similar to: [ANNOUNCE]: Release of iptables-1.4.4

Displaying 20 results from an estimated 3000 matches similar to: "[ANNOUNCE]: Release of iptables-1.4.4"

2010 Aug 03
3
[ANNOUNCE]: Release of iptables-1.4.9
The netfilter coreteam presents: iptables version 1.4.9 the iptables release for the 2.6.35 kernel. Changes include: - support for the LED target, which hadn't been merged so far because the kernel module had some bugs - a new version of the set extension for the upcoming release supporting IPv6 - negation support for the quota match - support for the SACK-IMMEDIATELY SCTP
2006 Dec 06
1
[ANNOUNCE] Release of iptables-1.3.7
Hi! The netfilter coreteam proudly presents: iptables version 1.3.7 The 1.3.7 version contains accumulated bugfixes to the last 1.3.6 version. This comes a bit earlier after the last release than usual because the endian annotations in 2.6.19 broke iptables compilation, which is fixed with this version. The ChangeLog is attached to this mail. Version 1.3.7 can be obtained from:
2009 Mar 23
2
[ANNOUNCE]: Release of iptables-1.4.3
The netfilter coreteam presents: iptables version 1.4.3 the iptables release for the 2.6.29 kernel. It has been some time since the last release and we've had a lot of changes all over the place. Besides the usual fixes and cleanups, we have: - numerous documentation updates from Jan Engelhardt and others - a set of changes to move some of the iptables functionality to a shared
2011 May 26
1
[ANNOUNCE]: Release of iptables-1.4.11
The netfilter coreteam presents: iptables version 1.4.10 the iptables release for the 2.6.39 kernels. Due to some mistakes on my side we didn't have a release for longer than expected, so this contains a rather large number of changes. Changes include: - various bugfixes, cleanups and documentation updates - a new "guided option parser" from Jan, replacing a lot of the
2011 Mar 18
6
[Bug 711] New: iptables -m iprange causes unknown error
http://bugzilla.netfilter.org/show_bug.cgi?id=711 Summary: iptables -m iprange causes unknown error Product: netfilter/iptables Version: linux-2.6.x Platform: All OS/Version: All Status: NEW Severity: normal Priority: P5 Component: ip_tables (kernel) AssignedTo: netfilter-buglog at
2003 Sep 05
8
where is "equalize" kernel patch?
I found following paragraph in the man page of iproute2. equalize allow packet by packet randomization on multipath routes. Without this modifier, the route will be frozen to one selected nexthop, so that load splitting will only occur on per-flow base. equalize only works if the kernel is patched. ^^^^^^^^^^^^^^^^^ Now, where
2007 Mar 19
9
[BUG?] ip ru flush && RTNETLINK answers: Numerical result out of range
After an: # ip ru flush I loose all my ip rules but the priority 0 one. root@sarasvati:~# ip ru 0: from all lookup 255 root@sarasvati:~# Ok with that, but now i''m not able to insert any new rule. This leads to a total loose of conectivity. root@sarasvati:~# ip ru add from all table default RTNETLINK answers: Numerical result out of range root@sarasvati:~# ip ru add from all
2006 Mar 15
5
Possible bug with multiport?
Hi Folks: I am either using the multiport of the -m or --match option of iptables in correctly or there is a bug with it. Is anyone else using it with no problem? This is the way I am trying to use it: my_ports=21,25,80 iptables -t nat -A PREROUTING -i $wan_addr -p tcp -m multiport --dports $my_ports -j DNAT --to $my_internal_address I have used this in the past successfully but that was a
2007 Apr 18
1
[Bridge] bridge at start up
hi i have gone through the achieves but still could not get my bridge to suvive a reboot . please can anyone help me am using fedora core 2 -----Original message----- From: bridge-request@lists.osdl.org Date: Fri, 28 Jan 2005 03:08:06 +0100 To: bridge@lists.osdl.org Subject: Bridge Digest, Vol 17, Issue 25 > Send Bridge mailing list submissions to > bridge@lists.osdl.org > >
2011 Apr 03
6
[Bug 713] New: CPPFLAGS are mishandled which breaks non-shared targets
http://bugzilla.netfilter.org/show_bug.cgi?id=713 Summary: CPPFLAGS are mishandled which breaks non-shared targets Product: iptables Version: unspecified Platform: All OS/Version: All Status: NEW Severity: enhancement Priority: P5 Component: unknown AssignedTo: netfilter-buglog at
2002 Jun 20
3
simple error in extensions/libipt_ROUTE.c extensions/libipt_IMQ.c
Hi Patrick ! I find simple error in extensions/libipt_ROUTE.c line 24 and 127 -- change NETFILTER_VERSION to IPTABLES_VERSION extensions/libipt_IMQ.c line 18 and 87 -- change NETFILTER_VERSION to IPTABLES_VERSION (iptables-20020618) ----------------------------------- mailto:alexey_talikov@texlab.com.uz BR Alexey Talikov FORTEK -----------------------------------
2003 Apr 25
4
IMQ page
The IMQ page (http://luxik.cdi.cz/~patrick/imq/) has some rather obvios problems in the examples used. I wrote Patrick McHardy without getting an answer (yet) so I tought this was a good place to ask. Does anybody know how to contact him about this? _______________________________________________ LARTC mailing list / LARTC@mailman.ds9a.nl http://mailman.ds9a.nl/mailman/listinfo/lartc HOWTO:
2004 Feb 26
12
HFSC
hmm HFSC ? where can i find more informations and examples about the *linux* HFSC ? http://trash.net/~kaber/hfsc/ does not help here -- _______________________________________________ LARTC mailing list / LARTC@mailman.ds9a.nl http://mailman.ds9a.nl/mailman/listinfo/lartc HOWTO: http://lartc.org/
2004 Oct 31
9
Maquerading through IPSECed wireless dropping packets selectively?
Hello, I''m stuck IPSECing my wireless network at home and would appreciate any comments. I appologize in advance if I''m wasting your time with trivia - I''m not a professional and staring at the problem for days from various angles hasn''t done me any good ... My home server/firewall (morannon) is hooked up through an USB to ethernet adapter (eth1) to my DSL
2009 Sep 24
3
[Bug 610] New: conntrack doesn't work
http://bugzilla.netfilter.org/show_bug.cgi?id=610 Summary: conntrack doesn't work Product: netfilter/iptables Version: linux-2.6.x Platform: All OS/Version: All Status: NEW Severity: normal Priority: P1 Component: unknown AssignedTo: laforge at netfilter.org ReportedBy: urykhy at
2006 Sep 10
3
HFSC traffic loss bug, kernel 2.6.16.24
Hello, I have finally managed to understand HFSC up to a level which allowed me to create a QoS script which maintains low VoIP latency while running stuff like eMule. Unfortunately, HFSC seems to have a severe bug. Why do I consider this as a bug defenitely? Well, my script runs without any errors, then QoS works perfectly for some hours, no error messages in kernel log. Then randomly the
2013 Jul 20
6
[Bug 835] New: protocol without option is failing
https://bugzilla.netfilter.org/show_bug.cgi?id=835 Summary: protocol without option is failing Product: nftables Version: unspecified Platform: x86_64 OS/Version: All Status: NEW Severity: enhancement Priority: P5 Component: nft AssignedTo: pablo at netfilter.org ReportedBy: eric at
2008 Jul 07
3
[Bridge] [RFC PATCH 0/2] Allow full bridge configuration via sysfs
Right now, you can configure most bridge device parameters via sysfs. However, you cannot either: - add or remove bridge interfaces - add or remove physical interfaces from a bridge The attached patch set rectifies this. With this patch set, brctl (theoretically) becomes completely optional, much like ifenslave is now for bonding. (In fact, the idea for this patch, and the syntax used herein, is
2002 Oct 30
2
Building and installing packages with functions with names starting with (PR#2229)
Dear Coreteam, I am getting closer to have some R-packages with interface to CoCo. I use something like package.skeleton("CoCo", list = ls(all.names = TRUE)) to also get my functions beginning with "." into the package. Functions with names starting with "." are put OK into the package during "R CMD build ...", but when R at "R INSTALL - d
2009 Apr 02
7
[Lguest] [PATCH 4/5] lguest: use KVM hypercalls
fre, 27 03 2009 kl. 10:22 +1030, skrev Rusty Russell: > From: Matias Zabaljauregui <zabaljauregui at gmail.com> > > Impact: cleanup > > This patch allow us to use KVM hypercalls Something has broken in relation to this change. I'm not sure it is this change itself or one following, but I get the following error when using lguest: lguest: unhandled trap 6 at 0x418726