Displaying 5 results from an estimated 5 matches for "ip_ct_dir_reply".
2006 Oct 23
1
[Bug 512] poptop (pptpd) will not work if ip_nat_pptp loaded
...Yi Oct 22, 2006 */
if( inet_addr_type(iph->daddr) == RTN_LOCAL )
{
DEBUGP("DO NOT CHANGE PPTP CALL ID FOR LOCAL
SERVICE!\n");
new_callid = ct_pptp_info->pns_call_id;
} else {
/* NATed src port is the dst port of the reply
*/
new_callid = ct->tuplehash
[IP_CT_DIR_REPLY].tuple.dst.u.tcp.port;
}
/* save new call ID in ct info */
ct_pptp_info->pns_call_id = ntohs(new_callid);
break;
......
It says, if the connection's destination is the local service, then do not
mangle the peer's call-ID.
--
Configure bugmail: htt...
2002 Jan 20
0
[ANNOUNCE] Bug in kernel == 2.4.10 causing netfilter problem
...TE(&ip_conntrack_hash
> [hash_conntrack(&ct->tuplehash[IP_CT_DIR_ORIGINAL].tu=
ple)],
> &ct->tuplehash[IP_CT_DIR_ORIGINAL]);
> LIST_DELETE(&ip_conntrack_hash
> [hash_conntrack(&ct->tuplehash[IP_CT_DIR_REPLY].tuple=
)],
> &ct->tuplehash[IP_CT_DIR_REPLY]);
LIST_DELETE is a macro expanding to list_del from linux/list.h
SOLUTION TO THE PROBLEM
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D...
2003 Aug 02
0
[SECURITY] Netfilter Security Advisory: Conntrack list_del() DoS
...ehash[IP_CT_DIR_ORIGINAL].tuple,
proto);
- if (!(conntrack->status & IPS_SEEN_REPLY))
+ if (!(test_bit(IPS_SEEN_REPLY_BIT, &conntrack->status)))
len +=3D sprintf(buffer + len, "[UNREPLIED] ");
len +=3D print_tuple(buffer + len,
&conntrack->tuplehash[IP_CT_DIR_REPLY].tuple,
proto);
- if (conntrack->status & IPS_ASSURED)
+ if (test_bit(IPS_ASSURED_BIT, &conntrack->status))
len +=3D sprintf(buffer + len, "[ASSURED] ");
len +=3D sprintf(buffer + len, "use=3D%u ",
atomic_read(&conntrack->ct_general.use...
2016 Oct 04
13
[Bug 1087] New: Window Tracking not disabled
https://bugzilla.netfilter.org/show_bug.cgi?id=1087
Bug ID: 1087
Summary: Window Tracking not disabled
Product: conntrack-tools
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: conntrack-daemon
Assignee: netfilter-buglog
2011 Apr 07
8
[Bug 714] New: Kernel panics in same_src()
http://bugzilla.netfilter.org/show_bug.cgi?id=714
Summary: Kernel panics in same_src()
Product: netfilter/iptables
Version: linux-2.6.x
Platform: x86_64
OS/Version: All
Status: NEW
Severity: normal
Priority: P5
Component: NAT
AssignedTo: netfilter-buglog at lists.netfilter.org
ReportedBy: