search for: ip_ct_dir_reply

Displaying 5 results from an estimated 5 matches for "ip_ct_dir_reply".

2006 Oct 23
1
[Bug 512] poptop (pptpd) will not work if ip_nat_pptp loaded
...Yi Oct 22, 2006 */ if( inet_addr_type(iph->daddr) == RTN_LOCAL ) { DEBUGP("DO NOT CHANGE PPTP CALL ID FOR LOCAL SERVICE!\n"); new_callid = ct_pptp_info->pns_call_id; } else { /* NATed src port is the dst port of the reply */ new_callid = ct->tuplehash [IP_CT_DIR_REPLY].tuple.dst.u.tcp.port; } /* save new call ID in ct info */ ct_pptp_info->pns_call_id = ntohs(new_callid); break; ...... It says, if the connection's destination is the local service, then do not mangle the peer's call-ID. -- Configure bugmail: htt...
2002 Jan 20
0
[ANNOUNCE] Bug in kernel == 2.4.10 causing netfilter problem
...TE(&ip_conntrack_hash > [hash_conntrack(&ct->tuplehash[IP_CT_DIR_ORIGINAL].tu= ple)], > &ct->tuplehash[IP_CT_DIR_ORIGINAL]); > LIST_DELETE(&ip_conntrack_hash > [hash_conntrack(&ct->tuplehash[IP_CT_DIR_REPLY].tuple= )], > &ct->tuplehash[IP_CT_DIR_REPLY]); LIST_DELETE is a macro expanding to list_del from linux/list.h SOLUTION TO THE PROBLEM =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D...
2003 Aug 02
0
[SECURITY] Netfilter Security Advisory: Conntrack list_del() DoS
...ehash[IP_CT_DIR_ORIGINAL].tuple, proto); - if (!(conntrack->status & IPS_SEEN_REPLY)) + if (!(test_bit(IPS_SEEN_REPLY_BIT, &conntrack->status))) len +=3D sprintf(buffer + len, "[UNREPLIED] "); len +=3D print_tuple(buffer + len, &conntrack->tuplehash[IP_CT_DIR_REPLY].tuple, proto); - if (conntrack->status & IPS_ASSURED) + if (test_bit(IPS_ASSURED_BIT, &conntrack->status)) len +=3D sprintf(buffer + len, "[ASSURED] "); len +=3D sprintf(buffer + len, "use=3D%u ", atomic_read(&conntrack->ct_general.use...
2016 Oct 04
13
[Bug 1087] New: Window Tracking not disabled
https://bugzilla.netfilter.org/show_bug.cgi?id=1087 Bug ID: 1087 Summary: Window Tracking not disabled Product: conntrack-tools Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: enhancement Priority: P5 Component: conntrack-daemon Assignee: netfilter-buglog
2011 Apr 07
8
[Bug 714] New: Kernel panics in same_src()
http://bugzilla.netfilter.org/show_bug.cgi?id=714 Summary: Kernel panics in same_src() Product: netfilter/iptables Version: linux-2.6.x Platform: x86_64 OS/Version: All Status: NEW Severity: normal Priority: P5 Component: NAT AssignedTo: netfilter-buglog at lists.netfilter.org ReportedBy: