similar to: Bug in Linux 2.4 / iptables MAC match module (fwd)

Displaying 20 results from an estimated 4000 matches similar to: "Bug in Linux 2.4 / iptables MAC match module (fwd)"

2004 May 20
0
job advert: linux developer wanted
Hi all, I apologise in advance if this is off-topic or not permitted on this mailing list. We are looking to hire a skilled developer as soon as possible. We are looking for someone with the following skills: - Linux kernel development, especially Netfilter and ebtables modules - Perl software development, including DBI - SQL database programming, especially MySQL Although we would prefer to
2003 May 02
2
Re: Assertion failure in journal_flush()
Hi all, We encountered a problem by chance today, a kernel bug which causes the following error: Assertion failure in journal_fl sh() at journal.c:1310: "!journal->j_running_transaction" kernel BUG at journal.c:1310! This happened while remounting an ext3 filesystem read-only. We often do this and haven't seen this bug before, so I suspect some kind of race. It
2003 Nov 27
0
Larger SIP packets
Hi all, We would like to increase the size (sample length) of RTP packets sent by Asterisk to SIP phones. I gather that Asterisk currently always uses 20ms packets for RTP, although I can't find in the source where that's defined, unless it's in chan_zap.c. I'm guessing from [http://lists.digium.com/pipermail/asterisk-users/2003-September/019490.html] that it's not
2002 Mar 14
0
[ANNOUNCE] Release of iptables-1.2.6
--C7PTD44AewjTsiSV Content-Type: multipart/mixed; boundary="HkMjoL2LAeBLhbFV" Content-Disposition: inline --HkMjoL2LAeBLhbFV Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hi! The netfilter coreteam proudly presents: iptables version 1.2.6 Changes include a couple of minor bugfixes to the iptables command line
2002 Mar 17
0
[ANNOUNCE] Release of iptables-1.2.6a
--8w3uRX/HFJGApMzv Content-Type: multipart/mixed; boundary="ctP54qlpMx3WjD+/" Content-Disposition: inline --ctP54qlpMx3WjD+/ Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hi! The netfilter coreteam proudly presents: iptables version 1.2.6a Unfortunately iptables 1.2.6, released three days ago, contained two
2002 Nov 08
1
bug on openssh 3.5p1
Excuse me in advance for my poor english I have noted a small bug on OpenSSH 3.5p1. When user root is not permitted to log in a system (PermitRoot no) and a correct password is submitted for it to server, a RST packet is issued from server to client: [root at xxx root]# ssh victim root at victim's password: Permission denied, please try again. root at victim's password: Permission
2002 Aug 26
0
[ANNOUNCE] Release of iptables-1.2.7a
--9zecZT88ylESpiZX Content-Type: multipart/mixed; boundary="+nG9yj4eE4W6Oba0" Content-Disposition: inline --+nG9yj4eE4W6Oba0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hi! The netfilter coreteam proudly presents: iptables version 1.2.7a Unfortunately iptables 1.2.7, released on the website three weeks ago,
2003 Apr 13
0
[ANNOUNCE] Release of iptables-1.2.8
--Vy1A5eXR7jld12ZH Content-Type: multipart/mixed; boundary="N/GrjenRD+RJfyz+" Content-Disposition: inline --N/GrjenRD+RJfyz+ Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hi! The netfilter coreteam proudly presents: iptables version 1.2.8: Version 1.2.8 is a maintainance release, containing dozens of small
2004 Jun 16
0
[ANNOUNCE] Release of iptables-1.2.10
--3Y2Mr1SP1gWKl0+e Content-Type: multipart/mixed; boundary="j9XQ5cF5hebrmXqw" Content-Disposition: inline --j9XQ5cF5hebrmXqw Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hi! The netfilter coreteam proudly presents: iptables version 1.2.10 1.2.10 is (like most other 1.2.x releases) a maintainance release,
2004 Oct 30
4
modules ipt_conntrack ipt_pkttype not found
Hello, I run Shorewall 2.0.3a backport on a debian woody box (with 2.4.18 homemade kernel). When I start shorewall I got the following errors. Oct 30 11:13:12 fwr modprobe: modprobe: Can''t locate module ipt_conntrack Oct 30 11:13:17 fwr modprobe: modprobe: Can''t locate module ipt_pkttype Oct 30 11:13:18 fwr modprobe: modprobe: Can''t locate module ipt_pkttype Oct 30
2003 Nov 02
0
[ANNOUNCE] Release of iptables-1.2.9
--5uhzMJlTksuFv+PE Content-Type: multipart/mixed; boundary="9A1A73/U17WN0PFw" Content-Disposition: inline --9A1A73/U17WN0PFw Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hi! The netfilter coreteam proudly presents: iptables version 1.2.9 1.2.9 is (like most other 1.2.x releases) a maintainance release,
2003 Sep 30
4
macaddress blacklist problem
I helped set up a firewall at my brother''s church and we are running shorewall 1.4.6b on a redhat 9 box. Works well. [root@fumcbafw shorewall]# uname -r 2.4.20-19.9 [root@fumcbafw shorewall]# iptables --version iptables v1.2.7a The box also serves as a dhcp server for the church offices and there is one box that apparently still has the old firewall config (zone alarm) on it since it
2003 Oct 07
0
[ANNOUNCE] Release of iptables-1.2.9rc1
--va9XEZk9/dJ5GUjX Content-Type: multipart/mixed; boundary="vM12nk/63StVgfqY" Content-Disposition: inline --vM12nk/63StVgfqY Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hi! The netfilter coreteam proudly presents: iptables version 1.2.9rc1 Version 1.2.9rc1 is the first release candidate of the upcoming 1.2.9
2002 Feb 27
0
[ANNOUNCE] Security Advisory about IRC DCC connection tracking
--k1lZvvs/B4yU6o8G Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hi! It is my duty to inform you about this very unfortunate security issue in the IRC DCC connection tracking code. The following mail has just been sent to bugtraq, Linux Vendors have been informed two weeks in advance in order to prepare their advisories.
2010 Oct 25
2
[PATCH] Btrfs: allow subvol deletion by unprivileged user with -o user_subvol_rm_allowed
Add a mount option user_subvol_rm_allowed that allows users to delete a (potentially non-empty!) subvol when they would otherwise we allowed to do an rmdir(2). We duplicate the may_delete() checks from the core VFS code to implement identical security checks (minus the directory size check). Signed-off-by: Sage Weil <sage@newdream.net> --- fs/btrfs/ctree.h | 1 + fs/btrfs/ioctl.c |
2005 Feb 16
1
[ANNOUNCE] ulogd-1.21 released
Hi! I have released version 1.21 of the iptables userspace logging daemon (ulogd). This release is a minur bugfix update to the 'brown paper bag' release 1.20. 1.20 was probably one of the last 'new feature' updates for ulogd, since I'm already working on ulogd2, which includes support for plugin stacks, IPFIX and ct_acct. The new Version is available as tar.bz2 only and can
2002 Aug 23
0
Re: ip_conntrack_lock not readlocked (fwd)
Here is a message from Hareld Welte, the current Netfilter lead developer about these messages. Sounds like he is interested in finding out more information about occurences of these messages (or he was a month and a half ago). -Tom -- Tom Eastep \ Shorewall - iptables made easy AIM: tmeastep \ http://www.shorewall.net ICQ: #60745924 \ teastep@shorewall.net ---------- Forwarded message
2005 Feb 14
0
[ANNOUNCE] ulogd-1.02 released
Hi! I have released version 1.20 of the iptables userspace logging daemon (ulogd). This release is probably one of the last 'new feature' updates for ulogd, since I'm already working on ulogd2, which includes support for plugin stacks, IPFIX and ct_acct. The new Version is available as tar.bz2 only and can be retrieved from: ftp://ftp.netfilter.org/pub/ulogd/ulogd-1.20.tar.bz2
2003 Oct 23
3
/var partition overflow (due to spyware?) in FreeBSD default install
All: I'm posting this to FreeBSD-security (rather than FreeBSD-net) because the problems I'm seeing appear to have been caused by spyware, and because they constitute a possible avenue for denial of service on FreeBSD machines with default installs of the operating system. Several of the FreeBSD machines on our network began to act strangely during the past week. Some have started to
2005 Nov 25
7
tcpdump not working with imq0 devices
On my debian woody (kernel 2.4.31) the tcpdump doesn''t work with imq0 devices. If I try to tcpdump imq devices there is no packet seen: [...] rt1:~# tcpdump -n -i imq0 Warning: arptype 65535 not supported by libpcap - falling back to cooked socket tcpdump: WARNING: imq0: no IPv4 address assigned tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on