Displaying 20 results from an estimated 104 matches for "psh".
Did you mean:
push
2009 Aug 09
2
[Bug 601] New: log messages with flags "ACK PSH FIN"
http://bugzilla.netfilter.org/show_bug.cgi?id=601
Summary: log messages with flags "ACK PSH FIN"
Product: netfilter/iptables
Version: unspecified
Platform: All
OS/Version: Debian GNU/Linux
Status: NEW
Severity: minor
Priority: P3
Component: ip_conntrack
AssignedTo: laforge at netfilter.org...
2019 Dec 06
0
tinc-pre* between gentoo and raspbian
...1 → 10.0.0.2 TCP 52 80 → 46736 [ACK] Seq=1 Ack=73 Win=28992 Len=0 TSval=3219761814 TSecr=3299780679
> 6 0.040449102 10.0.0.1 → 10.0.0.2 HTTP 573 HTTP/1.1 301 Moved Permanently (text/html)
> 7 0.313040054 10.0.0.1 → 10.0.0.2 TCP 573 [TCP Retransmission] 80 → 46736 [PSH, ACK] Seq=1 Ack=73 Win=28992 Len=521 TSval=3219762092 TSecr=3299780679
> 8 5.048481980 10.0.0.1 → 10.0.0.2 TCP 52 80 → 46736 [FIN, ACK] Seq=522 Ack=73 Win=28992 Len=0 TSval=3219766827 TSecr=3299780679
> 9 5.083993192 10.0.0.2 → 10.0.0.1 TCP 64 [TCP Dup ACK 3#1] 46736 →...
2020 Aug 19
2
[Bug 1450] New: Using certain simple set combinations with TCP flags causes error in mergesort.c from nft list ruleset
...Assignee: pablo at netfilter.org
Reporter: phillc at gmail.com
When setting up some TCP flag rules I attempted to combine multiple flag
combinations into one rule with a simple set.
The following works perfectly
tcp flags == {syn, syn|ack} accept
tcp flags & (fin|syn|rst|psh|ack|urg) == {ack, psh|ack, fin} accept
tcp flags & (fin|syn|rst|psh|ack|urg) == psh|ack|fin accept
It can be applied with nft -f and displays with "nft list ruleset"
However, when trying to do this:
tcp flags == {syn, syn|ack} accept
tcp flags & (fin|syn|rst|psh|ack|urg) ==...
2010 Jun 09
1
minor tick marks
...I would appreciate having also minor tick marks in-between the 3 major ticks obtained with the above command. The "minor.tick" function in library Hmisc gives an error when applied to log axes.
Any solution ?
Stéphane
_________________________________
Stéphane Adamowicz
INRA, unité PSH
domaine St Paul, site agroparc
84914 Avignon, cedex 9
France
stephane.adamowicz@avignon.inra.fr
tel. +33 (0)4 32 72 24 35
fax. +33 (0)4 32 72 24 32
do not dial 0 when out of France
web PSH : http://www.avignon.inra.fr/psh
web INRA : http://www.inra.fr/
_________________________________
[[alte...
2016 Jun 30
3
[CENTOS ]IPTABLES - How Secure & Best Practice
...ng rules.
My brief example -
Premise: I want to limit outsiders from interfering with LAN client machines.
So, I have the following rules regarding forwarding traffic:
-A FORWARD -m state --state INVALID -j DROP
-A FORWARD -p tcp --tcp-flags ACK,FIN FIN -j DROP
-A FORWARD -p tcp --tcp-flags ACK,PSH PSH -j DROP
-A FORWARD -p tcp --tcp-flags ACK,URG URG -j DROP
-A FORWARD -p tcp --tcp-flags FIN,RST FIN,RST -j DROP
-A FORWARD -p tcp --tcp-flags SYN,FIN SYN,FIN -j DROP
-A FORWARD -p tcp --tcp-flags SYN,RST SYN,RST -j DROP
-A FORWARD -p tcp --tcp-flags ALL ALL -j DROP
-A FORWARD -p tcp --tcp-flags...
2013 Jun 10
0
[Bug 601] log messages with flags "ACK PSH FIN"
https://bugzilla.netfilter.org/show_bug.cgi?id=601
Phil Oester <netfilter at linuxace.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |netfilter at linuxace.com
--- Comment #3 from Phil Oester <netfilter at linuxace.com> 2013-06-10
2013 Jun 11
0
[Bug 601] log messages with flags "ACK PSH FIN"
https://bugzilla.netfilter.org/show_bug.cgi?id=601
Pieter Smit <netfilter at vigor.co.za> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |INVALID
--- Comment #4 from Pieter Smit <netfilter
2004 Apr 08
0
getpeername/server crash problem
...x00 TTL=127 ID=54413 DF PROTO=TCP SPT=3866 DPT=139 WINDOW=65535 RES=0x00 SYN URGP=0
Apr 8 11:19:17 rohan kernel: IN=eth0 OUT= MAC=00:09:6b:f1:49:1e:00:09:97:56:9a:0e:08:00 SRC=x.y.16.19 DST=x.y.15.3 LEN=177 TOS=0x00 PREC=0x00 TTL=127 ID=54414 DF PROTO=TCP SPT=3865 DPT=445 WINDOW=65535 RES=0x00 ACK PSH URGP=0
Apr 8 11:19:17 rohan smbd[5095]: [2004/04/08 11:19:17, 0, pid=5095, effective(0, 0), real(0, 0)] lib/util_sock.c:get_peer_addr(952)
Apr 8 11:19:17 rohan smbd[5095]: getpeername failed. Error was Transport endpoint is not connected
Apr 8 11:19:17 rohan smbd[5095]: [2004/04/08 11:19:17, 0...
2019 May 03
3
Aw: Re: very high traffic without any load
2007 Jun 08
5
CBQ + Layer7 x Emule
...ORWARD -m mark --mark 2 -j LOG --log-prefix "FORWARD
MARK : "
The output from log is :
Jun 8 14:18:46 fs-linux kernel: FORWARD MARK : IN=eth0 OUT=eth1 SRC=
203.91.83.127 DST=192.168.253.3 LEN=180 TOS=0x00 PREC=0x00 TTL=105 ID=18725
PROTO=TCP SPT=51674 DPT=4662 WINDOW=16944 RES=0x00 ACK PSH URGP=0
Jun 8 14:18:48 fs-linux kernel: PREROUTING MARK : IN=eth0 OUT=
MAC=00:06:4f:47:ad:e0:00:0f:3d:cc:29:e0:08:00 SRC=200.209.170.138 DST=
192.168.254.3 LEN=139 TOS=0x00 PREC=0x00 TTL=115 ID=18002 DF PROTO=TCP
SPT=1476 DPT=4662 WINDOW=65535 RES=0x00 ACK PSH URGP=0
Jun 8 14:18:48 fs-linux kerne...
2016 Jul 01
0
[CENTOS ]IPTABLES - How Secure & Best Practice
...;
> Premise: I want to limit outsiders from interfering with LAN client machines.
> So, I have the following rules regarding forwarding traffic:
>
> -A FORWARD -m state --state INVALID -j DROP
> -A FORWARD -p tcp --tcp-flags ACK,FIN FIN -j DROP
> -A FORWARD -p tcp --tcp-flags ACK,PSH PSH -j DROP
> -A FORWARD -p tcp --tcp-flags ACK,URG URG -j DROP
> -A FORWARD -p tcp --tcp-flags FIN,RST FIN,RST -j DROP
> -A FORWARD -p tcp --tcp-flags SYN,FIN SYN,FIN -j DROP
> -A FORWARD -p tcp --tcp-flags SYN,RST SYN,RST -j DROP
> -A FORWARD -p tcp --tcp-flags ALL ALL -j DROP
>...
2019 May 02
4
Aw: Re: very high traffic without any load
2007 Sep 29
1
samba with iptables
...T [127173:7033011]
:POSTROUTING ACCEPT [31583:2332178]
:OUTPUT ACCEPT [32021:2375633]
COMMIT
*mangle
:PREROUTING ACCEPT [444:43563]
:INPUT ACCEPT [444:43563] :FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [402:144198]
:POSTROUTING ACCEPT [402:144198]
-A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG
FIN,PSH,URG -j DROP
-A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG NONE -j
DROP
-A PREROUTING -p tcp -m tcp --tcp-flags SYN,RST SYN,RST -j DROP
-A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN FIN,SYN -j DROP
COMMIT
*filter
:INPUT DROP [1:242]
:FORWARD DROP [0:0]
:OUT...
2017 May 25
0
Windows 2012 s4u2self followed by s4u2proxy fails against samba
...t: 50602
Destination Port: 88
[Stream index: 4]
[TCP Segment Len: 1361]
Sequence number: 1 (relative sequence number)
[Next sequence number: 1362 (relative sequence number)]
Acknowledgment number: 1 (relative ack number)
Header Length: 20 bytes
Flags: 0x018 (PSH, ACK)
000. .... .... = Reserved: Not set
...0 .... .... = Nonce: Not set
.... 0... .... = Congestion Window Reduced (CWR): Not set
.... .0.. .... = ECN-Echo: Not set
.... ..0. .... = Urgent: Not set
.... ...1 .... = Acknowledgment: Set
.... .....
2016 Jun 30
2
[CENTOS ]IPTABLES - How Secure & Best Practice
On Wed, Jun 29, 2016 at 1:49 PM, Gordon Messmer
<gordon.messmer at gmail.com> wrote:
>
> By putting these rules first, before the "ESTABLISHED,RELATED" rule, you're
> applying additional processing (CPU time) to the vast majority of your
> packets for no reason. The "E,R" rule should be first. It won't match the
> invalid packets you're trying
2005 Sep 05
9
Samba Printing Extremely Slow from Windows XP
Hi,
I have setup samba server on my linux box (Fedora Core 4 with latest
samba, just updated via RHN) and has configured file sharing via samba
for this server and connecting to it from my windows xp box. So far,
everything works fine and it is very fast.
Then, I configured a printer, and shared it via samba. And, I can
see+connect to it from Windows XP and can even print. But, everything
2009 Jun 12
1
Error messages? or what
...O=TCP SPT=388 DPT=40486 WINDOW=1448 RES=0x00 ACK URGP=0
1 Time(s): SRC=165.91.140.32 DST=216.104.158.222 LEN=1500 TOS=0x00 PREC=0x00 TTL=49 ID=5844 DF PROTO=TCP SPT=388 DPT=40486 WINDOW=1448 RES=0x00 ACK URGP=0
1 Time(s): TTL=64 ID=18519 DF PROTO=TCP SPT=40486 DPT=388 WINDOW=6506 RES=0x00 ACK PSH URGP=0
1 Time(s): .158.222 LEN=1500 TOS=0x00 PREC=0x00 TTL=49 ID=38592 DF PROTO=TCP SPT=388 DPT=40486 WINDOW=1448 RES=0x00 ACK URGP=0
1 Time(s): 0 ACK URGP=0
1 Time(s): 0 OUT= MAC=00:30:48:2e:69:48:00:01:97:00:20:20:08:00 SRC=165.91.140.32 DST=216.104.158.222 LEN=1500 TOS=0x00 PREC=0x00 TTL=4...
2020 Nov 04
2
parallel PSOCK connection latency is greater on Linux?
I'm not sure the user would know ;). This is very system-specific issue just because the Linux network stack behaves so differently from other OSes (for purely historical reasons). That makes it hard to abstract as a "feature" for the R sockets that are supposed to be platform-independent. At least TCP_NODELAY is actually part of POSIX so it is on better footing, and disabling
2020 Nov 04
0
parallel PSOCK connection latency is greater on Linux?
...rary(tictoc)
cl <- makeCluster(1)
Sys.sleep(1)
for (i in 1:10) {
tic()
x <- clusterEvalQ(cl, iris)
toc()
}
The initialization phase comprises 7 packets. Then, the 1-second sleep
will help you see where the evaluation starts. Each clusterEvalQ
generates 6 packets:
1. main -> worker PSH, ACK 1026 bytes
2. worker -> main ACK 66 bytes
3. worker -> main PSH, ACK 3758 bytes
4. main -> worker ACK 66 bytes
5. worker -> main PSH, ACK 2484 bytes
6. main -> worker ACK 66 bytes
The first two are the command and its ACK, the following are the data
back and their ACKs. In the...
2014 May 05
2
Broken IMAPS Connects Create Lingering imap-login Processes
...fully analyzed yet. Sniffing his IMAPS connects on the server side, I
see no (necessarily fragmented) TLSv1 Client Cert + Key Exchange happen;
instead, after ~60s, we receive a single packet with "TLSv1 Certificate
Verify, Change Cipher Spec, Encrypted Handshake Message" *and* the TCP
FIN+PSH+ACK flags set.
The problem I'ld like to ask for help with here is that dovecot's
imap-login process doesn't terminate when the FIN is received, or when
the IMAP protocol's inactivity timeout is reached, it takes *more than
two hours* for it to go away. Because of that, this single...