Displaying 20 results from an estimated 32 matches for "hashlimit".
2024 Mar 24
3
[Bug 1740] New: hashlimit limit: reduction to lowest terms in the output is confusing
https://bugzilla.netfilter.org/show_bug.cgi?id=1740
Bug ID: 1740
Summary: hashlimit limit: reduction to lowest terms in the
output is confusing
Product: iptables
Version: 1.8.x
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: minor
Priority: P5
Component: iptable...
2018 Jul 26
1
[Bug 1273] New: hashlimit never appears to fail to match under 4.9.x
https://bugzilla.netfilter.org/show_bug.cgi?id=1273
Bug ID: 1273
Summary: hashlimit never appears to fail to match under 4.9.x
Product: netfilter/iptables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: major
Priority: P5
Component: ip_tables (kernel)
Assignee: ne...
2019 Feb 05
3
[Bug 1320] New: iptables hashlimit - problem with traffic limitation
https://bugzilla.netfilter.org/show_bug.cgi?id=1320
Bug ID: 1320
Summary: iptables hashlimit - problem with traffic limitation
Product: iptables
Version: 1.6.x
Hardware: All
OS: Debian GNU/Linux
Status: NEW
Severity: major
Priority: P5
Component: iptables
Assignee: netfilter-buglog at lists.n...
2013 May 31
0
[Bug 650] --hashlimit-burst does not update when using --hashlimit-name for a second time
...|RESOLVED
CC| |netfilter at linuxace.com
Resolution| |INVALID
--- Comment #7 from Phil Oester <netfilter at linuxace.com> 2013-05-31 18:25:34 CEST ---
Andre: you claim to be "editing" the hashlimit rule, but your images clearly
show you are using iptables -A, not -R. So you are simply adding to the end of
the chain, not editing the existing rule at all. As such, you should not
expect different behaviour given the first rule you added will continue to
match.
Jan: this is simply how hashlimi...
2013 May 31
0
[Bug 650] --hashlimit-burst does not update when using --hashlimit-name for a second time
https://bugzilla.netfilter.org/show_bug.cgi?id=650
--- Comment #8 from Andre Druhmann <andre at druhmann.de> 2013-05-31 19:01:55 CEST ---
Hello,
thank you for your reply.I deleted the rules in between the stepps, sorry i
didnt captured that on the screenshots.
Your explantation to Jan makes it clear for me thanks.
--
Configure bugmail:
2009 Jan 10
2
[Bug 568] New: iptables-save saves option hashlimit-htable-gcinterval with error
http://bugzilla.netfilter.org/show_bug.cgi?id=568
Summary: iptables-save saves option hashlimit-htable-gcinterval
with error
Product: iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: iptables-save
AssignedTo: laforge at ne...
2018 Mar 16
0
[Bug 1235] New: Error Message "Memory allocation problem" using hashlimit match
https://bugzilla.netfilter.org/show_bug.cgi?id=1235
Bug ID: 1235
Summary: Error Message "Memory allocation problem" using
hashlimit match
Product: iptables
Version: 1.6.x
Hardware: x86_64
OS: Gentoo
Status: NEW
Severity: normal
Priority: P5
Component: iptables
Assignee: netfilter-buglog at lists.netfilter.org
Reporter: n...
2007 Oct 05
6
shaping by packet count rather than bytes ?
In wireless networks it can be handy to shape by packet rate
rather than bytes/s (because capacity is packet-rate-limited).
Has anyone done any work on packet-rate shaping ?
Thanks.
2012 Apr 21
7
[Bug 782] New: -j LOG --log-prefix handling broken
...rs: 0.0
instead of the parameter I give to the LOG module, "NETFILTER drop ", it ends
up getting mangled to "--log-prefix".
excerpt from a file I feed to iptables-restore:
-A LDROP -d 255.255.255.255/32 -p udp -j DROP
-A LDROP -d 77.223.39.255/32 -p udp -j DROP
-A LDROP -m hashlimit --hashlimit-above 1/min --hashlimit-mode srcip,dstip
--hashlimit-burst 1 --hashlimit-name logldrop --hashlimit-htable-expire 60000
-j DROP
-A LDROP -m limit --limit 5/s -j LOG --log-prefix "NETFILTER drop "
--log-tcp-options --log-ip-options --log-uid --log-macdecode
-A LDROP -j DROP
ipt...
2009 Jun 04
3
Dovecot under brute force attack - nice attacker
...ser/password combination the logs showed
many lines like this:
dovecot: pop3-login: Aborted login: user=<test>,......
The problem:
If the attacker wouldn't have closed and reopened the connection
no log would have been generated and he/she would have endless
tries. Not even an iptables/hashlimit or fail2ban would have kicked in.
How to reproduce:
telnet dovecot-server pop3
user test
pass test1
user test
pass test2
...
QUIT
->Only the last try gets logged.
If I enable auth_verbose every attempt gets logged, but if I read the
docs correctly this option should only be used for figuring o...
2017 Jan 12
0
[Bug 1111] New: extensions: libxt_hashlimit: fix print_rate.
https://bugzilla.netfilter.org/show_bug.cgi?id=1111
Bug ID: 1111
Summary: extensions: libxt_hashlimit: fix print_rate.
Product: netfilter/iptables
Version: unspecified
Hardware: i386
OS: All
Status: NEW
Severity: major
Priority: P5
Component: unknown
Assignee: netfilter-buglog at lists.netfilter.org...
2007 Jun 20
2
iptables question
Hi all
Can iptables have log and deny rule together?
if no. how can I make a deny rule and log rule
and the log rule can limit the log entry eg: 200
if yes, how can I make it
I am using freebsd ipfw.
eg: ipfw add 22 deny log all from any to x.x.x.x
thank you
____________________________________________________________________________________
Take the Internet to Go: Yahoo!Go puts the
2006 Aug 30
4
pps limit ?
Hello, list members,
can i limit pps rate with linux? How?
-m limit does not fit, as i understood: it can help with low rates only
(is that true? any suggestions?)
Thank you,
--
_,-=._ /|_/|
`-.} `=._,.-=-._., @ @._,
`._ _,-. ) _,.-''
` G.m-"^m`m'' Dmytro O. Redchuk
2009 Jun 02
3
Dovecot under brute force attack - nice attacker
...ser/password combination the logs showed
many lines like this:
dovecot: pop3-login: Aborted login: user=<test>,......
The problem:
If the attacker wouldn't have closed and reopened the connection
no log would have been generated and he/she would have endless
tries. Not even an iptables/hashlimit or fail2ban would have kicked in.
How to reproduce:
telnet dovecot-server pop3
user test
pass test1
user test
pass test2
...
QUIT
->Only the last try gets logged.
Question:
Is there any way to close the connection after the
first wrong user/pass combination. So an attacker would be forced
t...
2018 Feb 02
0
[ANNOUNCE] iptables 1.6.2 release
...tils: nfsynproxy: fix build with musl libc
Dan Williams (3):
libiptc: don't set_changed() when checking rules with module jumps
iptables-restore/ip6tables-restore: add --version/-V argument
iptables-restore.8: document -w/-W options
Elise Lennion (1):
extensions: libxt_hashlimit: Add translation to nft
Florian Westphal (2):
tests: xlate-test: no need to require superuser privileges
policy: add nft translation for simple policy none/strict use case
Gargi Sharma (2):
iptables: Constify option struct
extensions: libxt_TOS: Add translation to nft
Har...
2006 Dec 07
2
iptables -m dstlimit
Which kernel supports the iptables'' -m dstlimit?
Do I need a patch or something else to get it to work?
Is it too experimental?
--
Покотиленко Костик <casper@meteor.dp.ua>
2010 Feb 12
5
rate limiting
Hi,
i am using squid as a transparent proxy. i have added this 3 lines to my rules file
ACCEPT $FW net tcp www
ACCEPT loc $FW tcp 8080
REDIRECT loc 8080 tcp www - !192.168.100.2
i want to limit the number of connection that are made from every pc on the network to the proxy server. if i change the 2nd rule to
ACCEPT loc $FW tcp 8080
2006 Dec 06
1
[ANNOUNCE] Release of iptables-1.3.7
Hi!
The netfilter coreteam proudly presents:
iptables version 1.3.7
The 1.3.7 version contains accumulated bugfixes to the last 1.3.6
version. This comes a bit earlier after the last release than
usual because the endian annotations in 2.6.19 broke iptables
compilation, which is fixed with this version.
The ChangeLog is attached to this mail.
Version 1.3.7 can be obtained from:
2009 Jun 07
2
[Bug 597] New: ip6tables connlimit - cannot set CIDR greater than 32 (includes fix)
..."diff"):
- info->v4_mask = 0xFFFFFFFFUL;
+ info->v6_mask[0] = 0xFFFFFFFFUL;
+ info->v6_mask[1] = 0xFFFFFFFFUL;
+ info->v6_mask[2] = 0xFFFFFFFFUL;
+ info->v6_mask[3] = 0xFFFFFFFFUL;
I have tested this fix on my system. It seems to work. Hashlimit implements
the CIDR mask differently and does not suffer from this problem.
--
Configure bugmail: http://bugzilla.netfilter.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2012 Nov 21
1
Conntrackd - fail at startup.
....168.100.11
IPv4_Destination_Address 192.168.100.12
Port 3780
SndSocketBuffer 1249280
RcvSocketBuffer 1249280
Checksum on
}
Options {
}
}
General {
Nice -20
HashSize 32768
HashLimit 131072
LogFile on
LockFile /var/lock/conntrack.lock
UNIX {
Path /var/run/conntrackd.ctl
Backlog 20
}
NetlinkBufferSize 2097152
NetlinkBufferSizeMaxGrowth 8388608
Filter From Kernelspace {
Protoco...