similar to: [Bug 47] conntrack breaks nfs, corrupted packets

Displaying 20 results from an estimated 7000 matches similar to: "[Bug 47] conntrack breaks nfs, corrupted packets"

2003 Jun 30
6
[Bug 47] conntrack breaks nfs, corrupted packets
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=47 ------- Additional Comments From dg@ezcom.de 2003-06-30 16:17 ------- today i replaced my 8139too with a 3c59x and the corruptions are gone ------- You are receiving this mail because: ------- You are on the CC list for the bug, or are watching someone who is.
2003 May 14
4
[Bug 47] conntrack breaks nfs, corrupted packets
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=47 ------- Additional Comments From kaber@trash.net 2003-05-14 02:39 ------- I've captured some non-fragmented tcp packets which show this behaviour with 2.4.21-rc2. They look badly damaged. The destination ip doesn't match the mac but they come from valid connections. Setting interface mtu to 1486 helps which makes me
2003 Mar 16
4
[Bug 64] Conntrack-Table is not cleared on inferface down using target MASQUERADE
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=64 laforge@netfilter.org changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |ASSIGNED ------- Additional Comments From laforge@netfilter.org 2003-03-16 09:36 ------- you seem to be running a
2003 Jun 15
9
[Bug 91] conntrack unload loops forever (reproducible)
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=91 ------- Additional Comments From kaber@trash.net 2003-06-16 00:38 ------- problem seems to be a dropped reference in remove_expectations, can be reproduced by unloading ip_conntrack after unloading a helper which is helping a connection. Attached patch fixes my problems. ------- You are receiving this mail because: -------
2009 Sep 24
3
[Bug 610] New: conntrack doesn't work
http://bugzilla.netfilter.org/show_bug.cgi?id=610 Summary: conntrack doesn't work Product: netfilter/iptables Version: linux-2.6.x Platform: All OS/Version: All Status: NEW Severity: normal Priority: P1 Component: unknown AssignedTo: laforge at netfilter.org ReportedBy: urykhy at
2003 Feb 14
1
[Bug 48] conntrack breaks udp path mtu discovery
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=48 laforge@netfilter.org changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |ASSIGNED ------- Additional Comments From laforge@netfilter.org 2003-02-14 09:02 ------- This is a really hard
2004 Feb 25
4
[Bug 48] conntrack breaks udp path mtu discovery
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=48 ------- Additional Comments From tatonet@tiscali.it 2004-02-25 15:05 ------- I know that this is an old bug report, but it's still opened... If we save the size of each single fragment we have to face another problem: how should we re-fragment the packet if original fragments were partially or totally overlapped?
2003 Mar 06
3
[Bug 59] sparc64 conntrack issue with expecting related connections, FTP
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=59 laforge@netfilter.org changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |ASSIGNED ------- You are receiving this mail because: ------- You are on the CC list for the bug, or are watching
2006 Feb 14
14
[Bug 448] IPv6 conntrack does not work on a tunnel interface
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=448 laforge@netfilter.org changed: What |Removed |Added ---------------------------------------------------------------------------- Component|ip_conntrack |nf_conntrack ------- Additional Comments From laforge@netfilter.org 2006-02-14 09:05 MET ------- ipv6 conntrack is
2003 Feb 14
6
[Bug 49] TCP conntrack entries with huge timeouts
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=49 ------- Additional Comments From laforge@netfilter.org 2003-02-14 08:39 ------- what patches from patch-o-matic do you use? Do you know how to reproduce this behaviour? ------- You are receiving this mail because: ------- You are on the CC list for the bug, or are watching someone who is.
2006 Sep 14
5
[Bug 508] ip6tables conntrack marks all incoming packets as INVALID
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=508 ------- Additional Comments From kaber@trash.net 2006-09-14 13:18 MET ------- Did you enable nf_conntrack and the ipv6 connection tracking module? -- Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You reported the bug, or are watching the
2006 Feb 11
11
[Bug 447] iptables doesn't support multiple times the same match in one rule
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=447 Bug 447 depends on bug 440, which changed state. Bug 440 Summary: Space in filename causes Forged DCC command from x.x.x.x: 0.0.0.0:0 https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=440 What |Old Value |New Value ----------------------------------------------------------------------------
2004 Jan 07
5
[Bug 91] conntrack unload loops forever (reproducible)
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=91 mschwendt@users.sf.net changed: What |Removed |Added ---------------------------------------------------------------------------- Status|RESOLVED |REOPENED Resolution|FIXED | ------- Additional Comments From mschwendt@users.sf.net
2003 Apr 21
1
[Bug 64] Conntrack-Table is not cleared on inferface down using target MASQUERADE
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=64 ------- Additional Comments From tobias@portfolio16.de 2003-04-21 23:51 ------- Hi, I think I just found a problem with the patch... It was my fault to use a automatic build system and not check it... In the end the patch didn't apply in its whole and I didn't discover it, because the build system just went on.
2003 Feb 16
2
[Bug 34] Redirecting udp packets to closed port gives bad icmp error
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=34 laforge@netfilter.org changed: What |Removed |Added ---------------------------------------------------------------------------- BugsThisDependsOn| |2 Status|NEW |ASSIGNED ------- Additional Comments From laforge@netfilter.org
2009 Oct 08
3
[Bug 612] New: conntrack returns src, dst, dport and sport all zeroed
http://bugzilla.netfilter.org/show_bug.cgi?id=612 Summary: conntrack returns src, dst, dport and sport all zeroed Product: libnfnetlink Version: unspecified Platform: i386 OS/Version: other Status: NEW Severity: major Priority: P1 Component: libnfnetlink AssignedTo: laforge at netfilter.org
2006 Sep 26
10
[Bug 517] failed to forward packets via some interface
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=517 ------- Additional Comments From netfilter@linuxace.com 2006-09-26 03:44 MET ------- *** Bug 519 has been marked as a duplicate of this bug. *** -- Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are
2006 Sep 13
0
[Bug 508] New: ip6tables conntrack marks all incoming packets as INVALID
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=508 Summary: ip6tables conntrack marks all incoming packets as INVALID Product: netfilter/iptables Version: linux-2.6.x Platform: i386 OS/Version: Gentoo Status: NEW Severity: normal Priority: P2 Component: ip_conntrack
2005 Feb 24
8
[Bug 91] conntrack unload loops forever (reproducible)
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=91 netfilter@linuxace.com changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |netfilter@linuxace.com ------- Additional Comments From netfilter@linuxace.com 2005-02-24 02:10 MET ------- Any recent
2007 Apr 18
5
[Bridge] Any way of knowing a packet's been defragmented
Hello, Due to a recent change in the bridge code, we now need a way of knowing if a packet has been defragmented. The bridge code now checks on the packet size and drops packets that are too big for the output port. Defragmented packets will get refragmented later, so they shouldn't be dropped. I've been reading the defragmentation code and can't find an easy way of knowing if a