search for: addrtype

Displaying 20 results from an estimated 31 matches for "addrtype".

2011 Sep 05
1
[Bug 745] New: [addrtype]addrtype can't match src-type BROADCAST packets
http://bugzilla.netfilter.org/show_bug.cgi?id=745 Summary: [addrtype]addrtype can't match src-type BROADCAST packets Product: netfilter/iptables Version: linux-2.6.x Platform: mips64 OS/Version: Debian GNU/Linux Status: NEW Severity: major Priority: P5 Component:...
2013 Jun 14
0
[Bug 745] [addrtype]addrtype can't match src-type BROADCAST packets
https://bugzilla.netfilter.org/show_bug.cgi?id=745 Phil Oester <netfilter at linuxace.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED CC| |netfilter at linuxace.com Resolution|
2013 Mar 05
0
[Bug 812] New: addrtype with limit-iface-in in ip6tables/nat/PREROUTING messes up the route cache
http://bugzilla.netfilter.org/show_bug.cgi?id=812 Summary: addrtype with limit-iface-in in ip6tables/nat/PREROUTING messes up the route cache Product: netfilter/iptables Version: unspecified Platform: x86_64 OS/Version: All Status: NEW Severity: major Priority: P5 C...
2013 Apr 21
2
[Bug 812] addrtype with limit-iface-in in ip6tables/nat/PREROUTING messes up the route cache
https://bugzilla.netfilter.org/show_bug.cgi?id=812 Florian Westphal <fw at strlen.de> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |fw at strlen.de --- Comment #1 from Florian Westphal <fw at strlen.de> 2013-04-21 16:48:04 CEST ---
2013 Jun 05
0
[Bug 812] addrtype with limit-iface-in in ip6tables/nat/PREROUTING messes up the route cache
...CC| |netfilter at linuxace.com Resolution| |FIXED --- Comment #4 from Phil Oester <netfilter at linuxace.com> 2013-06-05 14:28:46 CEST --- This was fixed by Florian via 2a7851bf ("netfilter: add nf_ipv6_ops hook to fix xt_addrtype with IPv6"). Closing. -- Configure bugmail: https://bugzilla.netfilter.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching all bug changes.
2019 Feb 12
1
Samba and ufw (Martin McGlensey)
...-input -p tcp -m tcp --dport 139 -j ufw-skip-to-policy-input -A ufw-after-input -p tcp -m tcp --dport 445 -j ufw-skip-to-policy-input -A ufw-after-input -p udp -m udp --dport 67 -j ufw-skip-to-policy-input -A ufw-after-input -p udp -m udp --dport 68 -j ufw-skip-to-policy-input -A ufw-after-input -m addrtype --dst-type BROADCAST -j ufw-skip-to-policy-input -A ufw-after-logging-forward -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] " -A ufw-after-logging-input -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] " -A ufw-before-forward...
2004 Dec 15
2
Compiling samba on Solaris 8 --with-ads
...efix=/opt/cifs/.samba-3.0.9 \ --with-krb5=/opt/cifs/heimdal \ --with-ads but I'm getting the following error message von the configure script: ... checking for krb5_c_enctype_compare... no checking for krb5_enctypes_compatible_keys... no checking for krb5_encrypt_block type... no checking for addrtype in krb5_address... no checking for addr_type in krb5_address... yes checking for enc_part2 in krb5_ticket... no checking for keyblock in krb5_creds... no checking for session in krb5_creds... yes checking for keyvalue in krb5_keyblock... yes checking for ENCTYPE_ARCFOUR_HMAC_MD5... yes checking for...
2008 Oct 05
2
Compiling 3.2.4 --with-krb5=/usr/lib/krb5, not working
...is not the case. When I look in the config.log: configure:55103: checking for Active Directory and krb5 support KRB5CONFIG='' KRB5_LIBS='' WINBIND_KRB5_LOCATOR='' So then, if we do a "make" # less config.h | grep -i krb /* Whether the krb5_address struct has a addrtype property */ /* #undef HAVE_ADDRTYPE_IN_KRB5_ADDRESS */ /* Whether the krb5_address struct has a addr_type property */ /* #undef HAVE_ADDR_TYPE_IN_KRB5_ADDRESS */ /* Whether the krb5_checksum struct has a checksum property */ /* #undef HAVE_CHECKSUM_IN_KRB5_CHECKSUM */ ...all left untouched. Any...
2013 Apr 12
1
Problem with handling of attributes in xmlToList in XML package
...now. Say I have a document (produced by nmap) like this: > mydoc <- '<host starttime="1365204834" endtime="1365205860"><status state="up" reason="echo-reply" reason_ttl="127"/> <address addr="XXX.XXX.XXX.XXX" addrtype="ipv4"/> <ports><port protocol="tcp" portid="135"><state state="open" reason="syn-ack" reason_ttl="127"/><service name="msrpc" product="Microsoft Windows RPC" ostype="Windows" metho...
2015 Sep 26
2
Tinc clients behind a NAT, tunnels get unstable
Am Freitag, den 25.09.2015, 22:45 +0200 schrieb Marcus Schopen: > Hi Guus, > > Am Freitag, den 25.09.2015, 17:46 +0200 schrieb Marcus Schopen: > > Hmmm ... I've tried "LocalDiscovery = yes" > > in /etc/tinc/mytunnel/tinc.conf already, but that didn't help. Config on > > client A is: > > > > --------------- > > Name = clienta >
2006 Oct 18
0
Samba BDC rejected or stuck waiting
...unt=1 AnswerCount=0 AuthorityCount=0 AddressRecCount=1 QuestionRecords: Name=MYDOMAIN NameType=0x1D (Master Browser) QuestionType=0x20 QuestionClass=0x1 ResourceRecords: Name=MYDOMAIN NameType=0x1D (Master Browser) ResType=0x20 ResClass=0x1 TTL=0 (0x0) ResourceLength=6 ResourceData= AddrType=0x0 Address=10 (0xa).0 (0x0).1 (0x1).246 (0xf6) 18:46:23.071515 IP (tos 0x0, ttl 128, id 47604, offset 0, flags [none], proto: UDP (17), length: 90) user.mydomain.netbios-ns > nova.mydomain.netbios-ns: [udp sum ok] >>> NBT UDP PACKET(137): REGISTRATION; NEGATIVE; RESPONSE; UNICA...
2019 Feb 06
2
Samba and ufw
...-input -p tcp -m tcp --dport 139 -j ufw-skip-to-policy-input -A ufw-after-input -p tcp -m tcp --dport 445 -j ufw-skip-to-policy-input -A ufw-after-input -p udp -m udp --dport 67 -j ufw-skip-to-policy-input -A ufw-after-input -p udp -m udp --dport 68 -j ufw-skip-to-policy-input -A ufw-after-input -m addrtype --dst-type BROADCAST -j ufw-skip-to-policy-input -A ufw-after-logging-forward -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] " -A ufw-after-logging-input -m limit --limit 3/min --limit-burst 10 -j LOG --log-prefix "[UFW BLOCK] " -A ufw-after-logging-...
2004 Jun 25
1
Compilation with Kerberos problem
..._con_setuseruserkey... no checking for krb5_locate_kdc... no checking for krb5_get_permitted_enctypes... no checking for krb5_get_default_in_tkt_etypes... no checking for krb5_free_ktypes... no checking for krb5_free_data_contents... no checking for krb5_principal_get_comp_string... no checking for addrtype in krb5_address... no checking for addr_type in krb5_address... yes checking for enc_part2 in krb5_ticket... no checking for keyvalue in krb5_keyblock... yes checking for ENCTYPE_ARCFOUR_HMAC_MD5... yes checking for KEYTYPE_ARCFOUR_56... no checking for AP_OPTS_USE_SUBKEY... yes checking for the kr...
2015 Sep 26
1
Tinc clients behind a NAT, tunnels get unstable
...gt; able to talk directly. UFW firewall is dropping broadcast traffic without noisy logging. After changing this line in /etc/ufw/before.rules broadcast packages are accepted and local tinc clients behind the NAT can connect directly (LocalDiscovery): # if BROADCAST, RETURN ###-A ufw-not-local -m addrtype --dst-type BROADCAST -j RETURN -A ufw-not-local -m addrtype --dst-type BROADCAST -j ACCEPT Ciao Marcus
2008 Jun 10
0
[ANNOUNCE] Release of iptables 1.4.1
The netfilter coreteam proudly presents: iptables version 1.4.1 The header resync turned out to be unproblematic, changes since -rc3 include fixes for iptables-save output of the owner match, support for revision 1 of the addrtype match, more manpage updates and some sparse fixes. For people updating from 1.4.0, this release brings: - new build system with better configurability - scalability improvements for large number of chains - Support for multiple new matches, targets and revisions (supports all features availa...
2017 Sep 30
0
[Bug 1186] New: ip6tables-restore not passing useful error messages from ip6tables
...th an option not supported by IPv6 ip6tables-restore gives this error: (line 76 is the last line in the file with the COMMIT statement): ip6tables-restore: line 76 failed After debugging the rules manually I found the issue: ip6tables -A DROP_BROADCAST_AND_MCAST --match state --state NEW --match addrtype --dst-type BROADCAST --jump DROP ip6tables: Invalid argument. Run `dmesg' for more information. Running dmesg gives me: [636716.526815] xt_addrtype: ipv6 does not support BROADCAST matching If ip6tables-restore could pass the error from ip6tables that would be useful. I have not tested if...
2018 Apr 09
1
[Bug 1242] New: noflush actually flushes in case of custom chain
...les with docker chains using: iptables-restore -n -c MYFILE The file might look like *nat :DOCKER COMMIT where the DOCKER chain already has rules in it, when restored - will be flushed. while in case of builtin chains - will not flush and duplicate the entry. For instance: *nat -I PREROUTING -m addrtype --dst-type LOCAL -j DOCKER COMMIT I believe the bug is in iptables-restore.c line 369 if (noflush && ops->is_chain(chain, handle)) { DEBUGP("Flushing existing user defined chain '%s'\n", chain); if (!ops->flus...
2007 Jul 29
12
Shorewall 4.0.0 + Kernel 2.6.21.5-grsec
...65535 --sport 137 -j reject -A Reject -p 6 -m multiport --dports 135,139,445 -j reject -A Reject -p 17 --dport 1900 -j DROP -A Reject -p 6 -j dropNotSyn -A Reject -p 17 --sport 53 -j DROP -A all2all -m state --state ESTABLISHED,RELATED -j ACCEPT -A all2all -j Drop -A all2all -j DROP -A dropBcast -m addrtype --dst-type BROADCAST -j DROP -A dropBcast -d 224.0.0.0/4 -j DROP -A dropInvalid -m state --state INVALID -j DROP -A dropNotSyn -p tcp ! --syn -j DROP -A eth0_fwd -m state --state NEW,INVALID -j dynamic -A eth0_fwd -m state --state NEW,INVALID -j blacklst -A eth0_fwd -p tcp -j tcpflags -A eth0_in -...
2000 Jul 07
1
Can't see my server
...t;>> NBT UDP PACKET(137): QUERY; POSITIVE; RESPONSE; UNICAST TrnID=0x30 OpCode=0 NmFlags=0x58 Rcode=0 QueryCount=0 AnswerCount=1 AuthorityCount=0 AddressRecCount=0 ResourceRecords: Name=ASTERIX NameType=0x20 (Server) ResType=0x20 ResClass=0x1 TTL=259200 ResourceLength=6 ResourceData= AddrType=0x0 Address=192.168.0.1 02:02:28.314400 arp who-has asterix.armorica tell obelix.armorica 02:02:28.314480 arp reply asterix.armorica (0:c0:df:f0:4:78) is-at 0:c0:df:f0:4:78 (0:20:af:f8:18:60) 02:02:28.314828 obelix.armorica.iad3 > asterix.armorica.netbios-ssn: S 2203519:2203519(0) win 8192 &...
2004 Jul 02
0
Can't configure Samba with Kerberos support
..._con_setuseruserkey... no checking for krb5_locate_kdc... no checking for krb5_get_permitted_enctypes... no checking for krb5_get_default_in_tkt_etypes... no checking for krb5_free_ktypes... no checking for krb5_free_data_contents... no checking for krb5_principal_get_comp_string... no checking for addrtype in krb5_address... no checking for addr_type in krb5_address... yes checking for enc_part2 in krb5_ticket... no checking for keyvalue in krb5_keyblock... yes checking for ENCTYPE_ARCFOUR_HMAC_MD5... yes checking for KEYTYPE_ARCFOUR_56... no checking for AP_OPTS_USE_SUBKEY... yes checking for the kr...