search for: tcp_packet

Displaying 8 results from an estimated 8 matches for "tcp_packet".

Did you mean: tcp_packets
2008 May 14
1
custom iptables chain jumping
Hi all, When we create a custom chain in iptables, should we specifically create a rule to 'jump back' to the previous chain? For example: iptables -A INPUT -j CUSTOMCHAIN iptables -A CUSTOMCHAIN rule1 iptables -A CUSTOMCHAIN rule2 Should we add: iptables -A CUSTOMCHAIN -j INPUT ? Or, it will automatically go back to CHAIN when there's no more rule? Thank you very much, -- Fajar
2005 Dec 27
3
Ingress policing (matching netfilter marks)
...4.1 Filter table #### 4.1.1 Set policies $IPTABLES -P INPUT DROP $IPTABLES -P OUTPUT DROP $IPTABLES -P FORWARD DROP #### 4.1.2 Create userspecified chains # Create chain for bad tcp packets $IPTABLES -N bad_tcp # Create separate chains for ICMP, TCP and UDP to traverse $IPTABLES -N tcp_packets $IPTABLES -N udp_packets $IPTABLES -N icmp_packets $IPTABLES -N common #### 4.1.3 Create content in userspecified chains # bad_tcp chain $IPTABLES -A bad_tcp -p tcp --tcp-flags SYN,ACK SYN,ACK -m state --state NEW -j REJECT --reject-with tcp-reset $IPTABLES -A bad_tcp -p tcp ! --syn -m s...
2016 Jun 28
1
[Bug 1077] New: New traffic reduces conntrack timeout
...easier to do the check in __nf_ct_refresh_acct() in net/netfilter/nf_conntrack_core.c. But notice that "if (newtime - ct->timeout.expires >= HZ)" there has an integer underflow when newtime is smaller than ct->timeout.expires, and some things are currently relying on it, e.g. in tcp_packet() when a TCP connection coming out of ESTABLISHED has its timeout reduced. -- You are receiving this mail because: You are watching all bug changes. -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachment...
2013 Jan 04
4
CentOS 6.3 as Firewall/Router
...echo "1" > /proc/sys/net/ipv4/ip_dynaddr # 4. rules set up. # 4.1 Filter table # 4.1.1 Set policies /sbin/iptables -P INPUT DROP /sbin/iptables -P OUTPUT DROP /sbin/iptables -P FORWARD DROP # 4.1.2 Create userspecified chains # Create chain for bad tcp packets /sbin/iptables -N bad_tcp_packets # Create separate chains for ICMP, TCP and UDP to traverse /sbin/iptables -N allowed /sbin/iptables -N tcp_packets /sbin/iptables -N udpincoming_packets /sbin/iptables -N icmp_packets # 4.1.3 Create content in userspecified chains # bad_tcp_packets chain /sbin/iptables -A bad_tcp_packets -p tc...
2005 Mar 30
0
A few questions regarding samba from a samba and windows newbie (almost)
...e (I did not set them up). Can I add those somehow as windows printers through samba ? (Just makes things a little tighter than having to set things up over the Internet through http). In my firewall, I have opened the following ports : SAMBAPORT1=137 SAMBAPORT2=138 SAMBAPORT3=139 $IPTABLES -A tcp_packets -p TCP -s 0/0 --dport $SAMBAPORTx -j allowed I am not comfortable with opening any more ports than are strictly necessary. Ease of use is nice, but not at the cost of security. Can't I just tunnel samba over the ssh port (22) ? Thanks.
2015 Mar 04
1
IP drop list
On 03/04/2015 09:45 PM, Dave McGuire wrote: > On 03/04/2015 03:37 PM, Oliver Welter wrote: >> Am 04.03.2015 um 21:03 schrieb Dave McGuire: >>> Am 04.03.2015 um 20:12 schrieb Michael Orlitzky: >>>> Please add [DNSBL] support to iptables instead of Dovecot. It's a waste of >>>> effort to code it into every application that listens on the network.
2003 Apr 18
0
kjournald panic in 2.4.20
...update_inode+852/896] [ip_nat_fn+467/480] [ipt_hook+28/32] Apr 17 21:40:13 mofo kernel: [<c015861f>] [<c0158c8e>] [<c0152117>] [<c0152174>] [<c02cfe53>] [<c02cfb2c>] Apr 17 21:40:13 mofo kernel: [journal_cancel_revoke+251/368] [do_get_write_access+1183/1216] [tcp_packet+309/336] [journal_get_write_access+55/80] [journal_cancel_revoke+251/368] [do_get_write_access+1183/1216] Apr 17 21:40:13 mofo kernel: [<c015ca9b>] [<c015861f>] [<c02cbf85>] [<c0158677>] [<c015ca9b>] [<c015861f>] Apr 17 21:40:13 mofo kernel: [ext3_alloc_block...
2003 Apr 18
2
kjournald panic in 2.4.20 RedHat 7.2
...update_inode+852/896] [ip_nat_fn+467/480] [ipt_hook+28/32] Apr 17 21:40:13 mofo kernel: [<c015861f>] [<c0158c8e>] [<c0152117>] [<c0152174>] [<c02cfe53>] [<c02cfb2c>] Apr 17 21:40:13 mofo kernel: [journal_cancel_revoke+251/368] [do_get_write_access+1183/1216] [tcp_packet+309/336] [journal_get_write_access+55/80] [journal_cancel_revoke+251/368] [do_get_write_access+1183/1216] Apr 17 21:40:13 mofo kernel: [<c015ca9b>] [<c015861f>] [<c02cbf85>] [<c0158677>] [<c015ca9b>] [<c015861f>] Apr 17 21:40:13 mofo kernel: [ext3_alloc_block...