search for: ip_conntrack_tuple

Displaying 7 results from an estimated 7 matches for "ip_conntrack_tuple".

2005 Oct 14
5
[PATCH] Fix NAT for domU checksum offload
...lt;linux/tcp.h> +#include <linux/if.h> +#include <linux/netfilter_ipv4/ip_nat.h> +#include <linux/netfilter_ipv4/ip_nat_rule.h> +#include <linux/netfilter_ipv4/ip_nat_protocol.h> +#include <linux/netfilter_ipv4/ip_nat_core.h> + +static int +tcp_in_range(const struct ip_conntrack_tuple *tuple, + enum ip_nat_manip_type maniptype, + const union ip_conntrack_manip_proto *min, + const union ip_conntrack_manip_proto *max) +{ + u_int16_t port; + + if (maniptype == IP_NAT_MANIP_SRC) + port = tuple->src.u.tcp.port; + else + port = tuple->dst.u.tcp.port; + + return...
2003 Feb 08
0
[Bug 46] ..patch-o-matic: nfnetlink_conntrack.c or -.h ... compile failure:
...inux/nfnetlink_conntrack.h \ | tail-n 15 }; #endif /* CONFIG_IP_NF_NAT_NEEDED */ struct cta_proto { unsigned char num_proto; /* Protocol number IPPROTO_X */ union ip_conntrack_proto proto; }; struct cta_help { struct ip_conntrack_tuple tuple; struct ip_conntrack_tuple mask; char name[31]; /* name of conntrack helper */ union ip_conntrack_help help; }; ..I'm a C newbie: "proto" and "help": How _should_ these look??? -------...
2003 Mar 06
3
[Bug 59] sparc64 conntrack issue with expecting related connections, FTP
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=59 laforge@netfilter.org changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |ASSIGNED ------- You are receiving this mail because: ------- You are on the CC list for the bug, or are watching
2002 Feb 27
0
[ANNOUNCE] Security Advisory about IRC DCC connection tracking
...02/02/05 14:49:26 laforge Exp * * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public License @@ -112,9 +112,9 @@ =20 struct ip_ct_irc *info =3D &ct->help.ct_irc_info; =20 - - memset(&mask, 0, sizeof(struct ip_conntrack_tuple)); - - mask.dst.u.tcp.port =3D 0xFFFF; - - mask.dst.protonum =3D 0xFFFF; + mask =3D ((struct ip_conntrack_tuple) + { { 0, { 0 } }, + { 0xFFFFFFFF, { 0xFFFF }, 0xFFFF }}); =20 DEBUGP("entered\n"); /* Can't track connections formed before we registered */ CREDITS =3D=3D=3D=3D=3...
2003 Feb 08
0
[Bug 46] New: ..patch-o-matic: nfnetlink_conntrack.c or -.h ... compile failure:
...sr/src/linux-2.4.18-24.8.0/include/linux/nfnetlink_conntrack.h \ | tail-n 15 }; #endif /* CONFIG_IP_NF_NAT_NEEDED */ struct cta_proto { unsigned char num_proto; /* Protocol number IPPROTO_X */ union ip_conntrack_proto proto; }; struct cta_help { struct ip_conntrack_tuple tuple; struct ip_conntrack_tuple mask; char name[31]; /* name of conntrack helper */ union ip_conntrack_help help; }; ..I'm a C newbie: "proto" and "help": How _should_ these look??? ..failing my diagnosis above, I adde...
2003 Feb 03
0
[Bug 41] New: pptp-conntrack-nat and sparc64 structures/padding/maskcomp bug
...ter-devel/> After some further digging and debug output in the expect_cmp, I have found that the pptp_nat patch will break in a 64 bit big-endian platform. Basically, the whole masked comparison will be wrong since this patch changed a whole bunch of fields in various structures in ip_conntrack_tuple.h from 16 bits to either 32 bits or 64 bits. Passive FTP section: Jan 31 09:37:53 sparky kernel: ip_conntrack_expect_related fffff80016c909e0 Jan 31 09:37:53 sparky kernel: tuple: tuple 0000000000417690: 6 client:0x...
2003 Aug 02
0
[SECURITY] Netfilter Security Advisory: Conntrack list_del() DoS
...lter_ipv4/ip= _conntrack.h --- linux-2.4.20-base/include/linux/netfilter_ipv4/ip_conntrack.h Fri Nov 2= 9 00:53:15 2002 +++ linux-2.4.20-del/include/linux/netfilter_ipv4/ip_conntrack.h Fri Feb 21= 17:01:38 2003 @@ -6,6 +6,7 @@ =20 #include <linux/config.h> #include <linux/netfilter_ipv4/ip_conntrack_tuple.h> +#include <linux/bitops.h> #include <asm/atomic.h> =20 enum ip_conntrack_info @@ -41,6 +42,10 @@ /* Conntrack should never be early-expired. */ IPS_ASSURED_BIT =3D 2, IPS_ASSURED =3D (1 << IPS_ASSURED_BIT), + + /* Connection is confirmed: originating packet has left...