similar to: iptables connlimit

Displaying 20 results from an estimated 400 matches similar to: "iptables connlimit"

2006 Nov 08
1
Running iptables/netfilter module connlimit with stock CentOS4
Greetings folks, I've been researching the various iptables modules that are included with the stock CentOS4 distro; particularly the connlimit module. Is connlimit included by default? I thought it is since performing # iptables -m connlimit --help returns information on connlimit usage along with the general iptables help info: <SNIP> connlimit v1.2.11 options: [!]
2006 Sep 21
0
[Bug 515] New: connlimit filter doesn't work in 1.3.5 version of iptables
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=515 Summary: connlimit filter doesn't work in 1.3.5 version of iptables Product: iptables Version: 1.3.5 Platform: All OS/Version: Fedora Status: NEW Severity: normal Priority: P2 Component: libiptc AssignedTo:
2006 Nov 16
2
Connlimit in Shorewall?
Hi everyone, I see that shorewall has "ratelimit" but i''m interested in deny conexions by number of them, not by number/sec. Is connlimit feature supported by shorewall? Or maybe someone have an extraofficial patch for them? Regards, Angel Mieres ------------------------------------------------------------------------- Take Surveys. Earn Cash. Influence the Future of IT
2013 Oct 09
3
[Bug 857] New: ConnLimit unable to work properly
https://bugzilla.netfilter.org/show_bug.cgi?id=857 Summary: ConnLimit unable to work properly Product: iptables Version: 1.4.x Platform: All OS/Version: RedHat Linux Status: NEW Severity: critical Priority: P5 Component: iptables AssignedTo: netfilter-buglog at lists.netfilter.org
2017 Dec 27
0
[Bug 1207] New: connlimit rule fires too often
https://bugzilla.netfilter.org/show_bug.cgi?id=1207 Bug ID: 1207 Summary: connlimit rule fires too often Product: netfilter/iptables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: enhancement Priority: P5 Component: ip_tables (kernel) Assignee:
2009 Nov 05
2
[Bug 618] New: connlimit doesn't work after upgrade to iptables 1.4.5
http://bugzilla.netfilter.org/show_bug.cgi?id=618 Summary: connlimit doesn't work after upgrade to iptables 1.4.5 Product: iptables Version: unspecified Platform: i386 OS/Version: All Status: NEW Severity: normal Priority: P1 Component: iptables AssignedTo: laforge at netfilter.org
2009 Jun 07
2
[Bug 597] New: ip6tables connlimit - cannot set CIDR greater than 32 (includes fix)
http://bugzilla.netfilter.org/show_bug.cgi?id=597 Summary: ip6tables connlimit - cannot set CIDR greater than 32 (includes fix) Product: iptables Version: unspecified Platform: All OS/Version: All Status: NEW Severity: major Priority: P1 Component: ip6tables AssignedTo: laforge
2013 Jun 06
0
[Bug 676] connlimit doesn't work properly
https://bugzilla.netfilter.org/show_bug.cgi?id=676 Phil Oester <netfilter at linuxace.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED CC| |netfilter at linuxace.com Resolution|
2015 May 05
1
IPTABLES question
Would someone please explain to me the difference in effect between the following two IPTABLES conditions and the significance thereof in concurrent connection limiting? --tcp-flags SYN,ACK,FIN,RST SYN -j REJECT \ --connlimit-above 3 --connlimit-mask 32 --state NEW -j REJECT \ --connlimit-above 3 --connlimit-mask 32 -- *** e-Mail is NOT a SECURE channel *** Do
2006 Jul 26
1
patching iptables for connlimit
hallo the patch described at http://www.netfilter.org/documentation/HOWTO//netfilter-extensions-HOWTO-3.html#ss3.5 works for the FORWARD chain as well ? thanks, petre -- Petre Bandac Network Scientist - petre@kgb.ro _______________________________________________ LARTC mailing list LARTC@mailman.ds9a.nl http://mailman.ds9a.nl/cgi-bin/mailman/listinfo/lartc
2006 Sep 21
3
[Bug 515] connlimit filter doesn't work in 1.3.5 version of iptables
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=515 ------- Additional Comments From kaber@trash.net 2006-09-21 19:33 MET ------- Please try the current snapshot from ftp.netfilter.org. Its going to be released as 1.3.6 very soon. -- Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the
2008 Jan 24
0
CentOS 5.0 64bit - can't using ipt_connlimit module
# iptables -m connlimit --help ......... connlimit v1.3.5 options: [!] --connlimit-above n match if the number of existing tcp connections is (not) above n --connlimit-mask n group hosts using mask ----------------------------------------- The library seems to exist also: /lib64/iptables/libipt_connlimit.so However, creating a rule that uses connlimit fails: #$IPTABLES -A
2009 Dec 23
0
iptables -m connlimit
Hi, to the use of connlimit, I have found http://lists.centos.org/pipermail/centos/2008-June/059656.html Is there something new with centos 5.3 or 5.4? Helmut -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.centos.org/pipermail/centos/attachments/20091223/803acd8e/attachment.html>
2006 Oct 01
3
[Bug 467] iptables is complaining with bogus unknown error 18446744073709551615
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=467 mateusz@kaduk.net changed: What |Removed |Added ---------------------------------------------------------------------------- Status|RESOLVED |REOPENED Resolution|INVALID | ------- Additional Comments From mateusz@kaduk.net 2006-10-01
2006 Feb 02
2
limit number of connections per ip
Hello! I''ve read a lot of mail archives, but can''t find solutions for my problem. I have router with about 700 users. I''m using HTB with SFQ leaf qdiscs for every user (client ip). So, different IP can have its own rate limit. This scheme ir working fine for a long time. But how can I limit number of connections (sessions) from one host? I see from ip_conntrack
2006 May 16
0
[Bug 475] New: Incorrection in connlimit's man page
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=475 Summary: Incorrection in connlimit's man page Product: iptables Version: unspecified Platform: All URL: http://svn.netfilter.org/cgi- bin/viewcvs.cgi/trunk/iptables/extensions/libipt_connlim it.man?rev=3816&view=markup
2006 May 07
5
Detecting p2p traffic
After varying degrees of success with p2p detection modules, I would like to write the following rules using iptables to reliably identify p2p traffic: 1. If a host on the network has 5 or more simutaneous tcp connections to ports above 1024, mark all connections to ports 1024 and above as 60. 2. If a host has received (or sent) UDP packets from 5 different hosts'' ports above 1024 in a
2010 Feb 06
2
[Bug 633] New: No chain/target/match by that name
http://bugzilla.netfilter.org/show_bug.cgi?id=633 Summary: No chain/target/match by that name Product: iptables Version: 1.3.5 Platform: i386 OS/Version: RedHat Linux Status: NEW Severity: blocker Priority: P1 Component: iptables AssignedTo: netfilter-buglog at lists.netfilter.org
2010 Oct 21
6
v2.0.6 released
http://dovecot.org/releases/2.0/dovecot-2.0.6.tar.gz http://dovecot.org/releases/2.0/dovecot-2.0.6.tar.gz.sig * Pre-login CAPABILITY includes IDLE again. Mainly to make Blackberry servers happy. * auth: auth_cache_negative_ttl default was 0 in earlier v2.0.x, but it was supposed to be 1 hour as in v1.x. Changed it back to 1h. If you want it disabled, make sure doveconf shows it as 0.
2010 Oct 21
6
v2.0.6 released
http://dovecot.org/releases/2.0/dovecot-2.0.6.tar.gz http://dovecot.org/releases/2.0/dovecot-2.0.6.tar.gz.sig * Pre-login CAPABILITY includes IDLE again. Mainly to make Blackberry servers happy. * auth: auth_cache_negative_ttl default was 0 in earlier v2.0.x, but it was supposed to be 1 hour as in v1.x. Changed it back to 1h. If you want it disabled, make sure doveconf shows it as 0.