Displaying 20 results from an estimated 73 matches for "nwl".
Did you mean:
nil
2017 Apr 02
6
[Bug 1142] New: invalid binop operation 6nft
https://bugzilla.netfilter.org/show_bug.cgi?id=1142
Bug ID: 1142
Summary: invalid binop operation 6nft
Product: nftables
Version: unspecified
Hardware: x86_64
OS: other
Status: NEW
Severity: major
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
Reporter:
2020 Nov 05
3
[Bug 1479] New: seqnum_to_json() is slow
https://bugzilla.netfilter.org/show_bug.cgi?id=1479
Bug ID: 1479
Summary: seqnum_to_json() is slow
Product: nftables
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
Reporter:
2024 Jan 29
2
[Bug 1734] New: nft set with auto-merge json import/export
https://bugzilla.netfilter.org/show_bug.cgi?id=1734
Bug ID: 1734
Summary: nft set with auto-merge json import/export
Product: nftables
Version: 1.0.x
Hardware: All
OS: All
Status: NEW
Severity: minor
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
2003 Jun 03
4
Do i (this time) need hosts?
Two legged 1.4.2 firewall
zone nwl is eth0 (192.168.221.0/24 ($FW on .205))
zone jvc is eth1 (10.200.47.0/24 ($FW on .253))
Lets suppose i need to allow traffic from nwl to "jvn" which is 10.200.0.0/16
(yes, i do realize that they overlap) and route that traffic to 10.200.47.254?
The router upstream from this one routes...
2023 Jun 09
7
[Bug 1689] New: Resetting the timeout counter for a named set element
https://bugzilla.netfilter.org/show_bug.cgi?id=1689
Bug ID: 1689
Summary: Resetting the timeout counter for a named set element
Product: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
Assignee: pablo at
2023 Dec 18
4
[Bug 1728] New: Regression: iptables lock is now waited for without --wait
https://bugzilla.netfilter.org/show_bug.cgi?id=1728
Bug ID: 1728
Summary: Regression: iptables lock is now waited for without
--wait
Product: iptables
Version: 1.8.x
Hardware: x86_64
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: unknown
2023 May 31
11
[Bug 1685] New: Calling the nftnl_set_free function may trigger the "double free" problem.
https://bugzilla.netfilter.org/show_bug.cgi?id=1685
Bug ID: 1685
Summary: Calling the nftnl_set_free function may trigger the
"double free" problem.
Product: libnftnl
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: critical
Priority: P5
2016 Nov 22
1
[Bug 1099] New: Minor typo in wiki.nftables.org
...wiki.nftables.org
Product: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: trivial
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
Reporter: phil at nwl.cc
There is a typo in the 'Sets' article[1], inside copied code from Why You Will
Love Nftables article[2]. It is suggested to translate this:
| ip6tables -A INPUT -p tcp -m multiport --dports 22,80,443 -j ACCEPT
into that:
| nft add rule ip6 filter input tcp dport {telnet, http, https}...
2020 Jan 06
9
[Bug 1395] New: Add element fails with Error: Could not process rule: Invalid argument
https://bugzilla.netfilter.org/show_bug.cgi?id=1395
Bug ID: 1395
Summary: Add element fails with Error: Could not process rule:
Invalid argument
Product: nftables
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: critical
Priority: P5
Component: nft
2016 Mar 21
3
[Bug 1059] New: Using wildcard interface names in an anonymous set fails on big endian
https://bugzilla.netfilter.org/show_bug.cgi?id=1059
Bug ID: 1059
Summary: Using wildcard interface names in an anonymous set
fails on big endian
Product: nftables
Version: unspecified
Hardware: ppc
OS: other
Status: NEW
Severity: major
Priority: P5
Component: nft
2014 Apr 13
4
[Bug 914] New: nft configure does not use --prefix as include/lib search path
https://bugzilla.netfilter.org/show_bug.cgi?id=914
Summary: nft configure does not use --prefix as include/lib
search path
Product: nftables
Version: unspecified
Platform: x86_64
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
AssignedTo: pablo at
2014 Feb 05
3
[Bug 895] New: Add a 'ipv6_address' set into a ipv4 table and vice versa
https://bugzilla.netfilter.org/show_bug.cgi?id=895
Summary: Add a 'ipv6_address' set into a ipv4 table and vice
versa
Product: nftables
Version: unspecified
Platform: x86_64
OS/Version: Debian GNU/Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
2003 Jan 03
19
VPN hardware?
I have a NetGear FV318 living in my DMZ, with one of its LAN-ports
living in my LOC zone. What rules are needed in shorewall to allow a
certain subnet to make connections to this device from the net zone?
Do I define it as a tunnel in shorewall/tunnels, or do I just allow some
selected traffic to the DMZ IP? I am not sure which of the docs are
right for me in this case?
2020 Nov 13
5
[Bug 1481] New: [ebtables-nft] ebtables -E gives error
https://bugzilla.netfilter.org/show_bug.cgi?id=1481
Bug ID: 1481
Summary: [ebtables-nft] ebtables -E gives error
Product: iptables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
Component: iptables
Assignee:
2023 Jun 02
0
[Bug 1435] segfault when using iptables-nft and iptables-legacy inside a container
https://bugzilla.netfilter.org/show_bug.cgi?id=1435
Phil Sutter <phil at nwl.cc> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|RESOLVED |CLOSED
CC| |phil at nwl.cc
Resolution|REMIND...
2024 Jul 13
1
[Bug 1759] New: flush and delete nft commands need an option to ignore non-existant objects
https://bugzilla.netfilter.org/show_bug.cgi?id=1759
Bug ID: 1759
Summary: flush and delete nft commands need an option to ignore
non-existant objects
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Ubuntu
Status: NEW
Severity: enhancement
Priority: P5
2024 Sep 03
1
[Bug 1772] New: Double free corruption in libnftables
https://bugzilla.netfilter.org/show_bug.cgi?id=1772
Bug ID: 1772
Summary: Double free corruption in libnftables
Product: nftables
Version: 1.0.x
Hardware: x86_64
OS: Ubuntu
Status: NEW
Severity: normal
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
2024 Sep 26
1
[Bug 1775] New: RAW PAYLOAD EXPRESSION offset is limited to 2048
https://bugzilla.netfilter.org/show_bug.cgi?id=1775
Bug ID: 1775
Summary: RAW PAYLOAD EXPRESSION offset is limited to 2048
Product: nftables
Version: 1.0.x
Hardware: All
OS: All
Status: NEW
Severity: critical
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
2024 Dec 19
1
[Bug 1782] New: Wrong error printed when trying to add base chain named same as existing regular chain
https://bugzilla.netfilter.org/show_bug.cgi?id=1782
Bug ID: 1782
Summary: Wrong error printed when trying to add base chain
named same as existing regular chain
Product: nftables
Version: 1.0.x
Hardware: All
OS: All
Status: NEW
Severity: minor
Priority: P5
Component:
2017 Feb 10
0
[Bug 998] firewallrule on mld-listener-query not honored
https://bugzilla.netfilter.org/show_bug.cgi?id=998
Phil Sutter <phil at nwl.cc> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |phil at nwl.cc
Status|NEW |RESOLVED
Resolution|---...