_bug.cgi?id=701 A way to convert an iptables command to its iptables-save equivalent output -> http://bugzilla.netfilter.org/show_bug.cgi?id=705 Some accepted packets get lost -> http://bugzilla.netfilter.org/show_bug.cgi?id=708 nfq_nfnlh() and nfq_fd() should have const arguments -> http://bugzilla.netfilter.org/show_bug.cgi?id=715 double entry of nf_conntrack_max in /proc -> http://bugzilla.netfilter.org/show_bug.cgi?id=722 Errors in compiling nfqnl_test.c -> http://bugzilla.netfilter.org/show_bug.cgi?id=743 Range check for ulog-cprange is wrong -> http://bugzilla.netfilter.org/show_bug.cgi?id=748 IPv6 bridging bug -> http://bugzilla.netfilter.org/show_bug.cgi?id=751 ipq_read() will return an error (rc = -1) and the error message says "Received truncated message" -> http://bugzilla.netfilter.org/show_bug.cgi?id=752 change bugzilla account e-mail -> http://bugzilla.netfilter.org/show_bug.cgi?id=755 iptables: Memory allocation problem. -> http://bugzilla.netfilter.org/show_bug.cgi?id=756 Retry iptables command on transient failure -> http://bugzilla.netfilter.org/show_bug.cgi?id=758 "iptables -m recent" crashes a LXC host on lxc-stop -> http://bugzilla.netfilter.org/show_bug.cgi?id=759 nf_ct_sip dropping SIP messages larger then MTU -> http://bugzilla.netfilter.org/show_bug.cgi?id=760 dnat and snat not changing port numbers on sctp packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=763 Doing -Z twice in parallel breaks counters -> http://bugzilla.netfilter.org/show_bug.cgi?id=764 Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule -> http://bugzilla.netfilter.org/show_bug.cgi?id=766 Fix a compiler warning [-Wunused-variable] -> http://bugzilla.netfilter.org/show_bug.cgi?id=767 Returns the position the entry was inserted -> http://bugzilla.netfilter.org/show_bug.cgi?id=768 iptables SNAT does not handle argument --persistent -> http://bugzilla.netfilter.org/show_bug.cgi?id=769 ipt_REJECT: multi-directional tcp-reset -> http://bugzilla.netfilter.org/show_bug.cgi?id=770 nf_conntrack_proto_tcp BUG?? -> http://bugzilla.netfilter.org/show_bug.cgi?id=771 Rate Limiting -> http://bugzilla.netfilter.org/show_bug.cgi?id=772 -m owner ! --uid-owner False positive logging -> http://bugzilla.netfilter.org/show_bug.cgi?id=775 Suspect bug in __do_replace() -> http://bugzilla.netfilter.org/show_bug.cgi?id=777 NFQUEUE --queue-bypass accepts all packets when no userspace application is available -> http://bugzilla.netfilter.org/show_bug.cgi?id=778 Netfilter on bridge interface containing a defective NIC -> http://bugzilla.netfilter.org/show_bug.cgi?id=779 Memory utilization continuously increasing day by day -> http://bugzilla.netfilter.org/show_bug.cgi?id=784 Normalize iptables rules -> http://bugzilla.netfilter.org/show_bug.cgi?id=790 ulogd -d does not close all fds -> http://bugzilla.netfilter.org/show_bug.cgi?id=793 -f option used with iptables -> http://bugzilla.netfilter.org/show_bug.cgi?id=794 RELATED doesn't accommodate multicast UDP solicitation resulting in unicast reply -> http://bugzilla.netfilter.org/show_bug.cgi?id=795 ip6tables (iptables) "state" test fails to correctly determine the state of packet streams; will not jump to ACCEPT on ESTABLISHED,RELATED connections -> http://bugzilla.netfilter.org/show_bug.cgi?id=796 Match Order Matters When Using Hashlimit -> http://bugzilla.netfilter.org/show_bug.cgi?id=797 sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook -> http://bugzilla.netfilter.org/show_bug.cgi?id=800 Bridge dropping Ipsec fragmented packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=801
bugzilla-daemon at bugzilla.netfilter.org
2012-Nov-25 00:46 UTC
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.] You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require attention. All of these bugs are in the NEW or REOPENED state, and have not been touched in 7 days or more. You need to take a look at them, and decide on an initial action. Generally, this means one of three things: (1) You decide this bug is really quick to deal with (like, it's INVALID), and so you get rid of it immediately. (2) You decide the bug doesn't belong to you, and you reassign it to someone else. (Hint: if you don't know who to reassign it to, make sure that the Component field seems reasonable, and then use the "Reset Assignee to default" option.) (3) You decide the bug belongs to you, but you can't solve it this moment. Accept the bug by setting the status to ASSIGNED. To get a list of all NEW/REOPENED bugs, you can use this URL (bookmark it if you like!): http://bugzilla.netfilter.org/buglist.cgi?bug_status=NEW&bug_status=REOPENED&assigned_to=netfilter-buglog at lists.netfilter.org Or, you can use the general query page, at http://bugzilla.netfilter.org/query.cgi Appended below are the individual URLs to get to all of your NEW bugs that haven't been touched for 7 days or more. You will get this message once a day until you've dealt with these bugs! Enhancement: Allow rules to specify ICMP type ranges. -> http://bugzilla.netfilter.org/show_bug.cgi?id=630 In IPv6 route information doesn't get flushed out when deleting and creating a new interface -> http://bugzilla.netfilter.org/show_bug.cgi?id=655 netfilters clamp-mss-to-pmtu sets bad MSS when none was set before -> http://bugzilla.netfilter.org/show_bug.cgi?id=662 Postrouting + IPsec + IPv6 -> http://bugzilla.netfilter.org/show_bug.cgi?id=663 connlimit doesn't work properly -> http://bugzilla.netfilter.org/show_bug.cgi?id=676 add PID and UID to netfilter-queue -> http://bugzilla.netfilter.org/show_bug.cgi?id=678 iptables-xml missing <match> in first <conditions> node -> http://bugzilla.netfilter.org/show_bug.cgi?id=679 Packets disappear after NAT on 2nd gateway -> http://bugzilla.netfilter.org/show_bug.cgi?id=680 Ruleset counter on -m recent match when recent table OVERFLOWED. -> http://bugzilla.netfilter.org/show_bug.cgi?id=689 Netfilter NAT engine conflicts with iproute2 routing cache purge -> http://bugzilla.netfilter.org/show_bug.cgi?id=690 SNAT is failing to maquerade some TCP RST packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=693 Files with the same name in case-insensitive file systems -> http://bugzilla.netfilter.org/show_bug.cgi?id=694 Extra tcp options for REJECT --reject-with tcp-reset-both / tcp-reset-destination -> http://bugzilla.netfilter.org/show_bug.cgi?id=696 please add new options to iptables-restore to continue on error and suppress error output -> http://bugzilla.netfilter.org/show_bug.cgi?id=699 PPPoE masqeuraded connection reset when talking to Amazon S3 -> http://bugzilla.netfilter.org/show_bug.cgi?id=701 A way to convert an iptables command to its iptables-save equivalent output -> http://bugzilla.netfilter.org/show_bug.cgi?id=705 Some accepted packets get lost -> http://bugzilla.netfilter.org/show_bug.cgi?id=708 nfq_nfnlh() and nfq_fd() should have const arguments -> http://bugzilla.netfilter.org/show_bug.cgi?id=715 double entry of nf_conntrack_max in /proc -> http://bugzilla.netfilter.org/show_bug.cgi?id=722 Errors in compiling nfqnl_test.c -> http://bugzilla.netfilter.org/show_bug.cgi?id=743 Range check for ulog-cprange is wrong -> http://bugzilla.netfilter.org/show_bug.cgi?id=748 IPv6 bridging bug -> http://bugzilla.netfilter.org/show_bug.cgi?id=751 ipq_read() will return an error (rc = -1) and the error message says "Received truncated message" -> http://bugzilla.netfilter.org/show_bug.cgi?id=752 change bugzilla account e-mail -> http://bugzilla.netfilter.org/show_bug.cgi?id=755 iptables: Memory allocation problem. -> http://bugzilla.netfilter.org/show_bug.cgi?id=756 Retry iptables command on transient failure -> http://bugzilla.netfilter.org/show_bug.cgi?id=758 "iptables -m recent" crashes a LXC host on lxc-stop -> http://bugzilla.netfilter.org/show_bug.cgi?id=759 nf_ct_sip dropping SIP messages larger then MTU -> http://bugzilla.netfilter.org/show_bug.cgi?id=760 dnat and snat not changing port numbers on sctp packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=763 Doing -Z twice in parallel breaks counters -> http://bugzilla.netfilter.org/show_bug.cgi?id=764 Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule -> http://bugzilla.netfilter.org/show_bug.cgi?id=766 Fix a compiler warning [-Wunused-variable] -> http://bugzilla.netfilter.org/show_bug.cgi?id=767 Returns the position the entry was inserted -> http://bugzilla.netfilter.org/show_bug.cgi?id=768 iptables SNAT does not handle argument --persistent -> http://bugzilla.netfilter.org/show_bug.cgi?id=769 ipt_REJECT: multi-directional tcp-reset -> http://bugzilla.netfilter.org/show_bug.cgi?id=770 nf_conntrack_proto_tcp BUG?? -> http://bugzilla.netfilter.org/show_bug.cgi?id=771 Rate Limiting -> http://bugzilla.netfilter.org/show_bug.cgi?id=772 -m owner ! --uid-owner False positive logging -> http://bugzilla.netfilter.org/show_bug.cgi?id=775 Suspect bug in __do_replace() -> http://bugzilla.netfilter.org/show_bug.cgi?id=777 NFQUEUE --queue-bypass accepts all packets when no userspace application is available -> http://bugzilla.netfilter.org/show_bug.cgi?id=778 Netfilter on bridge interface containing a defective NIC -> http://bugzilla.netfilter.org/show_bug.cgi?id=779 Memory utilization continuously increasing day by day -> http://bugzilla.netfilter.org/show_bug.cgi?id=784 Normalize iptables rules -> http://bugzilla.netfilter.org/show_bug.cgi?id=790 ulogd -d does not close all fds -> http://bugzilla.netfilter.org/show_bug.cgi?id=793 -f option used with iptables -> http://bugzilla.netfilter.org/show_bug.cgi?id=794 RELATED doesn't accommodate multicast UDP solicitation resulting in unicast reply -> http://bugzilla.netfilter.org/show_bug.cgi?id=795 ip6tables (iptables) "state" test fails to correctly determine the state of packet streams; will not jump to ACCEPT on ESTABLISHED,RELATED connections -> http://bugzilla.netfilter.org/show_bug.cgi?id=796 Match Order Matters When Using Hashlimit -> http://bugzilla.netfilter.org/show_bug.cgi?id=797 sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook -> http://bugzilla.netfilter.org/show_bug.cgi?id=800 Bridge dropping Ipsec fragmented packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=801
bugzilla-daemon at bugzilla.netfilter.org
2012-Nov-26 00:46 UTC
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.] You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require attention. All of these bugs are in the NEW or REOPENED state, and have not been touched in 7 days or more. You need to take a look at them, and decide on an initial action. Generally, this means one of three things: (1) You decide this bug is really quick to deal with (like, it's INVALID), and so you get rid of it immediately. (2) You decide the bug doesn't belong to you, and you reassign it to someone else. (Hint: if you don't know who to reassign it to, make sure that the Component field seems reasonable, and then use the "Reset Assignee to default" option.) (3) You decide the bug belongs to you, but you can't solve it this moment. Accept the bug by setting the status to ASSIGNED. To get a list of all NEW/REOPENED bugs, you can use this URL (bookmark it if you like!): http://bugzilla.netfilter.org/buglist.cgi?bug_status=NEW&bug_status=REOPENED&assigned_to=netfilter-buglog at lists.netfilter.org Or, you can use the general query page, at http://bugzilla.netfilter.org/query.cgi Appended below are the individual URLs to get to all of your NEW bugs that haven't been touched for 7 days or more. You will get this message once a day until you've dealt with these bugs! Enhancement: Allow rules to specify ICMP type ranges. -> http://bugzilla.netfilter.org/show_bug.cgi?id=630 In IPv6 route information doesn't get flushed out when deleting and creating a new interface -> http://bugzilla.netfilter.org/show_bug.cgi?id=655 netfilters clamp-mss-to-pmtu sets bad MSS when none was set before -> http://bugzilla.netfilter.org/show_bug.cgi?id=662 Postrouting + IPsec + IPv6 -> http://bugzilla.netfilter.org/show_bug.cgi?id=663 connlimit doesn't work properly -> http://bugzilla.netfilter.org/show_bug.cgi?id=676 add PID and UID to netfilter-queue -> http://bugzilla.netfilter.org/show_bug.cgi?id=678 iptables-xml missing <match> in first <conditions> node -> http://bugzilla.netfilter.org/show_bug.cgi?id=679 Packets disappear after NAT on 2nd gateway -> http://bugzilla.netfilter.org/show_bug.cgi?id=680 Ruleset counter on -m recent match when recent table OVERFLOWED. -> http://bugzilla.netfilter.org/show_bug.cgi?id=689 Netfilter NAT engine conflicts with iproute2 routing cache purge -> http://bugzilla.netfilter.org/show_bug.cgi?id=690 SNAT is failing to maquerade some TCP RST packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=693 Files with the same name in case-insensitive file systems -> http://bugzilla.netfilter.org/show_bug.cgi?id=694 Extra tcp options for REJECT --reject-with tcp-reset-both / tcp-reset-destination -> http://bugzilla.netfilter.org/show_bug.cgi?id=696 please add new options to iptables-restore to continue on error and suppress error output -> http://bugzilla.netfilter.org/show_bug.cgi?id=699 PPPoE masqeuraded connection reset when talking to Amazon S3 -> http://bugzilla.netfilter.org/show_bug.cgi?id=701 A way to convert an iptables command to its iptables-save equivalent output -> http://bugzilla.netfilter.org/show_bug.cgi?id=705 Some accepted packets get lost -> http://bugzilla.netfilter.org/show_bug.cgi?id=708 nfq_nfnlh() and nfq_fd() should have const arguments -> http://bugzilla.netfilter.org/show_bug.cgi?id=715 double entry of nf_conntrack_max in /proc -> http://bugzilla.netfilter.org/show_bug.cgi?id=722 Errors in compiling nfqnl_test.c -> http://bugzilla.netfilter.org/show_bug.cgi?id=743 Range check for ulog-cprange is wrong -> http://bugzilla.netfilter.org/show_bug.cgi?id=748 IPv6 bridging bug -> http://bugzilla.netfilter.org/show_bug.cgi?id=751 ipq_read() will return an error (rc = -1) and the error message says "Received truncated message" -> http://bugzilla.netfilter.org/show_bug.cgi?id=752 change bugzilla account e-mail -> http://bugzilla.netfilter.org/show_bug.cgi?id=755 iptables: Memory allocation problem. -> http://bugzilla.netfilter.org/show_bug.cgi?id=756 Retry iptables command on transient failure -> http://bugzilla.netfilter.org/show_bug.cgi?id=758 "iptables -m recent" crashes a LXC host on lxc-stop -> http://bugzilla.netfilter.org/show_bug.cgi?id=759 nf_ct_sip dropping SIP messages larger then MTU -> http://bugzilla.netfilter.org/show_bug.cgi?id=760 dnat and snat not changing port numbers on sctp packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=763 Doing -Z twice in parallel breaks counters -> http://bugzilla.netfilter.org/show_bug.cgi?id=764 Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule -> http://bugzilla.netfilter.org/show_bug.cgi?id=766 Fix a compiler warning [-Wunused-variable] -> http://bugzilla.netfilter.org/show_bug.cgi?id=767 Returns the position the entry was inserted -> http://bugzilla.netfilter.org/show_bug.cgi?id=768 iptables SNAT does not handle argument --persistent -> http://bugzilla.netfilter.org/show_bug.cgi?id=769 ipt_REJECT: multi-directional tcp-reset -> http://bugzilla.netfilter.org/show_bug.cgi?id=770 nf_conntrack_proto_tcp BUG?? -> http://bugzilla.netfilter.org/show_bug.cgi?id=771 Rate Limiting -> http://bugzilla.netfilter.org/show_bug.cgi?id=772 -m owner ! --uid-owner False positive logging -> http://bugzilla.netfilter.org/show_bug.cgi?id=775 Suspect bug in __do_replace() -> http://bugzilla.netfilter.org/show_bug.cgi?id=777 NFQUEUE --queue-bypass accepts all packets when no userspace application is available -> http://bugzilla.netfilter.org/show_bug.cgi?id=778 Netfilter on bridge interface containing a defective NIC -> http://bugzilla.netfilter.org/show_bug.cgi?id=779 Memory utilization continuously increasing day by day -> http://bugzilla.netfilter.org/show_bug.cgi?id=784 Normalize iptables rules -> http://bugzilla.netfilter.org/show_bug.cgi?id=790 ulogd -d does not close all fds -> http://bugzilla.netfilter.org/show_bug.cgi?id=793 -f option used with iptables -> http://bugzilla.netfilter.org/show_bug.cgi?id=794 RELATED doesn't accommodate multicast UDP solicitation resulting in unicast reply -> http://bugzilla.netfilter.org/show_bug.cgi?id=795 ip6tables (iptables) "state" test fails to correctly determine the state of packet streams; will not jump to ACCEPT on ESTABLISHED,RELATED connections -> http://bugzilla.netfilter.org/show_bug.cgi?id=796 Match Order Matters When Using Hashlimit -> http://bugzilla.netfilter.org/show_bug.cgi?id=797 sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook -> http://bugzilla.netfilter.org/show_bug.cgi?id=800 Bridge dropping Ipsec fragmented packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=801
bugzilla-daemon at bugzilla.netfilter.org
2012-Nov-27 00:46 UTC
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.] You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require attention. All of these bugs are in the NEW or REOPENED state, and have not been touched in 7 days or more. You need to take a look at them, and decide on an initial action. Generally, this means one of three things: (1) You decide this bug is really quick to deal with (like, it's INVALID), and so you get rid of it immediately. (2) You decide the bug doesn't belong to you, and you reassign it to someone else. (Hint: if you don't know who to reassign it to, make sure that the Component field seems reasonable, and then use the "Reset Assignee to default" option.) (3) You decide the bug belongs to you, but you can't solve it this moment. Accept the bug by setting the status to ASSIGNED. To get a list of all NEW/REOPENED bugs, you can use this URL (bookmark it if you like!): http://bugzilla.netfilter.org/buglist.cgi?bug_status=NEW&bug_status=REOPENED&assigned_to=netfilter-buglog at lists.netfilter.org Or, you can use the general query page, at http://bugzilla.netfilter.org/query.cgi Appended below are the individual URLs to get to all of your NEW bugs that haven't been touched for 7 days or more. You will get this message once a day until you've dealt with these bugs! Enhancement: Allow rules to specify ICMP type ranges. -> http://bugzilla.netfilter.org/show_bug.cgi?id=630 In IPv6 route information doesn't get flushed out when deleting and creating a new interface -> http://bugzilla.netfilter.org/show_bug.cgi?id=655 netfilters clamp-mss-to-pmtu sets bad MSS when none was set before -> http://bugzilla.netfilter.org/show_bug.cgi?id=662 Postrouting + IPsec + IPv6 -> http://bugzilla.netfilter.org/show_bug.cgi?id=663 connlimit doesn't work properly -> http://bugzilla.netfilter.org/show_bug.cgi?id=676 add PID and UID to netfilter-queue -> http://bugzilla.netfilter.org/show_bug.cgi?id=678 iptables-xml missing <match> in first <conditions> node -> http://bugzilla.netfilter.org/show_bug.cgi?id=679 Packets disappear after NAT on 2nd gateway -> http://bugzilla.netfilter.org/show_bug.cgi?id=680 Ruleset counter on -m recent match when recent table OVERFLOWED. -> http://bugzilla.netfilter.org/show_bug.cgi?id=689 Netfilter NAT engine conflicts with iproute2 routing cache purge -> http://bugzilla.netfilter.org/show_bug.cgi?id=690 SNAT is failing to maquerade some TCP RST packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=693 Files with the same name in case-insensitive file systems -> http://bugzilla.netfilter.org/show_bug.cgi?id=694 Extra tcp options for REJECT --reject-with tcp-reset-both / tcp-reset-destination -> http://bugzilla.netfilter.org/show_bug.cgi?id=696 please add new options to iptables-restore to continue on error and suppress error output -> http://bugzilla.netfilter.org/show_bug.cgi?id=699 PPPoE masqeuraded connection reset when talking to Amazon S3 -> http://bugzilla.netfilter.org/show_bug.cgi?id=701 A way to convert an iptables command to its iptables-save equivalent output -> http://bugzilla.netfilter.org/show_bug.cgi?id=705 Some accepted packets get lost -> http://bugzilla.netfilter.org/show_bug.cgi?id=708 nfq_nfnlh() and nfq_fd() should have const arguments -> http://bugzilla.netfilter.org/show_bug.cgi?id=715 double entry of nf_conntrack_max in /proc -> http://bugzilla.netfilter.org/show_bug.cgi?id=722 Errors in compiling nfqnl_test.c -> http://bugzilla.netfilter.org/show_bug.cgi?id=743 Range check for ulog-cprange is wrong -> http://bugzilla.netfilter.org/show_bug.cgi?id=748 IPv6 bridging bug -> http://bugzilla.netfilter.org/show_bug.cgi?id=751 ipq_read() will return an error (rc = -1) and the error message says "Received truncated message" -> http://bugzilla.netfilter.org/show_bug.cgi?id=752 change bugzilla account e-mail -> http://bugzilla.netfilter.org/show_bug.cgi?id=755 iptables: Memory allocation problem. -> http://bugzilla.netfilter.org/show_bug.cgi?id=756 Retry iptables command on transient failure -> http://bugzilla.netfilter.org/show_bug.cgi?id=758 "iptables -m recent" crashes a LXC host on lxc-stop -> http://bugzilla.netfilter.org/show_bug.cgi?id=759 nf_ct_sip dropping SIP messages larger then MTU -> http://bugzilla.netfilter.org/show_bug.cgi?id=760 dnat and snat not changing port numbers on sctp packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=763 Doing -Z twice in parallel breaks counters -> http://bugzilla.netfilter.org/show_bug.cgi?id=764 Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule -> http://bugzilla.netfilter.org/show_bug.cgi?id=766 Fix a compiler warning [-Wunused-variable] -> http://bugzilla.netfilter.org/show_bug.cgi?id=767 Returns the position the entry was inserted -> http://bugzilla.netfilter.org/show_bug.cgi?id=768 iptables SNAT does not handle argument --persistent -> http://bugzilla.netfilter.org/show_bug.cgi?id=769 ipt_REJECT: multi-directional tcp-reset -> http://bugzilla.netfilter.org/show_bug.cgi?id=770 nf_conntrack_proto_tcp BUG?? -> http://bugzilla.netfilter.org/show_bug.cgi?id=771 Rate Limiting -> http://bugzilla.netfilter.org/show_bug.cgi?id=772 -m owner ! --uid-owner False positive logging -> http://bugzilla.netfilter.org/show_bug.cgi?id=775 Suspect bug in __do_replace() -> http://bugzilla.netfilter.org/show_bug.cgi?id=777 NFQUEUE --queue-bypass accepts all packets when no userspace application is available -> http://bugzilla.netfilter.org/show_bug.cgi?id=778 Netfilter on bridge interface containing a defective NIC -> http://bugzilla.netfilter.org/show_bug.cgi?id=779 Memory utilization continuously increasing day by day -> http://bugzilla.netfilter.org/show_bug.cgi?id=784 Normalize iptables rules -> http://bugzilla.netfilter.org/show_bug.cgi?id=790 ulogd -d does not close all fds -> http://bugzilla.netfilter.org/show_bug.cgi?id=793 -f option used with iptables -> http://bugzilla.netfilter.org/show_bug.cgi?id=794 RELATED doesn't accommodate multicast UDP solicitation resulting in unicast reply -> http://bugzilla.netfilter.org/show_bug.cgi?id=795 ip6tables (iptables) "state" test fails to correctly determine the state of packet streams; will not jump to ACCEPT on ESTABLISHED,RELATED connections -> http://bugzilla.netfilter.org/show_bug.cgi?id=796 Match Order Matters When Using Hashlimit -> http://bugzilla.netfilter.org/show_bug.cgi?id=797 sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook -> http://bugzilla.netfilter.org/show_bug.cgi?id=800 Bridge dropping Ipsec fragmented packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=801
bugzilla-daemon at bugzilla.netfilter.org
2012-Nov-28 00:46 UTC
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.] You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require attention. All of these bugs are in the NEW or REOPENED state, and have not been touched in 7 days or more. You need to take a look at them, and decide on an initial action. Generally, this means one of three things: (1) You decide this bug is really quick to deal with (like, it's INVALID), and so you get rid of it immediately. (2) You decide the bug doesn't belong to you, and you reassign it to someone else. (Hint: if you don't know who to reassign it to, make sure that the Component field seems reasonable, and then use the "Reset Assignee to default" option.) (3) You decide the bug belongs to you, but you can't solve it this moment. Accept the bug by setting the status to ASSIGNED. To get a list of all NEW/REOPENED bugs, you can use this URL (bookmark it if you like!): http://bugzilla.netfilter.org/buglist.cgi?bug_status=NEW&bug_status=REOPENED&assigned_to=netfilter-buglog at lists.netfilter.org Or, you can use the general query page, at http://bugzilla.netfilter.org/query.cgi Appended below are the individual URLs to get to all of your NEW bugs that haven't been touched for 7 days or more. You will get this message once a day until you've dealt with these bugs! Enhancement: Allow rules to specify ICMP type ranges. -> http://bugzilla.netfilter.org/show_bug.cgi?id=630 In IPv6 route information doesn't get flushed out when deleting and creating a new interface -> http://bugzilla.netfilter.org/show_bug.cgi?id=655 netfilters clamp-mss-to-pmtu sets bad MSS when none was set before -> http://bugzilla.netfilter.org/show_bug.cgi?id=662 Postrouting + IPsec + IPv6 -> http://bugzilla.netfilter.org/show_bug.cgi?id=663 connlimit doesn't work properly -> http://bugzilla.netfilter.org/show_bug.cgi?id=676 add PID and UID to netfilter-queue -> http://bugzilla.netfilter.org/show_bug.cgi?id=678 iptables-xml missing <match> in first <conditions> node -> http://bugzilla.netfilter.org/show_bug.cgi?id=679 Packets disappear after NAT on 2nd gateway -> http://bugzilla.netfilter.org/show_bug.cgi?id=680 Ruleset counter on -m recent match when recent table OVERFLOWED. -> http://bugzilla.netfilter.org/show_bug.cgi?id=689 Netfilter NAT engine conflicts with iproute2 routing cache purge -> http://bugzilla.netfilter.org/show_bug.cgi?id=690 SNAT is failing to maquerade some TCP RST packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=693 Files with the same name in case-insensitive file systems -> http://bugzilla.netfilter.org/show_bug.cgi?id=694 Extra tcp options for REJECT --reject-with tcp-reset-both / tcp-reset-destination -> http://bugzilla.netfilter.org/show_bug.cgi?id=696 please add new options to iptables-restore to continue on error and suppress error output -> http://bugzilla.netfilter.org/show_bug.cgi?id=699 PPPoE masqeuraded connection reset when talking to Amazon S3 -> http://bugzilla.netfilter.org/show_bug.cgi?id=701 A way to convert an iptables command to its iptables-save equivalent output -> http://bugzilla.netfilter.org/show_bug.cgi?id=705 Some accepted packets get lost -> http://bugzilla.netfilter.org/show_bug.cgi?id=708 nfq_nfnlh() and nfq_fd() should have const arguments -> http://bugzilla.netfilter.org/show_bug.cgi?id=715 double entry of nf_conntrack_max in /proc -> http://bugzilla.netfilter.org/show_bug.cgi?id=722 Errors in compiling nfqnl_test.c -> http://bugzilla.netfilter.org/show_bug.cgi?id=743 Range check for ulog-cprange is wrong -> http://bugzilla.netfilter.org/show_bug.cgi?id=748 IPv6 bridging bug -> http://bugzilla.netfilter.org/show_bug.cgi?id=751 ipq_read() will return an error (rc = -1) and the error message says "Received truncated message" -> http://bugzilla.netfilter.org/show_bug.cgi?id=752 change bugzilla account e-mail -> http://bugzilla.netfilter.org/show_bug.cgi?id=755 iptables: Memory allocation problem. -> http://bugzilla.netfilter.org/show_bug.cgi?id=756 Retry iptables command on transient failure -> http://bugzilla.netfilter.org/show_bug.cgi?id=758 "iptables -m recent" crashes a LXC host on lxc-stop -> http://bugzilla.netfilter.org/show_bug.cgi?id=759 nf_ct_sip dropping SIP messages larger then MTU -> http://bugzilla.netfilter.org/show_bug.cgi?id=760 dnat and snat not changing port numbers on sctp packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=763 Doing -Z twice in parallel breaks counters -> http://bugzilla.netfilter.org/show_bug.cgi?id=764 Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule -> http://bugzilla.netfilter.org/show_bug.cgi?id=766 Fix a compiler warning [-Wunused-variable] -> http://bugzilla.netfilter.org/show_bug.cgi?id=767 Returns the position the entry was inserted -> http://bugzilla.netfilter.org/show_bug.cgi?id=768 iptables SNAT does not handle argument --persistent -> http://bugzilla.netfilter.org/show_bug.cgi?id=769 ipt_REJECT: multi-directional tcp-reset -> http://bugzilla.netfilter.org/show_bug.cgi?id=770 nf_conntrack_proto_tcp BUG?? -> http://bugzilla.netfilter.org/show_bug.cgi?id=771 Rate Limiting -> http://bugzilla.netfilter.org/show_bug.cgi?id=772 -m owner ! --uid-owner False positive logging -> http://bugzilla.netfilter.org/show_bug.cgi?id=775 Suspect bug in __do_replace() -> http://bugzilla.netfilter.org/show_bug.cgi?id=777 NFQUEUE --queue-bypass accepts all packets when no userspace application is available -> http://bugzilla.netfilter.org/show_bug.cgi?id=778 Netfilter on bridge interface containing a defective NIC -> http://bugzilla.netfilter.org/show_bug.cgi?id=779 Memory utilization continuously increasing day by day -> http://bugzilla.netfilter.org/show_bug.cgi?id=784 Normalize iptables rules -> http://bugzilla.netfilter.org/show_bug.cgi?id=790 ulogd -d does not close all fds -> http://bugzilla.netfilter.org/show_bug.cgi?id=793 -f option used with iptables -> http://bugzilla.netfilter.org/show_bug.cgi?id=794 RELATED doesn't accommodate multicast UDP solicitation resulting in unicast reply -> http://bugzilla.netfilter.org/show_bug.cgi?id=795 ip6tables (iptables) "state" test fails to correctly determine the state of packet streams; will not jump to ACCEPT on ESTABLISHED,RELATED connections -> http://bugzilla.netfilter.org/show_bug.cgi?id=796 Match Order Matters When Using Hashlimit -> http://bugzilla.netfilter.org/show_bug.cgi?id=797 sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook -> http://bugzilla.netfilter.org/show_bug.cgi?id=800 Bridge dropping Ipsec fragmented packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=801 Lack of error feedback on SELinux denial -> http://bugzilla.netfilter.org/show_bug.cgi?id=802
bugzilla-daemon at bugzilla.netfilter.org
2012-Nov-29 00:46 UTC
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.] You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require attention. All of these bugs are in the NEW or REOPENED state, and have not been touched in 7 days or more. You need to take a look at them, and decide on an initial action. Generally, this means one of three things: (1) You decide this bug is really quick to deal with (like, it's INVALID), and so you get rid of it immediately. (2) You decide the bug doesn't belong to you, and you reassign it to someone else. (Hint: if you don't know who to reassign it to, make sure that the Component field seems reasonable, and then use the "Reset Assignee to default" option.) (3) You decide the bug belongs to you, but you can't solve it this moment. Accept the bug by setting the status to ASSIGNED. To get a list of all NEW/REOPENED bugs, you can use this URL (bookmark it if you like!): http://bugzilla.netfilter.org/buglist.cgi?bug_status=NEW&bug_status=REOPENED&assigned_to=netfilter-buglog at lists.netfilter.org Or, you can use the general query page, at http://bugzilla.netfilter.org/query.cgi Appended below are the individual URLs to get to all of your NEW bugs that haven't been touched for 7 days or more. You will get this message once a day until you've dealt with these bugs! Enhancement: Allow rules to specify ICMP type ranges. -> http://bugzilla.netfilter.org/show_bug.cgi?id=630 In IPv6 route information doesn't get flushed out when deleting and creating a new interface -> http://bugzilla.netfilter.org/show_bug.cgi?id=655 netfilters clamp-mss-to-pmtu sets bad MSS when none was set before -> http://bugzilla.netfilter.org/show_bug.cgi?id=662 Postrouting + IPsec + IPv6 -> http://bugzilla.netfilter.org/show_bug.cgi?id=663 connlimit doesn't work properly -> http://bugzilla.netfilter.org/show_bug.cgi?id=676 add PID and UID to netfilter-queue -> http://bugzilla.netfilter.org/show_bug.cgi?id=678 iptables-xml missing <match> in first <conditions> node -> http://bugzilla.netfilter.org/show_bug.cgi?id=679 Packets disappear after NAT on 2nd gateway -> http://bugzilla.netfilter.org/show_bug.cgi?id=680 Ruleset counter on -m recent match when recent table OVERFLOWED. -> http://bugzilla.netfilter.org/show_bug.cgi?id=689 Netfilter NAT engine conflicts with iproute2 routing cache purge -> http://bugzilla.netfilter.org/show_bug.cgi?id=690 SNAT is failing to maquerade some TCP RST packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=693 Files with the same name in case-insensitive file systems -> http://bugzilla.netfilter.org/show_bug.cgi?id=694 Extra tcp options for REJECT --reject-with tcp-reset-both / tcp-reset-destination -> http://bugzilla.netfilter.org/show_bug.cgi?id=696 please add new options to iptables-restore to continue on error and suppress error output -> http://bugzilla.netfilter.org/show_bug.cgi?id=699 PPPoE masqeuraded connection reset when talking to Amazon S3 -> http://bugzilla.netfilter.org/show_bug.cgi?id=701 A way to convert an iptables command to its iptables-save equivalent output -> http://bugzilla.netfilter.org/show_bug.cgi?id=705 Some accepted packets get lost -> http://bugzilla.netfilter.org/show_bug.cgi?id=708 nfq_nfnlh() and nfq_fd() should have const arguments -> http://bugzilla.netfilter.org/show_bug.cgi?id=715 double entry of nf_conntrack_max in /proc -> http://bugzilla.netfilter.org/show_bug.cgi?id=722 Errors in compiling nfqnl_test.c -> http://bugzilla.netfilter.org/show_bug.cgi?id=743 Range check for ulog-cprange is wrong -> http://bugzilla.netfilter.org/show_bug.cgi?id=748 IPv6 bridging bug -> http://bugzilla.netfilter.org/show_bug.cgi?id=751 ipq_read() will return an error (rc = -1) and the error message says "Received truncated message" -> http://bugzilla.netfilter.org/show_bug.cgi?id=752 change bugzilla account e-mail -> http://bugzilla.netfilter.org/show_bug.cgi?id=755 iptables: Memory allocation problem. -> http://bugzilla.netfilter.org/show_bug.cgi?id=756 Retry iptables command on transient failure -> http://bugzilla.netfilter.org/show_bug.cgi?id=758 "iptables -m recent" crashes a LXC host on lxc-stop -> http://bugzilla.netfilter.org/show_bug.cgi?id=759 nf_ct_sip dropping SIP messages larger then MTU -> http://bugzilla.netfilter.org/show_bug.cgi?id=760 dnat and snat not changing port numbers on sctp packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=763 Doing -Z twice in parallel breaks counters -> http://bugzilla.netfilter.org/show_bug.cgi?id=764 Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule -> http://bugzilla.netfilter.org/show_bug.cgi?id=766 Fix a compiler warning [-Wunused-variable] -> http://bugzilla.netfilter.org/show_bug.cgi?id=767 Returns the position the entry was inserted -> http://bugzilla.netfilter.org/show_bug.cgi?id=768 iptables SNAT does not handle argument --persistent -> http://bugzilla.netfilter.org/show_bug.cgi?id=769 ipt_REJECT: multi-directional tcp-reset -> http://bugzilla.netfilter.org/show_bug.cgi?id=770 nf_conntrack_proto_tcp BUG?? -> http://bugzilla.netfilter.org/show_bug.cgi?id=771 Rate Limiting -> http://bugzilla.netfilter.org/show_bug.cgi?id=772 -m owner ! --uid-owner False positive logging -> http://bugzilla.netfilter.org/show_bug.cgi?id=775 Suspect bug in __do_replace() -> http://bugzilla.netfilter.org/show_bug.cgi?id=777 NFQUEUE --queue-bypass accepts all packets when no userspace application is available -> http://bugzilla.netfilter.org/show_bug.cgi?id=778 Netfilter on bridge interface containing a defective NIC -> http://bugzilla.netfilter.org/show_bug.cgi?id=779 Memory utilization continuously increasing day by day -> http://bugzilla.netfilter.org/show_bug.cgi?id=784 Normalize iptables rules -> http://bugzilla.netfilter.org/show_bug.cgi?id=790 ulogd -d does not close all fds -> http://bugzilla.netfilter.org/show_bug.cgi?id=793 -f option used with iptables -> http://bugzilla.netfilter.org/show_bug.cgi?id=794 RELATED doesn't accommodate multicast UDP solicitation resulting in unicast reply -> http://bugzilla.netfilter.org/show_bug.cgi?id=795 ip6tables (iptables) "state" test fails to correctly determine the state of packet streams; will not jump to ACCEPT on ESTABLISHED,RELATED connections -> http://bugzilla.netfilter.org/show_bug.cgi?id=796 Match Order Matters When Using Hashlimit -> http://bugzilla.netfilter.org/show_bug.cgi?id=797 sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook -> http://bugzilla.netfilter.org/show_bug.cgi?id=800 Bridge dropping Ipsec fragmented packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=801 Lack of error feedback on SELinux denial -> http://bugzilla.netfilter.org/show_bug.cgi?id=802
bugzilla-daemon at bugzilla.netfilter.org
2012-Nov-30 00:46 UTC
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.] You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require attention. All of these bugs are in the NEW or REOPENED state, and have not been touched in 7 days or more. You need to take a look at them, and decide on an initial action. Generally, this means one of three things: (1) You decide this bug is really quick to deal with (like, it's INVALID), and so you get rid of it immediately. (2) You decide the bug doesn't belong to you, and you reassign it to someone else. (Hint: if you don't know who to reassign it to, make sure that the Component field seems reasonable, and then use the "Reset Assignee to default" option.) (3) You decide the bug belongs to you, but you can't solve it this moment. Accept the bug by setting the status to ASSIGNED. To get a list of all NEW/REOPENED bugs, you can use this URL (bookmark it if you like!): http://bugzilla.netfilter.org/buglist.cgi?bug_status=NEW&bug_status=REOPENED&assigned_to=netfilter-buglog at lists.netfilter.org Or, you can use the general query page, at http://bugzilla.netfilter.org/query.cgi Appended below are the individual URLs to get to all of your NEW bugs that haven't been touched for 7 days or more. You will get this message once a day until you've dealt with these bugs! Enhancement: Allow rules to specify ICMP type ranges. -> http://bugzilla.netfilter.org/show_bug.cgi?id=630 In IPv6 route information doesn't get flushed out when deleting and creating a new interface -> http://bugzilla.netfilter.org/show_bug.cgi?id=655 netfilters clamp-mss-to-pmtu sets bad MSS when none was set before -> http://bugzilla.netfilter.org/show_bug.cgi?id=662 Postrouting + IPsec + IPv6 -> http://bugzilla.netfilter.org/show_bug.cgi?id=663 connlimit doesn't work properly -> http://bugzilla.netfilter.org/show_bug.cgi?id=676 add PID and UID to netfilter-queue -> http://bugzilla.netfilter.org/show_bug.cgi?id=678 iptables-xml missing <match> in first <conditions> node -> http://bugzilla.netfilter.org/show_bug.cgi?id=679 Packets disappear after NAT on 2nd gateway -> http://bugzilla.netfilter.org/show_bug.cgi?id=680 Ruleset counter on -m recent match when recent table OVERFLOWED. -> http://bugzilla.netfilter.org/show_bug.cgi?id=689 Netfilter NAT engine conflicts with iproute2 routing cache purge -> http://bugzilla.netfilter.org/show_bug.cgi?id=690 SNAT is failing to maquerade some TCP RST packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=693 Files with the same name in case-insensitive file systems -> http://bugzilla.netfilter.org/show_bug.cgi?id=694 Extra tcp options for REJECT --reject-with tcp-reset-both / tcp-reset-destination -> http://bugzilla.netfilter.org/show_bug.cgi?id=696 please add new options to iptables-restore to continue on error and suppress error output -> http://bugzilla.netfilter.org/show_bug.cgi?id=699 PPPoE masqeuraded connection reset when talking to Amazon S3 -> http://bugzilla.netfilter.org/show_bug.cgi?id=701 A way to convert an iptables command to its iptables-save equivalent output -> http://bugzilla.netfilter.org/show_bug.cgi?id=705 Some accepted packets get lost -> http://bugzilla.netfilter.org/show_bug.cgi?id=708 nfq_nfnlh() and nfq_fd() should have const arguments -> http://bugzilla.netfilter.org/show_bug.cgi?id=715 double entry of nf_conntrack_max in /proc -> http://bugzilla.netfilter.org/show_bug.cgi?id=722 Errors in compiling nfqnl_test.c -> http://bugzilla.netfilter.org/show_bug.cgi?id=743 Range check for ulog-cprange is wrong -> http://bugzilla.netfilter.org/show_bug.cgi?id=748 IPv6 bridging bug -> http://bugzilla.netfilter.org/show_bug.cgi?id=751 ipq_read() will return an error (rc = -1) and the error message says "Received truncated message" -> http://bugzilla.netfilter.org/show_bug.cgi?id=752 change bugzilla account e-mail -> http://bugzilla.netfilter.org/show_bug.cgi?id=755 iptables: Memory allocation problem. -> http://bugzilla.netfilter.org/show_bug.cgi?id=756 Retry iptables command on transient failure -> http://bugzilla.netfilter.org/show_bug.cgi?id=758 "iptables -m recent" crashes a LXC host on lxc-stop -> http://bugzilla.netfilter.org/show_bug.cgi?id=759 nf_ct_sip dropping SIP messages larger then MTU -> http://bugzilla.netfilter.org/show_bug.cgi?id=760 dnat and snat not changing port numbers on sctp packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=763 Doing -Z twice in parallel breaks counters -> http://bugzilla.netfilter.org/show_bug.cgi?id=764 Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule -> http://bugzilla.netfilter.org/show_bug.cgi?id=766 Fix a compiler warning [-Wunused-variable] -> http://bugzilla.netfilter.org/show_bug.cgi?id=767 Returns the position the entry was inserted -> http://bugzilla.netfilter.org/show_bug.cgi?id=768 iptables SNAT does not handle argument --persistent -> http://bugzilla.netfilter.org/show_bug.cgi?id=769 ipt_REJECT: multi-directional tcp-reset -> http://bugzilla.netfilter.org/show_bug.cgi?id=770 nf_conntrack_proto_tcp BUG?? -> http://bugzilla.netfilter.org/show_bug.cgi?id=771 Rate Limiting -> http://bugzilla.netfilter.org/show_bug.cgi?id=772 -m owner ! --uid-owner False positive logging -> http://bugzilla.netfilter.org/show_bug.cgi?id=775 Suspect bug in __do_replace() -> http://bugzilla.netfilter.org/show_bug.cgi?id=777 NFQUEUE --queue-bypass accepts all packets when no userspace application is available -> http://bugzilla.netfilter.org/show_bug.cgi?id=778 Netfilter on bridge interface containing a defective NIC -> http://bugzilla.netfilter.org/show_bug.cgi?id=779 Memory utilization continuously increasing day by day -> http://bugzilla.netfilter.org/show_bug.cgi?id=784 Normalize iptables rules -> http://bugzilla.netfilter.org/show_bug.cgi?id=790 ulogd -d does not close all fds -> http://bugzilla.netfilter.org/show_bug.cgi?id=793 -f option used with iptables -> http://bugzilla.netfilter.org/show_bug.cgi?id=794 RELATED doesn't accommodate multicast UDP solicitation resulting in unicast reply -> http://bugzilla.netfilter.org/show_bug.cgi?id=795 ip6tables (iptables) "state" test fails to correctly determine the state of packet streams; will not jump to ACCEPT on ESTABLISHED,RELATED connections -> http://bugzilla.netfilter.org/show_bug.cgi?id=796 Match Order Matters When Using Hashlimit -> http://bugzilla.netfilter.org/show_bug.cgi?id=797 sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook -> http://bugzilla.netfilter.org/show_bug.cgi?id=800 Bridge dropping Ipsec fragmented packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=801 Lack of error feedback on SELinux denial -> http://bugzilla.netfilter.org/show_bug.cgi?id=802
bugzilla-daemon at bugzilla.netfilter.org
2012-Dec-01 00:46 UTC
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.] You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require attention. All of these bugs are in the NEW or REOPENED state, and have not been touched in 7 days or more. You need to take a look at them, and decide on an initial action. Generally, this means one of three things: (1) You decide this bug is really quick to deal with (like, it's INVALID), and so you get rid of it immediately. (2) You decide the bug doesn't belong to you, and you reassign it to someone else. (Hint: if you don't know who to reassign it to, make sure that the Component field seems reasonable, and then use the "Reset Assignee to default" option.) (3) You decide the bug belongs to you, but you can't solve it this moment. Accept the bug by setting the status to ASSIGNED. To get a list of all NEW/REOPENED bugs, you can use this URL (bookmark it if you like!): http://bugzilla.netfilter.org/buglist.cgi?bug_status=NEW&bug_status=REOPENED&assigned_to=netfilter-buglog at lists.netfilter.org Or, you can use the general query page, at http://bugzilla.netfilter.org/query.cgi Appended below are the individual URLs to get to all of your NEW bugs that haven't been touched for 7 days or more. You will get this message once a day until you've dealt with these bugs! Enhancement: Allow rules to specify ICMP type ranges. -> http://bugzilla.netfilter.org/show_bug.cgi?id=630 In IPv6 route information doesn't get flushed out when deleting and creating a new interface -> http://bugzilla.netfilter.org/show_bug.cgi?id=655 netfilters clamp-mss-to-pmtu sets bad MSS when none was set before -> http://bugzilla.netfilter.org/show_bug.cgi?id=662 Postrouting + IPsec + IPv6 -> http://bugzilla.netfilter.org/show_bug.cgi?id=663 connlimit doesn't work properly -> http://bugzilla.netfilter.org/show_bug.cgi?id=676 add PID and UID to netfilter-queue -> http://bugzilla.netfilter.org/show_bug.cgi?id=678 iptables-xml missing <match> in first <conditions> node -> http://bugzilla.netfilter.org/show_bug.cgi?id=679 Packets disappear after NAT on 2nd gateway -> http://bugzilla.netfilter.org/show_bug.cgi?id=680 Ruleset counter on -m recent match when recent table OVERFLOWED. -> http://bugzilla.netfilter.org/show_bug.cgi?id=689 Netfilter NAT engine conflicts with iproute2 routing cache purge -> http://bugzilla.netfilter.org/show_bug.cgi?id=690 SNAT is failing to maquerade some TCP RST packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=693 Files with the same name in case-insensitive file systems -> http://bugzilla.netfilter.org/show_bug.cgi?id=694 Extra tcp options for REJECT --reject-with tcp-reset-both / tcp-reset-destination -> http://bugzilla.netfilter.org/show_bug.cgi?id=696 please add new options to iptables-restore to continue on error and suppress error output -> http://bugzilla.netfilter.org/show_bug.cgi?id=699 PPPoE masqeuraded connection reset when talking to Amazon S3 -> http://bugzilla.netfilter.org/show_bug.cgi?id=701 A way to convert an iptables command to its iptables-save equivalent output -> http://bugzilla.netfilter.org/show_bug.cgi?id=705 Some accepted packets get lost -> http://bugzilla.netfilter.org/show_bug.cgi?id=708 nfq_nfnlh() and nfq_fd() should have const arguments -> http://bugzilla.netfilter.org/show_bug.cgi?id=715 double entry of nf_conntrack_max in /proc -> http://bugzilla.netfilter.org/show_bug.cgi?id=722 Errors in compiling nfqnl_test.c -> http://bugzilla.netfilter.org/show_bug.cgi?id=743 Range check for ulog-cprange is wrong -> http://bugzilla.netfilter.org/show_bug.cgi?id=748 IPv6 bridging bug -> http://bugzilla.netfilter.org/show_bug.cgi?id=751 ipq_read() will return an error (rc = -1) and the error message says "Received truncated message" -> http://bugzilla.netfilter.org/show_bug.cgi?id=752 change bugzilla account e-mail -> http://bugzilla.netfilter.org/show_bug.cgi?id=755 iptables: Memory allocation problem. -> http://bugzilla.netfilter.org/show_bug.cgi?id=756 Retry iptables command on transient failure -> http://bugzilla.netfilter.org/show_bug.cgi?id=758 "iptables -m recent" crashes a LXC host on lxc-stop -> http://bugzilla.netfilter.org/show_bug.cgi?id=759 nf_ct_sip dropping SIP messages larger then MTU -> http://bugzilla.netfilter.org/show_bug.cgi?id=760 dnat and snat not changing port numbers on sctp packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=763 Doing -Z twice in parallel breaks counters -> http://bugzilla.netfilter.org/show_bug.cgi?id=764 Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule -> http://bugzilla.netfilter.org/show_bug.cgi?id=766 Fix a compiler warning [-Wunused-variable] -> http://bugzilla.netfilter.org/show_bug.cgi?id=767 Returns the position the entry was inserted -> http://bugzilla.netfilter.org/show_bug.cgi?id=768 iptables SNAT does not handle argument --persistent -> http://bugzilla.netfilter.org/show_bug.cgi?id=769 ipt_REJECT: multi-directional tcp-reset -> http://bugzilla.netfilter.org/show_bug.cgi?id=770 nf_conntrack_proto_tcp BUG?? -> http://bugzilla.netfilter.org/show_bug.cgi?id=771 Rate Limiting -> http://bugzilla.netfilter.org/show_bug.cgi?id=772 -m owner ! --uid-owner False positive logging -> http://bugzilla.netfilter.org/show_bug.cgi?id=775 Suspect bug in __do_replace() -> http://bugzilla.netfilter.org/show_bug.cgi?id=777 NFQUEUE --queue-bypass accepts all packets when no userspace application is available -> http://bugzilla.netfilter.org/show_bug.cgi?id=778 Netfilter on bridge interface containing a defective NIC -> http://bugzilla.netfilter.org/show_bug.cgi?id=779 Memory utilization continuously increasing day by day -> http://bugzilla.netfilter.org/show_bug.cgi?id=784 Normalize iptables rules -> http://bugzilla.netfilter.org/show_bug.cgi?id=790 ulogd -d does not close all fds -> http://bugzilla.netfilter.org/show_bug.cgi?id=793 -f option used with iptables -> http://bugzilla.netfilter.org/show_bug.cgi?id=794 RELATED doesn't accommodate multicast UDP solicitation resulting in unicast reply -> http://bugzilla.netfilter.org/show_bug.cgi?id=795 ip6tables (iptables) "state" test fails to correctly determine the state of packet streams; will not jump to ACCEPT on ESTABLISHED,RELATED connections -> http://bugzilla.netfilter.org/show_bug.cgi?id=796 Match Order Matters When Using Hashlimit -> http://bugzilla.netfilter.org/show_bug.cgi?id=797 sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook -> http://bugzilla.netfilter.org/show_bug.cgi?id=800 Bridge dropping Ipsec fragmented packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=801 Lack of error feedback on SELinux denial -> http://bugzilla.netfilter.org/show_bug.cgi?id=802
bugzilla-daemon at bugzilla.netfilter.org
2012-Dec-02 00:46 UTC
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.] You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require attention. All of these bugs are in the NEW or REOPENED state, and have not been touched in 7 days or more. You need to take a look at them, and decide on an initial action. Generally, this means one of three things: (1) You decide this bug is really quick to deal with (like, it's INVALID), and so you get rid of it immediately. (2) You decide the bug doesn't belong to you, and you reassign it to someone else. (Hint: if you don't know who to reassign it to, make sure that the Component field seems reasonable, and then use the "Reset Assignee to default" option.) (3) You decide the bug belongs to you, but you can't solve it this moment. Accept the bug by setting the status to ASSIGNED. To get a list of all NEW/REOPENED bugs, you can use this URL (bookmark it if you like!): http://bugzilla.netfilter.org/buglist.cgi?bug_status=NEW&bug_status=REOPENED&assigned_to=netfilter-buglog at lists.netfilter.org Or, you can use the general query page, at http://bugzilla.netfilter.org/query.cgi Appended below are the individual URLs to get to all of your NEW bugs that haven't been touched for 7 days or more. You will get this message once a day until you've dealt with these bugs! Enhancement: Allow rules to specify ICMP type ranges. -> http://bugzilla.netfilter.org/show_bug.cgi?id=630 In IPv6 route information doesn't get flushed out when deleting and creating a new interface -> http://bugzilla.netfilter.org/show_bug.cgi?id=655 netfilters clamp-mss-to-pmtu sets bad MSS when none was set before -> http://bugzilla.netfilter.org/show_bug.cgi?id=662 Postrouting + IPsec + IPv6 -> http://bugzilla.netfilter.org/show_bug.cgi?id=663 connlimit doesn't work properly -> http://bugzilla.netfilter.org/show_bug.cgi?id=676 add PID and UID to netfilter-queue -> http://bugzilla.netfilter.org/show_bug.cgi?id=678 iptables-xml missing <match> in first <conditions> node -> http://bugzilla.netfilter.org/show_bug.cgi?id=679 Packets disappear after NAT on 2nd gateway -> http://bugzilla.netfilter.org/show_bug.cgi?id=680 Ruleset counter on -m recent match when recent table OVERFLOWED. -> http://bugzilla.netfilter.org/show_bug.cgi?id=689 Netfilter NAT engine conflicts with iproute2 routing cache purge -> http://bugzilla.netfilter.org/show_bug.cgi?id=690 SNAT is failing to maquerade some TCP RST packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=693 Files with the same name in case-insensitive file systems -> http://bugzilla.netfilter.org/show_bug.cgi?id=694 Extra tcp options for REJECT --reject-with tcp-reset-both / tcp-reset-destination -> http://bugzilla.netfilter.org/show_bug.cgi?id=696 please add new options to iptables-restore to continue on error and suppress error output -> http://bugzilla.netfilter.org/show_bug.cgi?id=699 PPPoE masqeuraded connection reset when talking to Amazon S3 -> http://bugzilla.netfilter.org/show_bug.cgi?id=701 A way to convert an iptables command to its iptables-save equivalent output -> http://bugzilla.netfilter.org/show_bug.cgi?id=705 Some accepted packets get lost -> http://bugzilla.netfilter.org/show_bug.cgi?id=708 nfq_nfnlh() and nfq_fd() should have const arguments -> http://bugzilla.netfilter.org/show_bug.cgi?id=715 double entry of nf_conntrack_max in /proc -> http://bugzilla.netfilter.org/show_bug.cgi?id=722 Errors in compiling nfqnl_test.c -> http://bugzilla.netfilter.org/show_bug.cgi?id=743 Range check for ulog-cprange is wrong -> http://bugzilla.netfilter.org/show_bug.cgi?id=748 IPv6 bridging bug -> http://bugzilla.netfilter.org/show_bug.cgi?id=751 ipq_read() will return an error (rc = -1) and the error message says "Received truncated message" -> http://bugzilla.netfilter.org/show_bug.cgi?id=752 change bugzilla account e-mail -> http://bugzilla.netfilter.org/show_bug.cgi?id=755 iptables: Memory allocation problem. -> http://bugzilla.netfilter.org/show_bug.cgi?id=756 Retry iptables command on transient failure -> http://bugzilla.netfilter.org/show_bug.cgi?id=758 "iptables -m recent" crashes a LXC host on lxc-stop -> http://bugzilla.netfilter.org/show_bug.cgi?id=759 nf_ct_sip dropping SIP messages larger then MTU -> http://bugzilla.netfilter.org/show_bug.cgi?id=760 dnat and snat not changing port numbers on sctp packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=763 Doing -Z twice in parallel breaks counters -> http://bugzilla.netfilter.org/show_bug.cgi?id=764 Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule -> http://bugzilla.netfilter.org/show_bug.cgi?id=766 Fix a compiler warning [-Wunused-variable] -> http://bugzilla.netfilter.org/show_bug.cgi?id=767 Returns the position the entry was inserted -> http://bugzilla.netfilter.org/show_bug.cgi?id=768 iptables SNAT does not handle argument --persistent -> http://bugzilla.netfilter.org/show_bug.cgi?id=769 ipt_REJECT: multi-directional tcp-reset -> http://bugzilla.netfilter.org/show_bug.cgi?id=770 nf_conntrack_proto_tcp BUG?? -> http://bugzilla.netfilter.org/show_bug.cgi?id=771 Rate Limiting -> http://bugzilla.netfilter.org/show_bug.cgi?id=772 -m owner ! --uid-owner False positive logging -> http://bugzilla.netfilter.org/show_bug.cgi?id=775 Suspect bug in __do_replace() -> http://bugzilla.netfilter.org/show_bug.cgi?id=777 NFQUEUE --queue-bypass accepts all packets when no userspace application is available -> http://bugzilla.netfilter.org/show_bug.cgi?id=778 Netfilter on bridge interface containing a defective NIC -> http://bugzilla.netfilter.org/show_bug.cgi?id=779 Memory utilization continuously increasing day by day -> http://bugzilla.netfilter.org/show_bug.cgi?id=784 Normalize iptables rules -> http://bugzilla.netfilter.org/show_bug.cgi?id=790 ulogd -d does not close all fds -> http://bugzilla.netfilter.org/show_bug.cgi?id=793 -f option used with iptables -> http://bugzilla.netfilter.org/show_bug.cgi?id=794 RELATED doesn't accommodate multicast UDP solicitation resulting in unicast reply -> http://bugzilla.netfilter.org/show_bug.cgi?id=795 ip6tables (iptables) "state" test fails to correctly determine the state of packet streams; will not jump to ACCEPT on ESTABLISHED,RELATED connections -> http://bugzilla.netfilter.org/show_bug.cgi?id=796 Match Order Matters When Using Hashlimit -> http://bugzilla.netfilter.org/show_bug.cgi?id=797 sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook -> http://bugzilla.netfilter.org/show_bug.cgi?id=800 Bridge dropping Ipsec fragmented packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=801 Lack of error feedback on SELinux denial -> http://bugzilla.netfilter.org/show_bug.cgi?id=802
bugzilla-daemon at bugzilla.netfilter.org
2012-Dec-03 00:46 UTC
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.] You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require attention. All of these bugs are in the NEW or REOPENED state, and have not been touched in 7 days or more. You need to take a look at them, and decide on an initial action. Generally, this means one of three things: (1) You decide this bug is really quick to deal with (like, it's INVALID), and so you get rid of it immediately. (2) You decide the bug doesn't belong to you, and you reassign it to someone else. (Hint: if you don't know who to reassign it to, make sure that the Component field seems reasonable, and then use the "Reset Assignee to default" option.) (3) You decide the bug belongs to you, but you can't solve it this moment. Accept the bug by setting the status to ASSIGNED. To get a list of all NEW/REOPENED bugs, you can use this URL (bookmark it if you like!): http://bugzilla.netfilter.org/buglist.cgi?bug_status=NEW&bug_status=REOPENED&assigned_to=netfilter-buglog at lists.netfilter.org Or, you can use the general query page, at http://bugzilla.netfilter.org/query.cgi Appended below are the individual URLs to get to all of your NEW bugs that haven't been touched for 7 days or more. You will get this message once a day until you've dealt with these bugs! Enhancement: Allow rules to specify ICMP type ranges. -> http://bugzilla.netfilter.org/show_bug.cgi?id=630 In IPv6 route information doesn't get flushed out when deleting and creating a new interface -> http://bugzilla.netfilter.org/show_bug.cgi?id=655 netfilters clamp-mss-to-pmtu sets bad MSS when none was set before -> http://bugzilla.netfilter.org/show_bug.cgi?id=662 Postrouting + IPsec + IPv6 -> http://bugzilla.netfilter.org/show_bug.cgi?id=663 connlimit doesn't work properly -> http://bugzilla.netfilter.org/show_bug.cgi?id=676 add PID and UID to netfilter-queue -> http://bugzilla.netfilter.org/show_bug.cgi?id=678 iptables-xml missing <match> in first <conditions> node -> http://bugzilla.netfilter.org/show_bug.cgi?id=679 Packets disappear after NAT on 2nd gateway -> http://bugzilla.netfilter.org/show_bug.cgi?id=680 Ruleset counter on -m recent match when recent table OVERFLOWED. -> http://bugzilla.netfilter.org/show_bug.cgi?id=689 Netfilter NAT engine conflicts with iproute2 routing cache purge -> http://bugzilla.netfilter.org/show_bug.cgi?id=690 SNAT is failing to maquerade some TCP RST packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=693 Files with the same name in case-insensitive file systems -> http://bugzilla.netfilter.org/show_bug.cgi?id=694 Extra tcp options for REJECT --reject-with tcp-reset-both / tcp-reset-destination -> http://bugzilla.netfilter.org/show_bug.cgi?id=696 please add new options to iptables-restore to continue on error and suppress error output -> http://bugzilla.netfilter.org/show_bug.cgi?id=699 PPPoE masqeuraded connection reset when talking to Amazon S3 -> http://bugzilla.netfilter.org/show_bug.cgi?id=701 A way to convert an iptables command to its iptables-save equivalent output -> http://bugzilla.netfilter.org/show_bug.cgi?id=705 Some accepted packets get lost -> http://bugzilla.netfilter.org/show_bug.cgi?id=708 nfq_nfnlh() and nfq_fd() should have const arguments -> http://bugzilla.netfilter.org/show_bug.cgi?id=715 double entry of nf_conntrack_max in /proc -> http://bugzilla.netfilter.org/show_bug.cgi?id=722 Errors in compiling nfqnl_test.c -> http://bugzilla.netfilter.org/show_bug.cgi?id=743 Range check for ulog-cprange is wrong -> http://bugzilla.netfilter.org/show_bug.cgi?id=748 IPv6 bridging bug -> http://bugzilla.netfilter.org/show_bug.cgi?id=751 ipq_read() will return an error (rc = -1) and the error message says "Received truncated message" -> http://bugzilla.netfilter.org/show_bug.cgi?id=752 change bugzilla account e-mail -> http://bugzilla.netfilter.org/show_bug.cgi?id=755 iptables: Memory allocation problem. -> http://bugzilla.netfilter.org/show_bug.cgi?id=756 Retry iptables command on transient failure -> http://bugzilla.netfilter.org/show_bug.cgi?id=758 "iptables -m recent" crashes a LXC host on lxc-stop -> http://bugzilla.netfilter.org/show_bug.cgi?id=759 nf_ct_sip dropping SIP messages larger then MTU -> http://bugzilla.netfilter.org/show_bug.cgi?id=760 dnat and snat not changing port numbers on sctp packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=763 Doing -Z twice in parallel breaks counters -> http://bugzilla.netfilter.org/show_bug.cgi?id=764 Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule -> http://bugzilla.netfilter.org/show_bug.cgi?id=766 Fix a compiler warning [-Wunused-variable] -> http://bugzilla.netfilter.org/show_bug.cgi?id=767 Returns the position the entry was inserted -> http://bugzilla.netfilter.org/show_bug.cgi?id=768 iptables SNAT does not handle argument --persistent -> http://bugzilla.netfilter.org/show_bug.cgi?id=769 ipt_REJECT: multi-directional tcp-reset -> http://bugzilla.netfilter.org/show_bug.cgi?id=770 nf_conntrack_proto_tcp BUG?? -> http://bugzilla.netfilter.org/show_bug.cgi?id=771 Rate Limiting -> http://bugzilla.netfilter.org/show_bug.cgi?id=772 -m owner ! --uid-owner False positive logging -> http://bugzilla.netfilter.org/show_bug.cgi?id=775 Suspect bug in __do_replace() -> http://bugzilla.netfilter.org/show_bug.cgi?id=777 NFQUEUE --queue-bypass accepts all packets when no userspace application is available -> http://bugzilla.netfilter.org/show_bug.cgi?id=778 Netfilter on bridge interface containing a defective NIC -> http://bugzilla.netfilter.org/show_bug.cgi?id=779 Memory utilization continuously increasing day by day -> http://bugzilla.netfilter.org/show_bug.cgi?id=784 Normalize iptables rules -> http://bugzilla.netfilter.org/show_bug.cgi?id=790 ulogd -d does not close all fds -> http://bugzilla.netfilter.org/show_bug.cgi?id=793 -f option used with iptables -> http://bugzilla.netfilter.org/show_bug.cgi?id=794 RELATED doesn't accommodate multicast UDP solicitation resulting in unicast reply -> http://bugzilla.netfilter.org/show_bug.cgi?id=795 ip6tables (iptables) "state" test fails to correctly determine the state of packet streams; will not jump to ACCEPT on ESTABLISHED,RELATED connections -> http://bugzilla.netfilter.org/show_bug.cgi?id=796 Match Order Matters When Using Hashlimit -> http://bugzilla.netfilter.org/show_bug.cgi?id=797 sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook -> http://bugzilla.netfilter.org/show_bug.cgi?id=800 Bridge dropping Ipsec fragmented packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=801 Lack of error feedback on SELinux denial -> http://bugzilla.netfilter.org/show_bug.cgi?id=802
bugzilla-daemon at bugzilla.netfilter.org
2012-Dec-04 00:46 UTC
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.] You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require attention. All of these bugs are in the NEW or REOPENED state, and have not been touched in 7 days or more. You need to take a look at them, and decide on an initial action. Generally, this means one of three things: (1) You decide this bug is really quick to deal with (like, it's INVALID), and so you get rid of it immediately. (2) You decide the bug doesn't belong to you, and you reassign it to someone else. (Hint: if you don't know who to reassign it to, make sure that the Component field seems reasonable, and then use the "Reset Assignee to default" option.) (3) You decide the bug belongs to you, but you can't solve it this moment. Accept the bug by setting the status to ASSIGNED. To get a list of all NEW/REOPENED bugs, you can use this URL (bookmark it if you like!): http://bugzilla.netfilter.org/buglist.cgi?bug_status=NEW&bug_status=REOPENED&assigned_to=netfilter-buglog at lists.netfilter.org Or, you can use the general query page, at http://bugzilla.netfilter.org/query.cgi Appended below are the individual URLs to get to all of your NEW bugs that haven't been touched for 7 days or more. You will get this message once a day until you've dealt with these bugs! Enhancement: Allow rules to specify ICMP type ranges. -> http://bugzilla.netfilter.org/show_bug.cgi?id=630 In IPv6 route information doesn't get flushed out when deleting and creating a new interface -> http://bugzilla.netfilter.org/show_bug.cgi?id=655 netfilters clamp-mss-to-pmtu sets bad MSS when none was set before -> http://bugzilla.netfilter.org/show_bug.cgi?id=662 Postrouting + IPsec + IPv6 -> http://bugzilla.netfilter.org/show_bug.cgi?id=663 connlimit doesn't work properly -> http://bugzilla.netfilter.org/show_bug.cgi?id=676 add PID and UID to netfilter-queue -> http://bugzilla.netfilter.org/show_bug.cgi?id=678 iptables-xml missing <match> in first <conditions> node -> http://bugzilla.netfilter.org/show_bug.cgi?id=679 Packets disappear after NAT on 2nd gateway -> http://bugzilla.netfilter.org/show_bug.cgi?id=680 Ruleset counter on -m recent match when recent table OVERFLOWED. -> http://bugzilla.netfilter.org/show_bug.cgi?id=689 Netfilter NAT engine conflicts with iproute2 routing cache purge -> http://bugzilla.netfilter.org/show_bug.cgi?id=690 SNAT is failing to maquerade some TCP RST packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=693 Files with the same name in case-insensitive file systems -> http://bugzilla.netfilter.org/show_bug.cgi?id=694 Extra tcp options for REJECT --reject-with tcp-reset-both / tcp-reset-destination -> http://bugzilla.netfilter.org/show_bug.cgi?id=696 please add new options to iptables-restore to continue on error and suppress error output -> http://bugzilla.netfilter.org/show_bug.cgi?id=699 PPPoE masqeuraded connection reset when talking to Amazon S3 -> http://bugzilla.netfilter.org/show_bug.cgi?id=701 A way to convert an iptables command to its iptables-save equivalent output -> http://bugzilla.netfilter.org/show_bug.cgi?id=705 Some accepted packets get lost -> http://bugzilla.netfilter.org/show_bug.cgi?id=708 nfq_nfnlh() and nfq_fd() should have const arguments -> http://bugzilla.netfilter.org/show_bug.cgi?id=715 double entry of nf_conntrack_max in /proc -> http://bugzilla.netfilter.org/show_bug.cgi?id=722 Errors in compiling nfqnl_test.c -> http://bugzilla.netfilter.org/show_bug.cgi?id=743 Range check for ulog-cprange is wrong -> http://bugzilla.netfilter.org/show_bug.cgi?id=748 IPv6 bridging bug -> http://bugzilla.netfilter.org/show_bug.cgi?id=751 ipq_read() will return an error (rc = -1) and the error message says "Received truncated message" -> http://bugzilla.netfilter.org/show_bug.cgi?id=752 change bugzilla account e-mail -> http://bugzilla.netfilter.org/show_bug.cgi?id=755 iptables: Memory allocation problem. -> http://bugzilla.netfilter.org/show_bug.cgi?id=756 Retry iptables command on transient failure -> http://bugzilla.netfilter.org/show_bug.cgi?id=758 "iptables -m recent" crashes a LXC host on lxc-stop -> http://bugzilla.netfilter.org/show_bug.cgi?id=759 nf_ct_sip dropping SIP messages larger then MTU -> http://bugzilla.netfilter.org/show_bug.cgi?id=760 dnat and snat not changing port numbers on sctp packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=763 Doing -Z twice in parallel breaks counters -> http://bugzilla.netfilter.org/show_bug.cgi?id=764 Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule -> http://bugzilla.netfilter.org/show_bug.cgi?id=766 Fix a compiler warning [-Wunused-variable] -> http://bugzilla.netfilter.org/show_bug.cgi?id=767 Returns the position the entry was inserted -> http://bugzilla.netfilter.org/show_bug.cgi?id=768 iptables SNAT does not handle argument --persistent -> http://bugzilla.netfilter.org/show_bug.cgi?id=769 ipt_REJECT: multi-directional tcp-reset -> http://bugzilla.netfilter.org/show_bug.cgi?id=770 nf_conntrack_proto_tcp BUG?? -> http://bugzilla.netfilter.org/show_bug.cgi?id=771 Rate Limiting -> http://bugzilla.netfilter.org/show_bug.cgi?id=772 -m owner ! --uid-owner False positive logging -> http://bugzilla.netfilter.org/show_bug.cgi?id=775 Suspect bug in __do_replace() -> http://bugzilla.netfilter.org/show_bug.cgi?id=777 NFQUEUE --queue-bypass accepts all packets when no userspace application is available -> http://bugzilla.netfilter.org/show_bug.cgi?id=778 Netfilter on bridge interface containing a defective NIC -> http://bugzilla.netfilter.org/show_bug.cgi?id=779 Memory utilization continuously increasing day by day -> http://bugzilla.netfilter.org/show_bug.cgi?id=784 Normalize iptables rules -> http://bugzilla.netfilter.org/show_bug.cgi?id=790 ulogd -d does not close all fds -> http://bugzilla.netfilter.org/show_bug.cgi?id=793 -f option used with iptables -> http://bugzilla.netfilter.org/show_bug.cgi?id=794 RELATED doesn't accommodate multicast UDP solicitation resulting in unicast reply -> http://bugzilla.netfilter.org/show_bug.cgi?id=795 ip6tables (iptables) "state" test fails to correctly determine the state of packet streams; will not jump to ACCEPT on ESTABLISHED,RELATED connections -> http://bugzilla.netfilter.org/show_bug.cgi?id=796 Match Order Matters When Using Hashlimit -> http://bugzilla.netfilter.org/show_bug.cgi?id=797 sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook -> http://bugzilla.netfilter.org/show_bug.cgi?id=800 Bridge dropping Ipsec fragmented packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=801 Lack of error feedback on SELinux denial -> http://bugzilla.netfilter.org/show_bug.cgi?id=802
bugzilla-daemon at bugzilla.netfilter.org
2012-Dec-05 00:46 UTC
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.] You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require attention. All of these bugs are in the NEW or REOPENED state, and have not been touched in 7 days or more. You need to take a look at them, and decide on an initial action. Generally, this means one of three things: (1) You decide this bug is really quick to deal with (like, it's INVALID), and so you get rid of it immediately. (2) You decide the bug doesn't belong to you, and you reassign it to someone else. (Hint: if you don't know who to reassign it to, make sure that the Component field seems reasonable, and then use the "Reset Assignee to default" option.) (3) You decide the bug belongs to you, but you can't solve it this moment. Accept the bug by setting the status to ASSIGNED. To get a list of all NEW/REOPENED bugs, you can use this URL (bookmark it if you like!): http://bugzilla.netfilter.org/buglist.cgi?bug_status=NEW&bug_status=REOPENED&assigned_to=netfilter-buglog at lists.netfilter.org Or, you can use the general query page, at http://bugzilla.netfilter.org/query.cgi Appended below are the individual URLs to get to all of your NEW bugs that haven't been touched for 7 days or more. You will get this message once a day until you've dealt with these bugs! Enhancement: Allow rules to specify ICMP type ranges. -> http://bugzilla.netfilter.org/show_bug.cgi?id=630 In IPv6 route information doesn't get flushed out when deleting and creating a new interface -> http://bugzilla.netfilter.org/show_bug.cgi?id=655 netfilters clamp-mss-to-pmtu sets bad MSS when none was set before -> http://bugzilla.netfilter.org/show_bug.cgi?id=662 Postrouting + IPsec + IPv6 -> http://bugzilla.netfilter.org/show_bug.cgi?id=663 connlimit doesn't work properly -> http://bugzilla.netfilter.org/show_bug.cgi?id=676 add PID and UID to netfilter-queue -> http://bugzilla.netfilter.org/show_bug.cgi?id=678 iptables-xml missing <match> in first <conditions> node -> http://bugzilla.netfilter.org/show_bug.cgi?id=679 Packets disappear after NAT on 2nd gateway -> http://bugzilla.netfilter.org/show_bug.cgi?id=680 Ruleset counter on -m recent match when recent table OVERFLOWED. -> http://bugzilla.netfilter.org/show_bug.cgi?id=689 Netfilter NAT engine conflicts with iproute2 routing cache purge -> http://bugzilla.netfilter.org/show_bug.cgi?id=690 SNAT is failing to maquerade some TCP RST packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=693 Files with the same name in case-insensitive file systems -> http://bugzilla.netfilter.org/show_bug.cgi?id=694 Extra tcp options for REJECT --reject-with tcp-reset-both / tcp-reset-destination -> http://bugzilla.netfilter.org/show_bug.cgi?id=696 please add new options to iptables-restore to continue on error and suppress error output -> http://bugzilla.netfilter.org/show_bug.cgi?id=699 PPPoE masqeuraded connection reset when talking to Amazon S3 -> http://bugzilla.netfilter.org/show_bug.cgi?id=701 A way to convert an iptables command to its iptables-save equivalent output -> http://bugzilla.netfilter.org/show_bug.cgi?id=705 Some accepted packets get lost -> http://bugzilla.netfilter.org/show_bug.cgi?id=708 nfq_nfnlh() and nfq_fd() should have const arguments -> http://bugzilla.netfilter.org/show_bug.cgi?id=715 double entry of nf_conntrack_max in /proc -> http://bugzilla.netfilter.org/show_bug.cgi?id=722 Errors in compiling nfqnl_test.c -> http://bugzilla.netfilter.org/show_bug.cgi?id=743 Range check for ulog-cprange is wrong -> http://bugzilla.netfilter.org/show_bug.cgi?id=748 IPv6 bridging bug -> http://bugzilla.netfilter.org/show_bug.cgi?id=751 ipq_read() will return an error (rc = -1) and the error message says "Received truncated message" -> http://bugzilla.netfilter.org/show_bug.cgi?id=752 change bugzilla account e-mail -> http://bugzilla.netfilter.org/show_bug.cgi?id=755 iptables: Memory allocation problem. -> http://bugzilla.netfilter.org/show_bug.cgi?id=756 Retry iptables command on transient failure -> http://bugzilla.netfilter.org/show_bug.cgi?id=758 "iptables -m recent" crashes a LXC host on lxc-stop -> http://bugzilla.netfilter.org/show_bug.cgi?id=759 nf_ct_sip dropping SIP messages larger then MTU -> http://bugzilla.netfilter.org/show_bug.cgi?id=760 dnat and snat not changing port numbers on sctp packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=763 Doing -Z twice in parallel breaks counters -> http://bugzilla.netfilter.org/show_bug.cgi?id=764 Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule -> http://bugzilla.netfilter.org/show_bug.cgi?id=766 Fix a compiler warning [-Wunused-variable] -> http://bugzilla.netfilter.org/show_bug.cgi?id=767 Returns the position the entry was inserted -> http://bugzilla.netfilter.org/show_bug.cgi?id=768 iptables SNAT does not handle argument --persistent -> http://bugzilla.netfilter.org/show_bug.cgi?id=769 ipt_REJECT: multi-directional tcp-reset -> http://bugzilla.netfilter.org/show_bug.cgi?id=770 nf_conntrack_proto_tcp BUG?? -> http://bugzilla.netfilter.org/show_bug.cgi?id=771 Rate Limiting -> http://bugzilla.netfilter.org/show_bug.cgi?id=772 -m owner ! --uid-owner False positive logging -> http://bugzilla.netfilter.org/show_bug.cgi?id=775 Suspect bug in __do_replace() -> http://bugzilla.netfilter.org/show_bug.cgi?id=777 NFQUEUE --queue-bypass accepts all packets when no userspace application is available -> http://bugzilla.netfilter.org/show_bug.cgi?id=778 Netfilter on bridge interface containing a defective NIC -> http://bugzilla.netfilter.org/show_bug.cgi?id=779 Memory utilization continuously increasing day by day -> http://bugzilla.netfilter.org/show_bug.cgi?id=784 Normalize iptables rules -> http://bugzilla.netfilter.org/show_bug.cgi?id=790 ulogd -d does not close all fds -> http://bugzilla.netfilter.org/show_bug.cgi?id=793 -f option used with iptables -> http://bugzilla.netfilter.org/show_bug.cgi?id=794 RELATED doesn't accommodate multicast UDP solicitation resulting in unicast reply -> http://bugzilla.netfilter.org/show_bug.cgi?id=795 ip6tables (iptables) "state" test fails to correctly determine the state of packet streams; will not jump to ACCEPT on ESTABLISHED,RELATED connections -> http://bugzilla.netfilter.org/show_bug.cgi?id=796 Match Order Matters When Using Hashlimit -> http://bugzilla.netfilter.org/show_bug.cgi?id=797 sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook -> http://bugzilla.netfilter.org/show_bug.cgi?id=800 Bridge dropping Ipsec fragmented packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=801 Lack of error feedback on SELinux denial -> http://bugzilla.netfilter.org/show_bug.cgi?id=802
bugzilla-daemon at bugzilla.netfilter.org
2012-Dec-06 00:46 UTC
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.] You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require attention. All of these bugs are in the NEW or REOPENED state, and have not been touched in 7 days or more. You need to take a look at them, and decide on an initial action. Generally, this means one of three things: (1) You decide this bug is really quick to deal with (like, it's INVALID), and so you get rid of it immediately. (2) You decide the bug doesn't belong to you, and you reassign it to someone else. (Hint: if you don't know who to reassign it to, make sure that the Component field seems reasonable, and then use the "Reset Assignee to default" option.) (3) You decide the bug belongs to you, but you can't solve it this moment. Accept the bug by setting the status to ASSIGNED. To get a list of all NEW/REOPENED bugs, you can use this URL (bookmark it if you like!): http://bugzilla.netfilter.org/buglist.cgi?bug_status=NEW&bug_status=REOPENED&assigned_to=netfilter-buglog at lists.netfilter.org Or, you can use the general query page, at http://bugzilla.netfilter.org/query.cgi Appended below are the individual URLs to get to all of your NEW bugs that haven't been touched for 7 days or more. You will get this message once a day until you've dealt with these bugs! Enhancement: Allow rules to specify ICMP type ranges. -> http://bugzilla.netfilter.org/show_bug.cgi?id=630 In IPv6 route information doesn't get flushed out when deleting and creating a new interface -> http://bugzilla.netfilter.org/show_bug.cgi?id=655 netfilters clamp-mss-to-pmtu sets bad MSS when none was set before -> http://bugzilla.netfilter.org/show_bug.cgi?id=662 Postrouting + IPsec + IPv6 -> http://bugzilla.netfilter.org/show_bug.cgi?id=663 connlimit doesn't work properly -> http://bugzilla.netfilter.org/show_bug.cgi?id=676 add PID and UID to netfilter-queue -> http://bugzilla.netfilter.org/show_bug.cgi?id=678 iptables-xml missing <match> in first <conditions> node -> http://bugzilla.netfilter.org/show_bug.cgi?id=679 Packets disappear after NAT on 2nd gateway -> http://bugzilla.netfilter.org/show_bug.cgi?id=680 Ruleset counter on -m recent match when recent table OVERFLOWED. -> http://bugzilla.netfilter.org/show_bug.cgi?id=689 Netfilter NAT engine conflicts with iproute2 routing cache purge -> http://bugzilla.netfilter.org/show_bug.cgi?id=690 SNAT is failing to maquerade some TCP RST packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=693 Files with the same name in case-insensitive file systems -> http://bugzilla.netfilter.org/show_bug.cgi?id=694 Extra tcp options for REJECT --reject-with tcp-reset-both / tcp-reset-destination -> http://bugzilla.netfilter.org/show_bug.cgi?id=696 please add new options to iptables-restore to continue on error and suppress error output -> http://bugzilla.netfilter.org/show_bug.cgi?id=699 PPPoE masqeuraded connection reset when talking to Amazon S3 -> http://bugzilla.netfilter.org/show_bug.cgi?id=701 A way to convert an iptables command to its iptables-save equivalent output -> http://bugzilla.netfilter.org/show_bug.cgi?id=705 Some accepted packets get lost -> http://bugzilla.netfilter.org/show_bug.cgi?id=708 nfq_nfnlh() and nfq_fd() should have const arguments -> http://bugzilla.netfilter.org/show_bug.cgi?id=715 double entry of nf_conntrack_max in /proc -> http://bugzilla.netfilter.org/show_bug.cgi?id=722 Errors in compiling nfqnl_test.c -> http://bugzilla.netfilter.org/show_bug.cgi?id=743 Range check for ulog-cprange is wrong -> http://bugzilla.netfilter.org/show_bug.cgi?id=748 IPv6 bridging bug -> http://bugzilla.netfilter.org/show_bug.cgi?id=751 ipq_read() will return an error (rc = -1) and the error message says "Received truncated message" -> http://bugzilla.netfilter.org/show_bug.cgi?id=752 change bugzilla account e-mail -> http://bugzilla.netfilter.org/show_bug.cgi?id=755 iptables: Memory allocation problem. -> http://bugzilla.netfilter.org/show_bug.cgi?id=756 Retry iptables command on transient failure -> http://bugzilla.netfilter.org/show_bug.cgi?id=758 "iptables -m recent" crashes a LXC host on lxc-stop -> http://bugzilla.netfilter.org/show_bug.cgi?id=759 nf_ct_sip dropping SIP messages larger then MTU -> http://bugzilla.netfilter.org/show_bug.cgi?id=760 dnat and snat not changing port numbers on sctp packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=763 Doing -Z twice in parallel breaks counters -> http://bugzilla.netfilter.org/show_bug.cgi?id=764 Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule -> http://bugzilla.netfilter.org/show_bug.cgi?id=766 Fix a compiler warning [-Wunused-variable] -> http://bugzilla.netfilter.org/show_bug.cgi?id=767 Returns the position the entry was inserted -> http://bugzilla.netfilter.org/show_bug.cgi?id=768 iptables SNAT does not handle argument --persistent -> http://bugzilla.netfilter.org/show_bug.cgi?id=769 ipt_REJECT: multi-directional tcp-reset -> http://bugzilla.netfilter.org/show_bug.cgi?id=770 nf_conntrack_proto_tcp BUG?? -> http://bugzilla.netfilter.org/show_bug.cgi?id=771 Rate Limiting -> http://bugzilla.netfilter.org/show_bug.cgi?id=772 -m owner ! --uid-owner False positive logging -> http://bugzilla.netfilter.org/show_bug.cgi?id=775 Suspect bug in __do_replace() -> http://bugzilla.netfilter.org/show_bug.cgi?id=777 NFQUEUE --queue-bypass accepts all packets when no userspace application is available -> http://bugzilla.netfilter.org/show_bug.cgi?id=778 Netfilter on bridge interface containing a defective NIC -> http://bugzilla.netfilter.org/show_bug.cgi?id=779 Memory utilization continuously increasing day by day -> http://bugzilla.netfilter.org/show_bug.cgi?id=784 Normalize iptables rules -> http://bugzilla.netfilter.org/show_bug.cgi?id=790 ulogd -d does not close all fds -> http://bugzilla.netfilter.org/show_bug.cgi?id=793 -f option used with iptables -> http://bugzilla.netfilter.org/show_bug.cgi?id=794 RELATED doesn't accommodate multicast UDP solicitation resulting in unicast reply -> http://bugzilla.netfilter.org/show_bug.cgi?id=795 ip6tables (iptables) "state" test fails to correctly determine the state of packet streams; will not jump to ACCEPT on ESTABLISHED,RELATED connections -> http://bugzilla.netfilter.org/show_bug.cgi?id=796 Match Order Matters When Using Hashlimit -> http://bugzilla.netfilter.org/show_bug.cgi?id=797 sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook -> http://bugzilla.netfilter.org/show_bug.cgi?id=800 Bridge dropping Ipsec fragmented packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=801 Lack of error feedback on SELinux denial -> http://bugzilla.netfilter.org/show_bug.cgi?id=802
bugzilla-daemon at bugzilla.netfilter.org
2012-Dec-07 00:46 UTC
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.] You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require attention. All of these bugs are in the NEW or REOPENED state, and have not been touched in 7 days or more. You need to take a look at them, and decide on an initial action. Generally, this means one of three things: (1) You decide this bug is really quick to deal with (like, it's INVALID), and so you get rid of it immediately. (2) You decide the bug doesn't belong to you, and you reassign it to someone else. (Hint: if you don't know who to reassign it to, make sure that the Component field seems reasonable, and then use the "Reset Assignee to default" option.) (3) You decide the bug belongs to you, but you can't solve it this moment. Accept the bug by setting the status to ASSIGNED. To get a list of all NEW/REOPENED bugs, you can use this URL (bookmark it if you like!): http://bugzilla.netfilter.org/buglist.cgi?bug_status=NEW&bug_status=REOPENED&assigned_to=netfilter-buglog at lists.netfilter.org Or, you can use the general query page, at http://bugzilla.netfilter.org/query.cgi Appended below are the individual URLs to get to all of your NEW bugs that haven't been touched for 7 days or more. You will get this message once a day until you've dealt with these bugs! Enhancement: Allow rules to specify ICMP type ranges. -> http://bugzilla.netfilter.org/show_bug.cgi?id=630 netfilters clamp-mss-to-pmtu sets bad MSS when none was set before -> http://bugzilla.netfilter.org/show_bug.cgi?id=662 Postrouting + IPsec + IPv6 -> http://bugzilla.netfilter.org/show_bug.cgi?id=663 connlimit doesn't work properly -> http://bugzilla.netfilter.org/show_bug.cgi?id=676 add PID and UID to netfilter-queue -> http://bugzilla.netfilter.org/show_bug.cgi?id=678 iptables-xml missing <match> in first <conditions> node -> http://bugzilla.netfilter.org/show_bug.cgi?id=679 Ruleset counter on -m recent match when recent table OVERFLOWED. -> http://bugzilla.netfilter.org/show_bug.cgi?id=689 Files with the same name in case-insensitive file systems -> http://bugzilla.netfilter.org/show_bug.cgi?id=694 Extra tcp options for REJECT --reject-with tcp-reset-both / tcp-reset-destination -> http://bugzilla.netfilter.org/show_bug.cgi?id=696 please add new options to iptables-restore to continue on error and suppress error output -> http://bugzilla.netfilter.org/show_bug.cgi?id=699 PPPoE masqeuraded connection reset when talking to Amazon S3 -> http://bugzilla.netfilter.org/show_bug.cgi?id=701 A way to convert an iptables command to its iptables-save equivalent output -> http://bugzilla.netfilter.org/show_bug.cgi?id=705 Some accepted packets get lost -> http://bugzilla.netfilter.org/show_bug.cgi?id=708 nfq_nfnlh() and nfq_fd() should have const arguments -> http://bugzilla.netfilter.org/show_bug.cgi?id=715 Errors in compiling nfqnl_test.c -> http://bugzilla.netfilter.org/show_bug.cgi?id=743 Range check for ulog-cprange is wrong -> http://bugzilla.netfilter.org/show_bug.cgi?id=748 IPv6 bridging bug -> http://bugzilla.netfilter.org/show_bug.cgi?id=751 ipq_read() will return an error (rc = -1) and the error message says "Received truncated message" -> http://bugzilla.netfilter.org/show_bug.cgi?id=752 iptables: Memory allocation problem. -> http://bugzilla.netfilter.org/show_bug.cgi?id=756 Retry iptables command on transient failure -> http://bugzilla.netfilter.org/show_bug.cgi?id=758 "iptables -m recent" crashes a LXC host on lxc-stop -> http://bugzilla.netfilter.org/show_bug.cgi?id=759 nf_ct_sip dropping SIP messages larger then MTU -> http://bugzilla.netfilter.org/show_bug.cgi?id=760 dnat and snat not changing port numbers on sctp packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=763 Doing -Z twice in parallel breaks counters -> http://bugzilla.netfilter.org/show_bug.cgi?id=764 Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule -> http://bugzilla.netfilter.org/show_bug.cgi?id=766 Fix a compiler warning [-Wunused-variable] -> http://bugzilla.netfilter.org/show_bug.cgi?id=767 Returns the position the entry was inserted -> http://bugzilla.netfilter.org/show_bug.cgi?id=768 iptables SNAT does not handle argument --persistent -> http://bugzilla.netfilter.org/show_bug.cgi?id=769 ipt_REJECT: multi-directional tcp-reset -> http://bugzilla.netfilter.org/show_bug.cgi?id=770 nf_conntrack_proto_tcp BUG?? -> http://bugzilla.netfilter.org/show_bug.cgi?id=771 Rate Limiting -> http://bugzilla.netfilter.org/show_bug.cgi?id=772 -m owner ! --uid-owner False positive logging -> http://bugzilla.netfilter.org/show_bug.cgi?id=775 Suspect bug in __do_replace() -> http://bugzilla.netfilter.org/show_bug.cgi?id=777 NFQUEUE --queue-bypass accepts all packets when no userspace application is available -> http://bugzilla.netfilter.org/show_bug.cgi?id=778 Netfilter on bridge interface containing a defective NIC -> http://bugzilla.netfilter.org/show_bug.cgi?id=779 Memory utilization continuously increasing day by day -> http://bugzilla.netfilter.org/show_bug.cgi?id=784 Normalize iptables rules -> http://bugzilla.netfilter.org/show_bug.cgi?id=790 ulogd -d does not close all fds -> http://bugzilla.netfilter.org/show_bug.cgi?id=793 -f option used with iptables -> http://bugzilla.netfilter.org/show_bug.cgi?id=794 RELATED doesn't accommodate multicast UDP solicitation resulting in unicast reply -> http://bugzilla.netfilter.org/show_bug.cgi?id=795 sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook -> http://bugzilla.netfilter.org/show_bug.cgi?id=800 Bridge dropping Ipsec fragmented packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=801 Lack of error feedback on SELinux denial -> http://bugzilla.netfilter.org/show_bug.cgi?id=802
bugzilla-daemon at bugzilla.netfilter.org
2012-Dec-08 00:46 UTC
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.] You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require attention. All of these bugs are in the NEW or REOPENED state, and have not been touched in 7 days or more. You need to take a look at them, and decide on an initial action. Generally, this means one of three things: (1) You decide this bug is really quick to deal with (like, it's INVALID), and so you get rid of it immediately. (2) You decide the bug doesn't belong to you, and you reassign it to someone else. (Hint: if you don't know who to reassign it to, make sure that the Component field seems reasonable, and then use the "Reset Assignee to default" option.) (3) You decide the bug belongs to you, but you can't solve it this moment. Accept the bug by setting the status to ASSIGNED. To get a list of all NEW/REOPENED bugs, you can use this URL (bookmark it if you like!): http://bugzilla.netfilter.org/buglist.cgi?bug_status=NEW&bug_status=REOPENED&assigned_to=netfilter-buglog at lists.netfilter.org Or, you can use the general query page, at http://bugzilla.netfilter.org/query.cgi Appended below are the individual URLs to get to all of your NEW bugs that haven't been touched for 7 days or more. You will get this message once a day until you've dealt with these bugs! Enhancement: Allow rules to specify ICMP type ranges. -> http://bugzilla.netfilter.org/show_bug.cgi?id=630 netfilters clamp-mss-to-pmtu sets bad MSS when none was set before -> http://bugzilla.netfilter.org/show_bug.cgi?id=662 Postrouting + IPsec + IPv6 -> http://bugzilla.netfilter.org/show_bug.cgi?id=663 connlimit doesn't work properly -> http://bugzilla.netfilter.org/show_bug.cgi?id=676 add PID and UID to netfilter-queue -> http://bugzilla.netfilter.org/show_bug.cgi?id=678 iptables-xml missing <match> in first <conditions> node -> http://bugzilla.netfilter.org/show_bug.cgi?id=679 Ruleset counter on -m recent match when recent table OVERFLOWED. -> http://bugzilla.netfilter.org/show_bug.cgi?id=689 Files with the same name in case-insensitive file systems -> http://bugzilla.netfilter.org/show_bug.cgi?id=694 Extra tcp options for REJECT --reject-with tcp-reset-both / tcp-reset-destination -> http://bugzilla.netfilter.org/show_bug.cgi?id=696 please add new options to iptables-restore to continue on error and suppress error output -> http://bugzilla.netfilter.org/show_bug.cgi?id=699 PPPoE masqeuraded connection reset when talking to Amazon S3 -> http://bugzilla.netfilter.org/show_bug.cgi?id=701 A way to convert an iptables command to its iptables-save equivalent output -> http://bugzilla.netfilter.org/show_bug.cgi?id=705 Some accepted packets get lost -> http://bugzilla.netfilter.org/show_bug.cgi?id=708 nfq_nfnlh() and nfq_fd() should have const arguments -> http://bugzilla.netfilter.org/show_bug.cgi?id=715 Errors in compiling nfqnl_test.c -> http://bugzilla.netfilter.org/show_bug.cgi?id=743 Range check for ulog-cprange is wrong -> http://bugzilla.netfilter.org/show_bug.cgi?id=748 IPv6 bridging bug -> http://bugzilla.netfilter.org/show_bug.cgi?id=751 ipq_read() will return an error (rc = -1) and the error message says "Received truncated message" -> http://bugzilla.netfilter.org/show_bug.cgi?id=752 iptables: Memory allocation problem. -> http://bugzilla.netfilter.org/show_bug.cgi?id=756 Retry iptables command on transient failure -> http://bugzilla.netfilter.org/show_bug.cgi?id=758 "iptables -m recent" crashes a LXC host on lxc-stop -> http://bugzilla.netfilter.org/show_bug.cgi?id=759 nf_ct_sip dropping SIP messages larger then MTU -> http://bugzilla.netfilter.org/show_bug.cgi?id=760 dnat and snat not changing port numbers on sctp packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=763 Doing -Z twice in parallel breaks counters -> http://bugzilla.netfilter.org/show_bug.cgi?id=764 Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule -> http://bugzilla.netfilter.org/show_bug.cgi?id=766 Fix a compiler warning [-Wunused-variable] -> http://bugzilla.netfilter.org/show_bug.cgi?id=767 Returns the position the entry was inserted -> http://bugzilla.netfilter.org/show_bug.cgi?id=768 iptables SNAT does not handle argument --persistent -> http://bugzilla.netfilter.org/show_bug.cgi?id=769 ipt_REJECT: multi-directional tcp-reset -> http://bugzilla.netfilter.org/show_bug.cgi?id=770 nf_conntrack_proto_tcp BUG?? -> http://bugzilla.netfilter.org/show_bug.cgi?id=771 Rate Limiting -> http://bugzilla.netfilter.org/show_bug.cgi?id=772 -m owner ! --uid-owner False positive logging -> http://bugzilla.netfilter.org/show_bug.cgi?id=775 Suspect bug in __do_replace() -> http://bugzilla.netfilter.org/show_bug.cgi?id=777 NFQUEUE --queue-bypass accepts all packets when no userspace application is available -> http://bugzilla.netfilter.org/show_bug.cgi?id=778 Netfilter on bridge interface containing a defective NIC -> http://bugzilla.netfilter.org/show_bug.cgi?id=779 Memory utilization continuously increasing day by day -> http://bugzilla.netfilter.org/show_bug.cgi?id=784 Normalize iptables rules -> http://bugzilla.netfilter.org/show_bug.cgi?id=790 ulogd -d does not close all fds -> http://bugzilla.netfilter.org/show_bug.cgi?id=793 -f option used with iptables -> http://bugzilla.netfilter.org/show_bug.cgi?id=794 RELATED doesn't accommodate multicast UDP solicitation resulting in unicast reply -> http://bugzilla.netfilter.org/show_bug.cgi?id=795 sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook -> http://bugzilla.netfilter.org/show_bug.cgi?id=800 Bridge dropping Ipsec fragmented packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=801 Lack of error feedback on SELinux denial -> http://bugzilla.netfilter.org/show_bug.cgi?id=802
bugzilla-daemon at bugzilla.netfilter.org
2012-Dec-09 00:46 UTC
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.] You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require attention. All of these bugs are in the NEW or REOPENED state, and have not been touched in 7 days or more. You need to take a look at them, and decide on an initial action. Generally, this means one of three things: (1) You decide this bug is really quick to deal with (like, it's INVALID), and so you get rid of it immediately. (2) You decide the bug doesn't belong to you, and you reassign it to someone else. (Hint: if you don't know who to reassign it to, make sure that the Component field seems reasonable, and then use the "Reset Assignee to default" option.) (3) You decide the bug belongs to you, but you can't solve it this moment. Accept the bug by setting the status to ASSIGNED. To get a list of all NEW/REOPENED bugs, you can use this URL (bookmark it if you like!): http://bugzilla.netfilter.org/buglist.cgi?bug_status=NEW&bug_status=REOPENED&assigned_to=netfilter-buglog at lists.netfilter.org Or, you can use the general query page, at http://bugzilla.netfilter.org/query.cgi Appended below are the individual URLs to get to all of your NEW bugs that haven't been touched for 7 days or more. You will get this message once a day until you've dealt with these bugs! Enhancement: Allow rules to specify ICMP type ranges. -> http://bugzilla.netfilter.org/show_bug.cgi?id=630 netfilters clamp-mss-to-pmtu sets bad MSS when none was set before -> http://bugzilla.netfilter.org/show_bug.cgi?id=662 Postrouting + IPsec + IPv6 -> http://bugzilla.netfilter.org/show_bug.cgi?id=663 connlimit doesn't work properly -> http://bugzilla.netfilter.org/show_bug.cgi?id=676 add PID and UID to netfilter-queue -> http://bugzilla.netfilter.org/show_bug.cgi?id=678 iptables-xml missing <match> in first <conditions> node -> http://bugzilla.netfilter.org/show_bug.cgi?id=679 Ruleset counter on -m recent match when recent table OVERFLOWED. -> http://bugzilla.netfilter.org/show_bug.cgi?id=689 Files with the same name in case-insensitive file systems -> http://bugzilla.netfilter.org/show_bug.cgi?id=694 Extra tcp options for REJECT --reject-with tcp-reset-both / tcp-reset-destination -> http://bugzilla.netfilter.org/show_bug.cgi?id=696 please add new options to iptables-restore to continue on error and suppress error output -> http://bugzilla.netfilter.org/show_bug.cgi?id=699 PPPoE masqeuraded connection reset when talking to Amazon S3 -> http://bugzilla.netfilter.org/show_bug.cgi?id=701 A way to convert an iptables command to its iptables-save equivalent output -> http://bugzilla.netfilter.org/show_bug.cgi?id=705 Some accepted packets get lost -> http://bugzilla.netfilter.org/show_bug.cgi?id=708 nfq_nfnlh() and nfq_fd() should have const arguments -> http://bugzilla.netfilter.org/show_bug.cgi?id=715 Errors in compiling nfqnl_test.c -> http://bugzilla.netfilter.org/show_bug.cgi?id=743 Range check for ulog-cprange is wrong -> http://bugzilla.netfilter.org/show_bug.cgi?id=748 IPv6 bridging bug -> http://bugzilla.netfilter.org/show_bug.cgi?id=751 ipq_read() will return an error (rc = -1) and the error message says "Received truncated message" -> http://bugzilla.netfilter.org/show_bug.cgi?id=752 iptables: Memory allocation problem. -> http://bugzilla.netfilter.org/show_bug.cgi?id=756 Retry iptables command on transient failure -> http://bugzilla.netfilter.org/show_bug.cgi?id=758 "iptables -m recent" crashes a LXC host on lxc-stop -> http://bugzilla.netfilter.org/show_bug.cgi?id=759 nf_ct_sip dropping SIP messages larger then MTU -> http://bugzilla.netfilter.org/show_bug.cgi?id=760 dnat and snat not changing port numbers on sctp packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=763 Doing -Z twice in parallel breaks counters -> http://bugzilla.netfilter.org/show_bug.cgi?id=764 Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule -> http://bugzilla.netfilter.org/show_bug.cgi?id=766 Fix a compiler warning [-Wunused-variable] -> http://bugzilla.netfilter.org/show_bug.cgi?id=767 Returns the position the entry was inserted -> http://bugzilla.netfilter.org/show_bug.cgi?id=768 iptables SNAT does not handle argument --persistent -> http://bugzilla.netfilter.org/show_bug.cgi?id=769 ipt_REJECT: multi-directional tcp-reset -> http://bugzilla.netfilter.org/show_bug.cgi?id=770 nf_conntrack_proto_tcp BUG?? -> http://bugzilla.netfilter.org/show_bug.cgi?id=771 Rate Limiting -> http://bugzilla.netfilter.org/show_bug.cgi?id=772 -m owner ! --uid-owner False positive logging -> http://bugzilla.netfilter.org/show_bug.cgi?id=775 Suspect bug in __do_replace() -> http://bugzilla.netfilter.org/show_bug.cgi?id=777 NFQUEUE --queue-bypass accepts all packets when no userspace application is available -> http://bugzilla.netfilter.org/show_bug.cgi?id=778 Netfilter on bridge interface containing a defective NIC -> http://bugzilla.netfilter.org/show_bug.cgi?id=779 Memory utilization continuously increasing day by day -> http://bugzilla.netfilter.org/show_bug.cgi?id=784 Normalize iptables rules -> http://bugzilla.netfilter.org/show_bug.cgi?id=790 ulogd -d does not close all fds -> http://bugzilla.netfilter.org/show_bug.cgi?id=793 -f option used with iptables -> http://bugzilla.netfilter.org/show_bug.cgi?id=794 RELATED doesn't accommodate multicast UDP solicitation resulting in unicast reply -> http://bugzilla.netfilter.org/show_bug.cgi?id=795 sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook -> http://bugzilla.netfilter.org/show_bug.cgi?id=800 Bridge dropping Ipsec fragmented packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=801 Lack of error feedback on SELinux denial -> http://bugzilla.netfilter.org/show_bug.cgi?id=802
bugzilla-daemon at bugzilla.netfilter.org
2012-Dec-10 00:46 UTC
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.] You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require attention. All of these bugs are in the NEW or REOPENED state, and have not been touched in 7 days or more. You need to take a look at them, and decide on an initial action. Generally, this means one of three things: (1) You decide this bug is really quick to deal with (like, it's INVALID), and so you get rid of it immediately. (2) You decide the bug doesn't belong to you, and you reassign it to someone else. (Hint: if you don't know who to reassign it to, make sure that the Component field seems reasonable, and then use the "Reset Assignee to default" option.) (3) You decide the bug belongs to you, but you can't solve it this moment. Accept the bug by setting the status to ASSIGNED. To get a list of all NEW/REOPENED bugs, you can use this URL (bookmark it if you like!): http://bugzilla.netfilter.org/buglist.cgi?bug_status=NEW&bug_status=REOPENED&assigned_to=netfilter-buglog at lists.netfilter.org Or, you can use the general query page, at http://bugzilla.netfilter.org/query.cgi Appended below are the individual URLs to get to all of your NEW bugs that haven't been touched for 7 days or more. You will get this message once a day until you've dealt with these bugs! Enhancement: Allow rules to specify ICMP type ranges. -> http://bugzilla.netfilter.org/show_bug.cgi?id=630 netfilters clamp-mss-to-pmtu sets bad MSS when none was set before -> http://bugzilla.netfilter.org/show_bug.cgi?id=662 Postrouting + IPsec + IPv6 -> http://bugzilla.netfilter.org/show_bug.cgi?id=663 connlimit doesn't work properly -> http://bugzilla.netfilter.org/show_bug.cgi?id=676 add PID and UID to netfilter-queue -> http://bugzilla.netfilter.org/show_bug.cgi?id=678 iptables-xml missing <match> in first <conditions> node -> http://bugzilla.netfilter.org/show_bug.cgi?id=679 Ruleset counter on -m recent match when recent table OVERFLOWED. -> http://bugzilla.netfilter.org/show_bug.cgi?id=689 Files with the same name in case-insensitive file systems -> http://bugzilla.netfilter.org/show_bug.cgi?id=694 Extra tcp options for REJECT --reject-with tcp-reset-both / tcp-reset-destination -> http://bugzilla.netfilter.org/show_bug.cgi?id=696 please add new options to iptables-restore to continue on error and suppress error output -> http://bugzilla.netfilter.org/show_bug.cgi?id=699 PPPoE masqeuraded connection reset when talking to Amazon S3 -> http://bugzilla.netfilter.org/show_bug.cgi?id=701 A way to convert an iptables command to its iptables-save equivalent output -> http://bugzilla.netfilter.org/show_bug.cgi?id=705 Some accepted packets get lost -> http://bugzilla.netfilter.org/show_bug.cgi?id=708 nfq_nfnlh() and nfq_fd() should have const arguments -> http://bugzilla.netfilter.org/show_bug.cgi?id=715 Errors in compiling nfqnl_test.c -> http://bugzilla.netfilter.org/show_bug.cgi?id=743 Range check for ulog-cprange is wrong -> http://bugzilla.netfilter.org/show_bug.cgi?id=748 IPv6 bridging bug -> http://bugzilla.netfilter.org/show_bug.cgi?id=751 ipq_read() will return an error (rc = -1) and the error message says "Received truncated message" -> http://bugzilla.netfilter.org/show_bug.cgi?id=752 iptables: Memory allocation problem. -> http://bugzilla.netfilter.org/show_bug.cgi?id=756 Retry iptables command on transient failure -> http://bugzilla.netfilter.org/show_bug.cgi?id=758 "iptables -m recent" crashes a LXC host on lxc-stop -> http://bugzilla.netfilter.org/show_bug.cgi?id=759 nf_ct_sip dropping SIP messages larger then MTU -> http://bugzilla.netfilter.org/show_bug.cgi?id=760 dnat and snat not changing port numbers on sctp packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=763 Doing -Z twice in parallel breaks counters -> http://bugzilla.netfilter.org/show_bug.cgi?id=764 Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule -> http://bugzilla.netfilter.org/show_bug.cgi?id=766 Fix a compiler warning [-Wunused-variable] -> http://bugzilla.netfilter.org/show_bug.cgi?id=767 Returns the position the entry was inserted -> http://bugzilla.netfilter.org/show_bug.cgi?id=768 iptables SNAT does not handle argument --persistent -> http://bugzilla.netfilter.org/show_bug.cgi?id=769 ipt_REJECT: multi-directional tcp-reset -> http://bugzilla.netfilter.org/show_bug.cgi?id=770 nf_conntrack_proto_tcp BUG?? -> http://bugzilla.netfilter.org/show_bug.cgi?id=771 Rate Limiting -> http://bugzilla.netfilter.org/show_bug.cgi?id=772 -m owner ! --uid-owner False positive logging -> http://bugzilla.netfilter.org/show_bug.cgi?id=775 Suspect bug in __do_replace() -> http://bugzilla.netfilter.org/show_bug.cgi?id=777 NFQUEUE --queue-bypass accepts all packets when no userspace application is available -> http://bugzilla.netfilter.org/show_bug.cgi?id=778 Netfilter on bridge interface containing a defective NIC -> http://bugzilla.netfilter.org/show_bug.cgi?id=779 Memory utilization continuously increasing day by day -> http://bugzilla.netfilter.org/show_bug.cgi?id=784 Normalize iptables rules -> http://bugzilla.netfilter.org/show_bug.cgi?id=790 ulogd -d does not close all fds -> http://bugzilla.netfilter.org/show_bug.cgi?id=793 -f option used with iptables -> http://bugzilla.netfilter.org/show_bug.cgi?id=794 RELATED doesn't accommodate multicast UDP solicitation resulting in unicast reply -> http://bugzilla.netfilter.org/show_bug.cgi?id=795 sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook -> http://bugzilla.netfilter.org/show_bug.cgi?id=800 Bridge dropping Ipsec fragmented packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=801 Lack of error feedback on SELinux denial -> http://bugzilla.netfilter.org/show_bug.cgi?id=802
bugzilla-daemon at bugzilla.netfilter.org
2012-Dec-11 00:46 UTC
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.] You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require attention. All of these bugs are in the NEW or REOPENED state, and have not been touched in 7 days or more. You need to take a look at them, and decide on an initial action. Generally, this means one of three things: (1) You decide this bug is really quick to deal with (like, it's INVALID), and so you get rid of it immediately. (2) You decide the bug doesn't belong to you, and you reassign it to someone else. (Hint: if you don't know who to reassign it to, make sure that the Component field seems reasonable, and then use the "Reset Assignee to default" option.) (3) You decide the bug belongs to you, but you can't solve it this moment. Accept the bug by setting the status to ASSIGNED. To get a list of all NEW/REOPENED bugs, you can use this URL (bookmark it if you like!): http://bugzilla.netfilter.org/buglist.cgi?bug_status=NEW&bug_status=REOPENED&assigned_to=netfilter-buglog at lists.netfilter.org Or, you can use the general query page, at http://bugzilla.netfilter.org/query.cgi Appended below are the individual URLs to get to all of your NEW bugs that haven't been touched for 7 days or more. You will get this message once a day until you've dealt with these bugs! Enhancement: Allow rules to specify ICMP type ranges. -> http://bugzilla.netfilter.org/show_bug.cgi?id=630 netfilters clamp-mss-to-pmtu sets bad MSS when none was set before -> http://bugzilla.netfilter.org/show_bug.cgi?id=662 Postrouting + IPsec + IPv6 -> http://bugzilla.netfilter.org/show_bug.cgi?id=663 connlimit doesn't work properly -> http://bugzilla.netfilter.org/show_bug.cgi?id=676 add PID and UID to netfilter-queue -> http://bugzilla.netfilter.org/show_bug.cgi?id=678 iptables-xml missing <match> in first <conditions> node -> http://bugzilla.netfilter.org/show_bug.cgi?id=679 Ruleset counter on -m recent match when recent table OVERFLOWED. -> http://bugzilla.netfilter.org/show_bug.cgi?id=689 Files with the same name in case-insensitive file systems -> http://bugzilla.netfilter.org/show_bug.cgi?id=694 Extra tcp options for REJECT --reject-with tcp-reset-both / tcp-reset-destination -> http://bugzilla.netfilter.org/show_bug.cgi?id=696 please add new options to iptables-restore to continue on error and suppress error output -> http://bugzilla.netfilter.org/show_bug.cgi?id=699 PPPoE masqeuraded connection reset when talking to Amazon S3 -> http://bugzilla.netfilter.org/show_bug.cgi?id=701 A way to convert an iptables command to its iptables-save equivalent output -> http://bugzilla.netfilter.org/show_bug.cgi?id=705 Some accepted packets get lost -> http://bugzilla.netfilter.org/show_bug.cgi?id=708 nfq_nfnlh() and nfq_fd() should have const arguments -> http://bugzilla.netfilter.org/show_bug.cgi?id=715 Errors in compiling nfqnl_test.c -> http://bugzilla.netfilter.org/show_bug.cgi?id=743 Range check for ulog-cprange is wrong -> http://bugzilla.netfilter.org/show_bug.cgi?id=748 IPv6 bridging bug -> http://bugzilla.netfilter.org/show_bug.cgi?id=751 ipq_read() will return an error (rc = -1) and the error message says "Received truncated message" -> http://bugzilla.netfilter.org/show_bug.cgi?id=752 iptables: Memory allocation problem. -> http://bugzilla.netfilter.org/show_bug.cgi?id=756 Retry iptables command on transient failure -> http://bugzilla.netfilter.org/show_bug.cgi?id=758 "iptables -m recent" crashes a LXC host on lxc-stop -> http://bugzilla.netfilter.org/show_bug.cgi?id=759 nf_ct_sip dropping SIP messages larger then MTU -> http://bugzilla.netfilter.org/show_bug.cgi?id=760 dnat and snat not changing port numbers on sctp packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=763 Doing -Z twice in parallel breaks counters -> http://bugzilla.netfilter.org/show_bug.cgi?id=764 Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule -> http://bugzilla.netfilter.org/show_bug.cgi?id=766 Fix a compiler warning [-Wunused-variable] -> http://bugzilla.netfilter.org/show_bug.cgi?id=767 Returns the position the entry was inserted -> http://bugzilla.netfilter.org/show_bug.cgi?id=768 iptables SNAT does not handle argument --persistent -> http://bugzilla.netfilter.org/show_bug.cgi?id=769 ipt_REJECT: multi-directional tcp-reset -> http://bugzilla.netfilter.org/show_bug.cgi?id=770 nf_conntrack_proto_tcp BUG?? -> http://bugzilla.netfilter.org/show_bug.cgi?id=771 Rate Limiting -> http://bugzilla.netfilter.org/show_bug.cgi?id=772 -m owner ! --uid-owner False positive logging -> http://bugzilla.netfilter.org/show_bug.cgi?id=775 Suspect bug in __do_replace() -> http://bugzilla.netfilter.org/show_bug.cgi?id=777 NFQUEUE --queue-bypass accepts all packets when no userspace application is available -> http://bugzilla.netfilter.org/show_bug.cgi?id=778 Netfilter on bridge interface containing a defective NIC -> http://bugzilla.netfilter.org/show_bug.cgi?id=779 Memory utilization continuously increasing day by day -> http://bugzilla.netfilter.org/show_bug.cgi?id=784 Normalize iptables rules -> http://bugzilla.netfilter.org/show_bug.cgi?id=790 ulogd -d does not close all fds -> http://bugzilla.netfilter.org/show_bug.cgi?id=793 -f option used with iptables -> http://bugzilla.netfilter.org/show_bug.cgi?id=794 RELATED doesn't accommodate multicast UDP solicitation resulting in unicast reply -> http://bugzilla.netfilter.org/show_bug.cgi?id=795 sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook -> http://bugzilla.netfilter.org/show_bug.cgi?id=800 Bridge dropping Ipsec fragmented packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=801 Lack of error feedback on SELinux denial -> http://bugzilla.netfilter.org/show_bug.cgi?id=802
bugzilla-daemon at bugzilla.netfilter.org
2012-Dec-12 00:46 UTC
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.] You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require attention. All of these bugs are in the NEW or REOPENED state, and have not been touched in 7 days or more. You need to take a look at them, and decide on an initial action. Generally, this means one of three things: (1) You decide this bug is really quick to deal with (like, it's INVALID), and so you get rid of it immediately. (2) You decide the bug doesn't belong to you, and you reassign it to someone else. (Hint: if you don't know who to reassign it to, make sure that the Component field seems reasonable, and then use the "Reset Assignee to default" option.) (3) You decide the bug belongs to you, but you can't solve it this moment. Accept the bug by setting the status to ASSIGNED. To get a list of all NEW/REOPENED bugs, you can use this URL (bookmark it if you like!): http://bugzilla.netfilter.org/buglist.cgi?bug_status=NEW&bug_status=REOPENED&assigned_to=netfilter-buglog at lists.netfilter.org Or, you can use the general query page, at http://bugzilla.netfilter.org/query.cgi Appended below are the individual URLs to get to all of your NEW bugs that haven't been touched for 7 days or more. You will get this message once a day until you've dealt with these bugs! Enhancement: Allow rules to specify ICMP type ranges. -> http://bugzilla.netfilter.org/show_bug.cgi?id=630 netfilters clamp-mss-to-pmtu sets bad MSS when none was set before -> http://bugzilla.netfilter.org/show_bug.cgi?id=662 Postrouting + IPsec + IPv6 -> http://bugzilla.netfilter.org/show_bug.cgi?id=663 connlimit doesn't work properly -> http://bugzilla.netfilter.org/show_bug.cgi?id=676 add PID and UID to netfilter-queue -> http://bugzilla.netfilter.org/show_bug.cgi?id=678 iptables-xml missing <match> in first <conditions> node -> http://bugzilla.netfilter.org/show_bug.cgi?id=679 Ruleset counter on -m recent match when recent table OVERFLOWED. -> http://bugzilla.netfilter.org/show_bug.cgi?id=689 Files with the same name in case-insensitive file systems -> http://bugzilla.netfilter.org/show_bug.cgi?id=694 Extra tcp options for REJECT --reject-with tcp-reset-both / tcp-reset-destination -> http://bugzilla.netfilter.org/show_bug.cgi?id=696 please add new options to iptables-restore to continue on error and suppress error output -> http://bugzilla.netfilter.org/show_bug.cgi?id=699 PPPoE masqeuraded connection reset when talking to Amazon S3 -> http://bugzilla.netfilter.org/show_bug.cgi?id=701 A way to convert an iptables command to its iptables-save equivalent output -> http://bugzilla.netfilter.org/show_bug.cgi?id=705 Some accepted packets get lost -> http://bugzilla.netfilter.org/show_bug.cgi?id=708 nfq_nfnlh() and nfq_fd() should have const arguments -> http://bugzilla.netfilter.org/show_bug.cgi?id=715 Errors in compiling nfqnl_test.c -> http://bugzilla.netfilter.org/show_bug.cgi?id=743 Range check for ulog-cprange is wrong -> http://bugzilla.netfilter.org/show_bug.cgi?id=748 IPv6 bridging bug -> http://bugzilla.netfilter.org/show_bug.cgi?id=751 ipq_read() will return an error (rc = -1) and the error message says "Received truncated message" -> http://bugzilla.netfilter.org/show_bug.cgi?id=752 iptables: Memory allocation problem. -> http://bugzilla.netfilter.org/show_bug.cgi?id=756 Retry iptables command on transient failure -> http://bugzilla.netfilter.org/show_bug.cgi?id=758 "iptables -m recent" crashes a LXC host on lxc-stop -> http://bugzilla.netfilter.org/show_bug.cgi?id=759 nf_ct_sip dropping SIP messages larger then MTU -> http://bugzilla.netfilter.org/show_bug.cgi?id=760 dnat and snat not changing port numbers on sctp packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=763 Doing -Z twice in parallel breaks counters -> http://bugzilla.netfilter.org/show_bug.cgi?id=764 Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule -> http://bugzilla.netfilter.org/show_bug.cgi?id=766 Fix a compiler warning [-Wunused-variable] -> http://bugzilla.netfilter.org/show_bug.cgi?id=767 Returns the position the entry was inserted -> http://bugzilla.netfilter.org/show_bug.cgi?id=768 iptables SNAT does not handle argument --persistent -> http://bugzilla.netfilter.org/show_bug.cgi?id=769 ipt_REJECT: multi-directional tcp-reset -> http://bugzilla.netfilter.org/show_bug.cgi?id=770 nf_conntrack_proto_tcp BUG?? -> http://bugzilla.netfilter.org/show_bug.cgi?id=771 Rate Limiting -> http://bugzilla.netfilter.org/show_bug.cgi?id=772 -m owner ! --uid-owner False positive logging -> http://bugzilla.netfilter.org/show_bug.cgi?id=775 Suspect bug in __do_replace() -> http://bugzilla.netfilter.org/show_bug.cgi?id=777 NFQUEUE --queue-bypass accepts all packets when no userspace application is available -> http://bugzilla.netfilter.org/show_bug.cgi?id=778 Netfilter on bridge interface containing a defective NIC -> http://bugzilla.netfilter.org/show_bug.cgi?id=779 Memory utilization continuously increasing day by day -> http://bugzilla.netfilter.org/show_bug.cgi?id=784 Normalize iptables rules -> http://bugzilla.netfilter.org/show_bug.cgi?id=790 ulogd -d does not close all fds -> http://bugzilla.netfilter.org/show_bug.cgi?id=793 -f option used with iptables -> http://bugzilla.netfilter.org/show_bug.cgi?id=794 RELATED doesn't accommodate multicast UDP solicitation resulting in unicast reply -> http://bugzilla.netfilter.org/show_bug.cgi?id=795 sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook -> http://bugzilla.netfilter.org/show_bug.cgi?id=800 Bridge dropping Ipsec fragmented packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=801 Lack of error feedback on SELinux denial -> http://bugzilla.netfilter.org/show_bug.cgi?id=802
bugzilla-daemon at bugzilla.netfilter.org
2012-Dec-13 00:46 UTC
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.] You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require attention. All of these bugs are in the NEW or REOPENED state, and have not been touched in 7 days or more. You need to take a look at them, and decide on an initial action. Generally, this means one of three things: (1) You decide this bug is really quick to deal with (like, it's INVALID), and so you get rid of it immediately. (2) You decide the bug doesn't belong to you, and you reassign it to someone else. (Hint: if you don't know who to reassign it to, make sure that the Component field seems reasonable, and then use the "Reset Assignee to default" option.) (3) You decide the bug belongs to you, but you can't solve it this moment. Accept the bug by setting the status to ASSIGNED. To get a list of all NEW/REOPENED bugs, you can use this URL (bookmark it if you like!): http://bugzilla.netfilter.org/buglist.cgi?bug_status=NEW&bug_status=REOPENED&assigned_to=netfilter-buglog at lists.netfilter.org Or, you can use the general query page, at http://bugzilla.netfilter.org/query.cgi Appended below are the individual URLs to get to all of your NEW bugs that haven't been touched for 7 days or more. You will get this message once a day until you've dealt with these bugs! Enhancement: Allow rules to specify ICMP type ranges. -> http://bugzilla.netfilter.org/show_bug.cgi?id=630 netfilters clamp-mss-to-pmtu sets bad MSS when none was set before -> http://bugzilla.netfilter.org/show_bug.cgi?id=662 Postrouting + IPsec + IPv6 -> http://bugzilla.netfilter.org/show_bug.cgi?id=663 connlimit doesn't work properly -> http://bugzilla.netfilter.org/show_bug.cgi?id=676 add PID and UID to netfilter-queue -> http://bugzilla.netfilter.org/show_bug.cgi?id=678 iptables-xml missing <match> in first <conditions> node -> http://bugzilla.netfilter.org/show_bug.cgi?id=679 Ruleset counter on -m recent match when recent table OVERFLOWED. -> http://bugzilla.netfilter.org/show_bug.cgi?id=689 Files with the same name in case-insensitive file systems -> http://bugzilla.netfilter.org/show_bug.cgi?id=694 Extra tcp options for REJECT --reject-with tcp-reset-both / tcp-reset-destination -> http://bugzilla.netfilter.org/show_bug.cgi?id=696 please add new options to iptables-restore to continue on error and suppress error output -> http://bugzilla.netfilter.org/show_bug.cgi?id=699 PPPoE masqeuraded connection reset when talking to Amazon S3 -> http://bugzilla.netfilter.org/show_bug.cgi?id=701 A way to convert an iptables command to its iptables-save equivalent output -> http://bugzilla.netfilter.org/show_bug.cgi?id=705 Some accepted packets get lost -> http://bugzilla.netfilter.org/show_bug.cgi?id=708 nfq_nfnlh() and nfq_fd() should have const arguments -> http://bugzilla.netfilter.org/show_bug.cgi?id=715 Errors in compiling nfqnl_test.c -> http://bugzilla.netfilter.org/show_bug.cgi?id=743 Range check for ulog-cprange is wrong -> http://bugzilla.netfilter.org/show_bug.cgi?id=748 IPv6 bridging bug -> http://bugzilla.netfilter.org/show_bug.cgi?id=751 ipq_read() will return an error (rc = -1) and the error message says "Received truncated message" -> http://bugzilla.netfilter.org/show_bug.cgi?id=752 iptables: Memory allocation problem. -> http://bugzilla.netfilter.org/show_bug.cgi?id=756 Retry iptables command on transient failure -> http://bugzilla.netfilter.org/show_bug.cgi?id=758 "iptables -m recent" crashes a LXC host on lxc-stop -> http://bugzilla.netfilter.org/show_bug.cgi?id=759 nf_ct_sip dropping SIP messages larger then MTU -> http://bugzilla.netfilter.org/show_bug.cgi?id=760 dnat and snat not changing port numbers on sctp packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=763 Doing -Z twice in parallel breaks counters -> http://bugzilla.netfilter.org/show_bug.cgi?id=764 Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule -> http://bugzilla.netfilter.org/show_bug.cgi?id=766 Fix a compiler warning [-Wunused-variable] -> http://bugzilla.netfilter.org/show_bug.cgi?id=767 Returns the position the entry was inserted -> http://bugzilla.netfilter.org/show_bug.cgi?id=768 iptables SNAT does not handle argument --persistent -> http://bugzilla.netfilter.org/show_bug.cgi?id=769 ipt_REJECT: multi-directional tcp-reset -> http://bugzilla.netfilter.org/show_bug.cgi?id=770 nf_conntrack_proto_tcp BUG?? -> http://bugzilla.netfilter.org/show_bug.cgi?id=771 Rate Limiting -> http://bugzilla.netfilter.org/show_bug.cgi?id=772 -m owner ! --uid-owner False positive logging -> http://bugzilla.netfilter.org/show_bug.cgi?id=775 Suspect bug in __do_replace() -> http://bugzilla.netfilter.org/show_bug.cgi?id=777 NFQUEUE --queue-bypass accepts all packets when no userspace application is available -> http://bugzilla.netfilter.org/show_bug.cgi?id=778 Netfilter on bridge interface containing a defective NIC -> http://bugzilla.netfilter.org/show_bug.cgi?id=779 Memory utilization continuously increasing day by day -> http://bugzilla.netfilter.org/show_bug.cgi?id=784 Normalize iptables rules -> http://bugzilla.netfilter.org/show_bug.cgi?id=790 ulogd -d does not close all fds -> http://bugzilla.netfilter.org/show_bug.cgi?id=793 -f option used with iptables -> http://bugzilla.netfilter.org/show_bug.cgi?id=794 RELATED doesn't accommodate multicast UDP solicitation resulting in unicast reply -> http://bugzilla.netfilter.org/show_bug.cgi?id=795 sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook -> http://bugzilla.netfilter.org/show_bug.cgi?id=800 Bridge dropping Ipsec fragmented packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=801 Lack of error feedback on SELinux denial -> http://bugzilla.netfilter.org/show_bug.cgi?id=802
bugzilla-daemon at bugzilla.netfilter.org
2012-Dec-14 00:46 UTC
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.] You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require attention. All of these bugs are in the NEW or REOPENED state, and have not been touched in 7 days or more. You need to take a look at them, and decide on an initial action. Generally, this means one of three things: (1) You decide this bug is really quick to deal with (like, it's INVALID), and so you get rid of it immediately. (2) You decide the bug doesn't belong to you, and you reassign it to someone else. (Hint: if you don't know who to reassign it to, make sure that the Component field seems reasonable, and then use the "Reset Assignee to default" option.) (3) You decide the bug belongs to you, but you can't solve it this moment. Accept the bug by setting the status to ASSIGNED. To get a list of all NEW/REOPENED bugs, you can use this URL (bookmark it if you like!): http://bugzilla.netfilter.org/buglist.cgi?bug_status=NEW&bug_status=REOPENED&assigned_to=netfilter-buglog at lists.netfilter.org Or, you can use the general query page, at http://bugzilla.netfilter.org/query.cgi Appended below are the individual URLs to get to all of your NEW bugs that haven't been touched for 7 days or more. You will get this message once a day until you've dealt with these bugs! Enhancement: Allow rules to specify ICMP type ranges. -> http://bugzilla.netfilter.org/show_bug.cgi?id=630 netfilters clamp-mss-to-pmtu sets bad MSS when none was set before -> http://bugzilla.netfilter.org/show_bug.cgi?id=662 Postrouting + IPsec + IPv6 -> http://bugzilla.netfilter.org/show_bug.cgi?id=663 connlimit doesn't work properly -> http://bugzilla.netfilter.org/show_bug.cgi?id=676 add PID and UID to netfilter-queue -> http://bugzilla.netfilter.org/show_bug.cgi?id=678 iptables-xml missing <match> in first <conditions> node -> http://bugzilla.netfilter.org/show_bug.cgi?id=679 Ruleset counter on -m recent match when recent table OVERFLOWED. -> http://bugzilla.netfilter.org/show_bug.cgi?id=689 Files with the same name in case-insensitive file systems -> http://bugzilla.netfilter.org/show_bug.cgi?id=694 Extra tcp options for REJECT --reject-with tcp-reset-both / tcp-reset-destination -> http://bugzilla.netfilter.org/show_bug.cgi?id=696 please add new options to iptables-restore to continue on error and suppress error output -> http://bugzilla.netfilter.org/show_bug.cgi?id=699 PPPoE masqeuraded connection reset when talking to Amazon S3 -> http://bugzilla.netfilter.org/show_bug.cgi?id=701 A way to convert an iptables command to its iptables-save equivalent output -> http://bugzilla.netfilter.org/show_bug.cgi?id=705 Some accepted packets get lost -> http://bugzilla.netfilter.org/show_bug.cgi?id=708 nfq_nfnlh() and nfq_fd() should have const arguments -> http://bugzilla.netfilter.org/show_bug.cgi?id=715 Errors in compiling nfqnl_test.c -> http://bugzilla.netfilter.org/show_bug.cgi?id=743 Range check for ulog-cprange is wrong -> http://bugzilla.netfilter.org/show_bug.cgi?id=748 IPv6 bridging bug -> http://bugzilla.netfilter.org/show_bug.cgi?id=751 ipq_read() will return an error (rc = -1) and the error message says "Received truncated message" -> http://bugzilla.netfilter.org/show_bug.cgi?id=752 change bugzilla account e-mail -> http://bugzilla.netfilter.org/show_bug.cgi?id=755 iptables: Memory allocation problem. -> http://bugzilla.netfilter.org/show_bug.cgi?id=756 Retry iptables command on transient failure -> http://bugzilla.netfilter.org/show_bug.cgi?id=758 "iptables -m recent" crashes a LXC host on lxc-stop -> http://bugzilla.netfilter.org/show_bug.cgi?id=759 nf_ct_sip dropping SIP messages larger then MTU -> http://bugzilla.netfilter.org/show_bug.cgi?id=760 dnat and snat not changing port numbers on sctp packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=763 Doing -Z twice in parallel breaks counters -> http://bugzilla.netfilter.org/show_bug.cgi?id=764 Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule -> http://bugzilla.netfilter.org/show_bug.cgi?id=766 Fix a compiler warning [-Wunused-variable] -> http://bugzilla.netfilter.org/show_bug.cgi?id=767 Returns the position the entry was inserted -> http://bugzilla.netfilter.org/show_bug.cgi?id=768 iptables SNAT does not handle argument --persistent -> http://bugzilla.netfilter.org/show_bug.cgi?id=769 ipt_REJECT: multi-directional tcp-reset -> http://bugzilla.netfilter.org/show_bug.cgi?id=770 nf_conntrack_proto_tcp BUG?? -> http://bugzilla.netfilter.org/show_bug.cgi?id=771 Rate Limiting -> http://bugzilla.netfilter.org/show_bug.cgi?id=772 -m owner ! --uid-owner False positive logging -> http://bugzilla.netfilter.org/show_bug.cgi?id=775 Suspect bug in __do_replace() -> http://bugzilla.netfilter.org/show_bug.cgi?id=777 NFQUEUE --queue-bypass accepts all packets when no userspace application is available -> http://bugzilla.netfilter.org/show_bug.cgi?id=778 Netfilter on bridge interface containing a defective NIC -> http://bugzilla.netfilter.org/show_bug.cgi?id=779 Memory utilization continuously increasing day by day -> http://bugzilla.netfilter.org/show_bug.cgi?id=784 Normalize iptables rules -> http://bugzilla.netfilter.org/show_bug.cgi?id=790 ulogd -d does not close all fds -> http://bugzilla.netfilter.org/show_bug.cgi?id=793 -f option used with iptables -> http://bugzilla.netfilter.org/show_bug.cgi?id=794 RELATED doesn't accommodate multicast UDP solicitation resulting in unicast reply -> http://bugzilla.netfilter.org/show_bug.cgi?id=795 sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook -> http://bugzilla.netfilter.org/show_bug.cgi?id=800 Bridge dropping Ipsec fragmented packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=801 Lack of error feedback on SELinux denial -> http://bugzilla.netfilter.org/show_bug.cgi?id=802
bugzilla-daemon at bugzilla.netfilter.org
2012-Dec-15 00:46 UTC
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.] You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require attention. All of these bugs are in the NEW or REOPENED state, and have not been touched in 7 days or more. You need to take a look at them, and decide on an initial action. Generally, this means one of three things: (1) You decide this bug is really quick to deal with (like, it's INVALID), and so you get rid of it immediately. (2) You decide the bug doesn't belong to you, and you reassign it to someone else. (Hint: if you don't know who to reassign it to, make sure that the Component field seems reasonable, and then use the "Reset Assignee to default" option.) (3) You decide the bug belongs to you, but you can't solve it this moment. Accept the bug by setting the status to ASSIGNED. To get a list of all NEW/REOPENED bugs, you can use this URL (bookmark it if you like!): http://bugzilla.netfilter.org/buglist.cgi?bug_status=NEW&bug_status=REOPENED&assigned_to=netfilter-buglog at lists.netfilter.org Or, you can use the general query page, at http://bugzilla.netfilter.org/query.cgi Appended below are the individual URLs to get to all of your NEW bugs that haven't been touched for 7 days or more. You will get this message once a day until you've dealt with these bugs! Enhancement: Allow rules to specify ICMP type ranges. -> http://bugzilla.netfilter.org/show_bug.cgi?id=630 netfilters clamp-mss-to-pmtu sets bad MSS when none was set before -> http://bugzilla.netfilter.org/show_bug.cgi?id=662 Postrouting + IPsec + IPv6 -> http://bugzilla.netfilter.org/show_bug.cgi?id=663 connlimit doesn't work properly -> http://bugzilla.netfilter.org/show_bug.cgi?id=676 add PID and UID to netfilter-queue -> http://bugzilla.netfilter.org/show_bug.cgi?id=678 iptables-xml missing <match> in first <conditions> node -> http://bugzilla.netfilter.org/show_bug.cgi?id=679 Ruleset counter on -m recent match when recent table OVERFLOWED. -> http://bugzilla.netfilter.org/show_bug.cgi?id=689 Files with the same name in case-insensitive file systems -> http://bugzilla.netfilter.org/show_bug.cgi?id=694 Extra tcp options for REJECT --reject-with tcp-reset-both / tcp-reset-destination -> http://bugzilla.netfilter.org/show_bug.cgi?id=696 please add new options to iptables-restore to continue on error and suppress error output -> http://bugzilla.netfilter.org/show_bug.cgi?id=699 PPPoE masqeuraded connection reset when talking to Amazon S3 -> http://bugzilla.netfilter.org/show_bug.cgi?id=701 A way to convert an iptables command to its iptables-save equivalent output -> http://bugzilla.netfilter.org/show_bug.cgi?id=705 Some accepted packets get lost -> http://bugzilla.netfilter.org/show_bug.cgi?id=708 nfq_nfnlh() and nfq_fd() should have const arguments -> http://bugzilla.netfilter.org/show_bug.cgi?id=715 Errors in compiling nfqnl_test.c -> http://bugzilla.netfilter.org/show_bug.cgi?id=743 Range check for ulog-cprange is wrong -> http://bugzilla.netfilter.org/show_bug.cgi?id=748 IPv6 bridging bug -> http://bugzilla.netfilter.org/show_bug.cgi?id=751 ipq_read() will return an error (rc = -1) and the error message says "Received truncated message" -> http://bugzilla.netfilter.org/show_bug.cgi?id=752 change bugzilla account e-mail -> http://bugzilla.netfilter.org/show_bug.cgi?id=755 iptables: Memory allocation problem. -> http://bugzilla.netfilter.org/show_bug.cgi?id=756 Retry iptables command on transient failure -> http://bugzilla.netfilter.org/show_bug.cgi?id=758 "iptables -m recent" crashes a LXC host on lxc-stop -> http://bugzilla.netfilter.org/show_bug.cgi?id=759 nf_ct_sip dropping SIP messages larger then MTU -> http://bugzilla.netfilter.org/show_bug.cgi?id=760 dnat and snat not changing port numbers on sctp packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=763 Doing -Z twice in parallel breaks counters -> http://bugzilla.netfilter.org/show_bug.cgi?id=764 Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule -> http://bugzilla.netfilter.org/show_bug.cgi?id=766 Fix a compiler warning [-Wunused-variable] -> http://bugzilla.netfilter.org/show_bug.cgi?id=767 Returns the position the entry was inserted -> http://bugzilla.netfilter.org/show_bug.cgi?id=768 iptables SNAT does not handle argument --persistent -> http://bugzilla.netfilter.org/show_bug.cgi?id=769 ipt_REJECT: multi-directional tcp-reset -> http://bugzilla.netfilter.org/show_bug.cgi?id=770 nf_conntrack_proto_tcp BUG?? -> http://bugzilla.netfilter.org/show_bug.cgi?id=771 Rate Limiting -> http://bugzilla.netfilter.org/show_bug.cgi?id=772 -m owner ! --uid-owner False positive logging -> http://bugzilla.netfilter.org/show_bug.cgi?id=775 Suspect bug in __do_replace() -> http://bugzilla.netfilter.org/show_bug.cgi?id=777 NFQUEUE --queue-bypass accepts all packets when no userspace application is available -> http://bugzilla.netfilter.org/show_bug.cgi?id=778 Netfilter on bridge interface containing a defective NIC -> http://bugzilla.netfilter.org/show_bug.cgi?id=779 Memory utilization continuously increasing day by day -> http://bugzilla.netfilter.org/show_bug.cgi?id=784 Normalize iptables rules -> http://bugzilla.netfilter.org/show_bug.cgi?id=790 ulogd -d does not close all fds -> http://bugzilla.netfilter.org/show_bug.cgi?id=793 -f option used with iptables -> http://bugzilla.netfilter.org/show_bug.cgi?id=794 RELATED doesn't accommodate multicast UDP solicitation resulting in unicast reply -> http://bugzilla.netfilter.org/show_bug.cgi?id=795 sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook -> http://bugzilla.netfilter.org/show_bug.cgi?id=800 Bridge dropping Ipsec fragmented packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=801 Lack of error feedback on SELinux denial -> http://bugzilla.netfilter.org/show_bug.cgi?id=802
bugzilla-daemon at bugzilla.netfilter.org
2012-Dec-16 00:46 UTC
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.] You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require attention. All of these bugs are in the NEW or REOPENED state, and have not been touched in 7 days or more. You need to take a look at them, and decide on an initial action. Generally, this means one of three things: (1) You decide this bug is really quick to deal with (like, it's INVALID), and so you get rid of it immediately. (2) You decide the bug doesn't belong to you, and you reassign it to someone else. (Hint: if you don't know who to reassign it to, make sure that the Component field seems reasonable, and then use the "Reset Assignee to default" option.) (3) You decide the bug belongs to you, but you can't solve it this moment. Accept the bug by setting the status to ASSIGNED. To get a list of all NEW/REOPENED bugs, you can use this URL (bookmark it if you like!): http://bugzilla.netfilter.org/buglist.cgi?bug_status=NEW&bug_status=REOPENED&assigned_to=netfilter-buglog at lists.netfilter.org Or, you can use the general query page, at http://bugzilla.netfilter.org/query.cgi Appended below are the individual URLs to get to all of your NEW bugs that haven't been touched for 7 days or more. You will get this message once a day until you've dealt with these bugs! Enhancement: Allow rules to specify ICMP type ranges. -> http://bugzilla.netfilter.org/show_bug.cgi?id=630 netfilters clamp-mss-to-pmtu sets bad MSS when none was set before -> http://bugzilla.netfilter.org/show_bug.cgi?id=662 Postrouting + IPsec + IPv6 -> http://bugzilla.netfilter.org/show_bug.cgi?id=663 connlimit doesn't work properly -> http://bugzilla.netfilter.org/show_bug.cgi?id=676 add PID and UID to netfilter-queue -> http://bugzilla.netfilter.org/show_bug.cgi?id=678 iptables-xml missing <match> in first <conditions> node -> http://bugzilla.netfilter.org/show_bug.cgi?id=679 Ruleset counter on -m recent match when recent table OVERFLOWED. -> http://bugzilla.netfilter.org/show_bug.cgi?id=689 Files with the same name in case-insensitive file systems -> http://bugzilla.netfilter.org/show_bug.cgi?id=694 Extra tcp options for REJECT --reject-with tcp-reset-both / tcp-reset-destination -> http://bugzilla.netfilter.org/show_bug.cgi?id=696 please add new options to iptables-restore to continue on error and suppress error output -> http://bugzilla.netfilter.org/show_bug.cgi?id=699 PPPoE masqeuraded connection reset when talking to Amazon S3 -> http://bugzilla.netfilter.org/show_bug.cgi?id=701 A way to convert an iptables command to its iptables-save equivalent output -> http://bugzilla.netfilter.org/show_bug.cgi?id=705 Some accepted packets get lost -> http://bugzilla.netfilter.org/show_bug.cgi?id=708 nfq_nfnlh() and nfq_fd() should have const arguments -> http://bugzilla.netfilter.org/show_bug.cgi?id=715 Errors in compiling nfqnl_test.c -> http://bugzilla.netfilter.org/show_bug.cgi?id=743 Range check for ulog-cprange is wrong -> http://bugzilla.netfilter.org/show_bug.cgi?id=748 IPv6 bridging bug -> http://bugzilla.netfilter.org/show_bug.cgi?id=751 ipq_read() will return an error (rc = -1) and the error message says "Received truncated message" -> http://bugzilla.netfilter.org/show_bug.cgi?id=752 change bugzilla account e-mail -> http://bugzilla.netfilter.org/show_bug.cgi?id=755 iptables: Memory allocation problem. -> http://bugzilla.netfilter.org/show_bug.cgi?id=756 Retry iptables command on transient failure -> http://bugzilla.netfilter.org/show_bug.cgi?id=758 "iptables -m recent" crashes a LXC host on lxc-stop -> http://bugzilla.netfilter.org/show_bug.cgi?id=759 nf_ct_sip dropping SIP messages larger then MTU -> http://bugzilla.netfilter.org/show_bug.cgi?id=760 dnat and snat not changing port numbers on sctp packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=763 Doing -Z twice in parallel breaks counters -> http://bugzilla.netfilter.org/show_bug.cgi?id=764 Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule -> http://bugzilla.netfilter.org/show_bug.cgi?id=766 Fix a compiler warning [-Wunused-variable] -> http://bugzilla.netfilter.org/show_bug.cgi?id=767 Returns the position the entry was inserted -> http://bugzilla.netfilter.org/show_bug.cgi?id=768 iptables SNAT does not handle argument --persistent -> http://bugzilla.netfilter.org/show_bug.cgi?id=769 ipt_REJECT: multi-directional tcp-reset -> http://bugzilla.netfilter.org/show_bug.cgi?id=770 nf_conntrack_proto_tcp BUG?? -> http://bugzilla.netfilter.org/show_bug.cgi?id=771 Rate Limiting -> http://bugzilla.netfilter.org/show_bug.cgi?id=772 -m owner ! --uid-owner False positive logging -> http://bugzilla.netfilter.org/show_bug.cgi?id=775 Suspect bug in __do_replace() -> http://bugzilla.netfilter.org/show_bug.cgi?id=777 NFQUEUE --queue-bypass accepts all packets when no userspace application is available -> http://bugzilla.netfilter.org/show_bug.cgi?id=778 Netfilter on bridge interface containing a defective NIC -> http://bugzilla.netfilter.org/show_bug.cgi?id=779 Memory utilization continuously increasing day by day -> http://bugzilla.netfilter.org/show_bug.cgi?id=784 Normalize iptables rules -> http://bugzilla.netfilter.org/show_bug.cgi?id=790 ulogd -d does not close all fds -> http://bugzilla.netfilter.org/show_bug.cgi?id=793 -f option used with iptables -> http://bugzilla.netfilter.org/show_bug.cgi?id=794 RELATED doesn't accommodate multicast UDP solicitation resulting in unicast reply -> http://bugzilla.netfilter.org/show_bug.cgi?id=795 sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook -> http://bugzilla.netfilter.org/show_bug.cgi?id=800 Bridge dropping Ipsec fragmented packets -> http://bugzilla.netfilter.org/show_bug.cgi?id=801 Lack of error feedback on SELinux denial -> http://bugzilla.netfilter.org/show_bug.cgi?id=802
Possibly Parallel Threads
- Your Bugzilla bug list needs attention.
- Your Bugzilla bug list needs attention.
- [Bug 715] New: nfq_nfnlh() and nfq_fd() should have const arguments
- [Bug 748] New: Range check for ulog-cprange is wrong
- [Bug 800] New: sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook