search for: psh

Displaying 20 results from an estimated 104 matches for "psh".

Did you mean: push
2009 Aug 09
2
[Bug 601] New: log messages with flags "ACK PSH FIN"
http://bugzilla.netfilter.org/show_bug.cgi?id=601 Summary: log messages with flags "ACK PSH FIN" Product: netfilter/iptables Version: unspecified Platform: All OS/Version: Debian GNU/Linux Status: NEW Severity: minor Priority: P3 Component: ip_conntrack AssignedTo: laforge at netfilter.org...
2019 Dec 06
0
tinc-pre* between gentoo and raspbian
...1 → 10.0.0.2 TCP 52 80 → 46736 [ACK] Seq=1 Ack=73 Win=28992 Len=0 TSval=3219761814 TSecr=3299780679 > 6 0.040449102 10.0.0.1 → 10.0.0.2 HTTP 573 HTTP/1.1 301 Moved Permanently (text/html) > 7 0.313040054 10.0.0.1 → 10.0.0.2 TCP 573 [TCP Retransmission] 80 → 46736 [PSH, ACK] Seq=1 Ack=73 Win=28992 Len=521 TSval=3219762092 TSecr=3299780679 > 8 5.048481980 10.0.0.1 → 10.0.0.2 TCP 52 80 → 46736 [FIN, ACK] Seq=522 Ack=73 Win=28992 Len=0 TSval=3219766827 TSecr=3299780679 > 9 5.083993192 10.0.0.2 → 10.0.0.1 TCP 64 [TCP Dup ACK 3#1] 46736 →...
2020 Aug 19
2
[Bug 1450] New: Using certain simple set combinations with TCP flags causes error in mergesort.c from nft list ruleset
...Assignee: pablo at netfilter.org Reporter: phillc at gmail.com When setting up some TCP flag rules I attempted to combine multiple flag combinations into one rule with a simple set. The following works perfectly tcp flags == {syn, syn|ack} accept tcp flags & (fin|syn|rst|psh|ack|urg) == {ack, psh|ack, fin} accept tcp flags & (fin|syn|rst|psh|ack|urg) == psh|ack|fin accept It can be applied with nft -f and displays with "nft list ruleset" However, when trying to do this: tcp flags == {syn, syn|ack} accept tcp flags & (fin|syn|rst|psh|ack|urg) ==...
2010 Jun 09
1
minor tick marks
...I would appreciate having also minor tick marks in-between the 3 major ticks obtained with the above command. The "minor.tick" function in library Hmisc gives an error when applied to log axes. Any solution ? Stéphane _________________________________ Stéphane Adamowicz INRA, unité PSH domaine St Paul, site agroparc 84914 Avignon, cedex 9 France stephane.adamowicz@avignon.inra.fr tel. +33 (0)4 32 72 24 35 fax. +33 (0)4 32 72 24 32 do not dial 0 when out of France web PSH : http://www.avignon.inra.fr/psh web INRA : http://www.inra.fr/ _________________________________ [[alte...
2016 Jun 30
3
[CENTOS ]IPTABLES - How Secure & Best Practice
...ng rules. My brief example - Premise: I want to limit outsiders from interfering with LAN client machines. So, I have the following rules regarding forwarding traffic: -A FORWARD -m state --state INVALID -j DROP -A FORWARD -p tcp --tcp-flags ACK,FIN FIN -j DROP -A FORWARD -p tcp --tcp-flags ACK,PSH PSH -j DROP -A FORWARD -p tcp --tcp-flags ACK,URG URG -j DROP -A FORWARD -p tcp --tcp-flags FIN,RST FIN,RST -j DROP -A FORWARD -p tcp --tcp-flags SYN,FIN SYN,FIN -j DROP -A FORWARD -p tcp --tcp-flags SYN,RST SYN,RST -j DROP -A FORWARD -p tcp --tcp-flags ALL ALL -j DROP -A FORWARD -p tcp --tcp-flags...
2013 Jun 10
0
[Bug 601] log messages with flags "ACK PSH FIN"
https://bugzilla.netfilter.org/show_bug.cgi?id=601 Phil Oester <netfilter at linuxace.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |netfilter at linuxace.com --- Comment #3 from Phil Oester <netfilter at linuxace.com> 2013-06-10
2013 Jun 11
0
[Bug 601] log messages with flags "ACK PSH FIN"
https://bugzilla.netfilter.org/show_bug.cgi?id=601 Pieter Smit <netfilter at vigor.co.za> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution| |INVALID --- Comment #4 from Pieter Smit <netfilter
2004 Apr 08
0
getpeername/server crash problem
...x00 TTL=127 ID=54413 DF PROTO=TCP SPT=3866 DPT=139 WINDOW=65535 RES=0x00 SYN URGP=0 Apr 8 11:19:17 rohan kernel: IN=eth0 OUT= MAC=00:09:6b:f1:49:1e:00:09:97:56:9a:0e:08:00 SRC=x.y.16.19 DST=x.y.15.3 LEN=177 TOS=0x00 PREC=0x00 TTL=127 ID=54414 DF PROTO=TCP SPT=3865 DPT=445 WINDOW=65535 RES=0x00 ACK PSH URGP=0 Apr 8 11:19:17 rohan smbd[5095]: [2004/04/08 11:19:17, 0, pid=5095, effective(0, 0), real(0, 0)] lib/util_sock.c:get_peer_addr(952) Apr 8 11:19:17 rohan smbd[5095]: getpeername failed. Error was Transport endpoint is not connected Apr 8 11:19:17 rohan smbd[5095]: [2004/04/08 11:19:17, 0...
2019 May 03
3
Aw: Re: very high traffic without any load
2007 Jun 08
5
CBQ + Layer7 x Emule
...ORWARD -m mark --mark 2 -j LOG --log-prefix "FORWARD MARK : " The output from log is : Jun 8 14:18:46 fs-linux kernel: FORWARD MARK : IN=eth0 OUT=eth1 SRC= 203.91.83.127 DST=192.168.253.3 LEN=180 TOS=0x00 PREC=0x00 TTL=105 ID=18725 PROTO=TCP SPT=51674 DPT=4662 WINDOW=16944 RES=0x00 ACK PSH URGP=0 Jun 8 14:18:48 fs-linux kernel: PREROUTING MARK : IN=eth0 OUT= MAC=00:06:4f:47:ad:e0:00:0f:3d:cc:29:e0:08:00 SRC=200.209.170.138 DST= 192.168.254.3 LEN=139 TOS=0x00 PREC=0x00 TTL=115 ID=18002 DF PROTO=TCP SPT=1476 DPT=4662 WINDOW=65535 RES=0x00 ACK PSH URGP=0 Jun 8 14:18:48 fs-linux kerne...
2016 Jul 01
0
[CENTOS ]IPTABLES - How Secure & Best Practice
...; > Premise: I want to limit outsiders from interfering with LAN client machines. > So, I have the following rules regarding forwarding traffic: > > -A FORWARD -m state --state INVALID -j DROP > -A FORWARD -p tcp --tcp-flags ACK,FIN FIN -j DROP > -A FORWARD -p tcp --tcp-flags ACK,PSH PSH -j DROP > -A FORWARD -p tcp --tcp-flags ACK,URG URG -j DROP > -A FORWARD -p tcp --tcp-flags FIN,RST FIN,RST -j DROP > -A FORWARD -p tcp --tcp-flags SYN,FIN SYN,FIN -j DROP > -A FORWARD -p tcp --tcp-flags SYN,RST SYN,RST -j DROP > -A FORWARD -p tcp --tcp-flags ALL ALL -j DROP >...
2019 May 02
4
Aw: Re: very high traffic without any load
2007 Sep 29
1
samba with iptables
...T [127173:7033011] :POSTROUTING ACCEPT [31583:2332178] :OUTPUT ACCEPT [32021:2375633] COMMIT *mangle :PREROUTING ACCEPT [444:43563] :INPUT ACCEPT [444:43563] :FORWARD ACCEPT [0:0] :OUTPUT ACCEPT [402:144198] :POSTROUTING ACCEPT [402:144198] -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN,PSH,URG -j DROP -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG NONE -j DROP -A PREROUTING -p tcp -m tcp --tcp-flags SYN,RST SYN,RST -j DROP -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN FIN,SYN -j DROP COMMIT *filter :INPUT DROP [1:242] :FORWARD DROP [0:0] :OUT...
2017 May 25
0
Windows 2012 s4u2self followed by s4u2proxy fails against samba
...t: 50602 Destination Port: 88 [Stream index: 4] [TCP Segment Len: 1361] Sequence number: 1 (relative sequence number) [Next sequence number: 1362 (relative sequence number)] Acknowledgment number: 1 (relative ack number) Header Length: 20 bytes Flags: 0x018 (PSH, ACK) 000. .... .... = Reserved: Not set ...0 .... .... = Nonce: Not set .... 0... .... = Congestion Window Reduced (CWR): Not set .... .0.. .... = ECN-Echo: Not set .... ..0. .... = Urgent: Not set .... ...1 .... = Acknowledgment: Set .... .....
2016 Jun 30
2
[CENTOS ]IPTABLES - How Secure & Best Practice
On Wed, Jun 29, 2016 at 1:49 PM, Gordon Messmer <gordon.messmer at gmail.com> wrote: > > By putting these rules first, before the "ESTABLISHED,RELATED" rule, you're > applying additional processing (CPU time) to the vast majority of your > packets for no reason. The "E,R" rule should be first. It won't match the > invalid packets you're trying
2005 Sep 05
9
Samba Printing Extremely Slow from Windows XP
Hi, I have setup samba server on my linux box (Fedora Core 4 with latest samba, just updated via RHN) and has configured file sharing via samba for this server and connecting to it from my windows xp box. So far, everything works fine and it is very fast. Then, I configured a printer, and shared it via samba. And, I can see+connect to it from Windows XP and can even print. But, everything
2009 Jun 12
1
Error messages? or what
...O=TCP SPT=388 DPT=40486 WINDOW=1448 RES=0x00 ACK URGP=0 1 Time(s): SRC=165.91.140.32 DST=216.104.158.222 LEN=1500 TOS=0x00 PREC=0x00 TTL=49 ID=5844 DF PROTO=TCP SPT=388 DPT=40486 WINDOW=1448 RES=0x00 ACK URGP=0 1 Time(s): TTL=64 ID=18519 DF PROTO=TCP SPT=40486 DPT=388 WINDOW=6506 RES=0x00 ACK PSH URGP=0 1 Time(s): .158.222 LEN=1500 TOS=0x00 PREC=0x00 TTL=49 ID=38592 DF PROTO=TCP SPT=388 DPT=40486 WINDOW=1448 RES=0x00 ACK URGP=0 1 Time(s): 0 ACK URGP=0 1 Time(s): 0 OUT= MAC=00:30:48:2e:69:48:00:01:97:00:20:20:08:00 SRC=165.91.140.32 DST=216.104.158.222 LEN=1500 TOS=0x00 PREC=0x00 TTL=4...
2020 Nov 04
2
parallel PSOCK connection latency is greater on Linux?
I'm not sure the user would know ;). This is very system-specific issue just because the Linux network stack behaves so differently from other OSes (for purely historical reasons). That makes it hard to abstract as a "feature" for the R sockets that are supposed to be platform-independent. At least TCP_NODELAY is actually part of POSIX so it is on better footing, and disabling
2020 Nov 04
0
parallel PSOCK connection latency is greater on Linux?
...rary(tictoc) cl <- makeCluster(1) Sys.sleep(1) for (i in 1:10) { tic() x <- clusterEvalQ(cl, iris) toc() } The initialization phase comprises 7 packets. Then, the 1-second sleep will help you see where the evaluation starts. Each clusterEvalQ generates 6 packets: 1. main -> worker PSH, ACK 1026 bytes 2. worker -> main ACK 66 bytes 3. worker -> main PSH, ACK 3758 bytes 4. main -> worker ACK 66 bytes 5. worker -> main PSH, ACK 2484 bytes 6. main -> worker ACK 66 bytes The first two are the command and its ACK, the following are the data back and their ACKs. In the...
2014 May 05
2
Broken IMAPS Connects Create Lingering imap-login Processes
...fully analyzed yet. Sniffing his IMAPS connects on the server side, I see no (necessarily fragmented) TLSv1 Client Cert + Key Exchange happen; instead, after ~60s, we receive a single packet with "TLSv1 Certificate Verify, Change Cipher Spec, Encrypted Handshake Message" *and* the TCP FIN+PSH+ACK flags set. The problem I'ld like to ask for help with here is that dovecot's imap-login process doesn't terminate when the FIN is received, or when the IMAP protocol's inactivity timeout is reached, it takes *more than two hours* for it to go away. Because of that, this single...