bugzilla-daemon at netfilter.org
2014-May-07 07:32 UTC
[Bug 928] New: ECN: --ecn-tcp-ece and --ecn-ip-ect is not supported
https://bugzilla.netfilter.org/show_bug.cgi?id=928 Summary: ECN: --ecn-tcp-ece and --ecn-ip-ect is not supported Product: nftables Version: unspecified Platform: x86_64 OS/Version: Debian GNU/Linux Status: NEW Severity: normal Priority: P5 Component: nft AssignedTo: pablo at netfilter.org ReportedBy: anarey at gmail.com Estimated Hours: 0.0 The following command-line parameters in ECN iptables-extensions are not supported in nft yet: --ecn-tcp-ece --ecn-ip-ect The last commit in Pablo git tree of kernel is "40e6442 netfilter: x_tables: allow to use cgroup match for LOCAL_IN nf hooks" The last commit in libmnl repo is "090a842 examples: use mnl_socket_setsockopt" The last commit in libnftnl repo is "57107c2 common: fix unconditional output of event wrapping stuff" The last commit in nftables repo is "aefa9bf expression: Fix inconsistent output in set" -- Configure bugmail: https://bugzilla.netfilter.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching all bug changes.
bugzilla-daemon at netfilter.org
2016-May-13 19:37 UTC
[Bug 928] ECN: --ecn-tcp-ece and --ecn-ip-ect is not supported
https://bugzilla.netfilter.org/show_bug.cgi?id=928 Pablo Neira Ayuso <pablo at netfilter.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution|--- |WONTFIX --- Comment #1 from Pablo Neira Ayuso <pablo at netfilter.org> --- We can match these via 'tcp flags'. # nft --debug=netlink add rule x y tcp flags ecn,cwr ip x y [ payload load 1b @ network header + 9 => reg 1 ] [ cmp eq reg 1 0x00000006 ] [ payload load 1b @ transport header + 13 => reg 1 ] [ bitwise reg 1 = (reg=1 & 0x000000c0 ) ^ 0x00000000 ] [ cmp neq reg 1 0x00000000 ] Closing. -- You are receiving this mail because: You are watching all bug changes. -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20160513/b7ec66ab/attachment-0001.html>