similar to: [Bug 15] ip6tables mangle needs 'route_me_harder' equivalent

Displaying 20 results from an estimated 6000 matches similar to: "[Bug 15] ip6tables mangle needs 'route_me_harder' equivalent"

2003 Jan 27
0
[Bug 15] ip6tables mangle needs 'route_me_harder' equivalent
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=15 laforge@netfilter.org changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |ASSIGNED ------- You are receiving this mail because: ------- You are on the CC list for the bug, or are watching
2006 Feb 16
1
[Bug 451] New: ip6tables port range support in multiport modules is broken
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=451 Summary: ip6tables port range support in multiport modules is broken Product: iptables Version: unspecified Platform: i386 OS/Version: Debian GNU/Linux Status: NEW Severity: normal Priority: P2 Component: ip6tables
2009 Feb 11
2
[Bug 576] New: ip6tables maks auto configuration packages as INVALID
http://bugzilla.netfilter.org/show_bug.cgi?id=576 Summary: ip6tables maks auto configuration packages as INVALID Product: iptables Version: unspecified Platform: i386 OS/Version: Debian GNU/Linux Status: NEW Severity: blocker Priority: P1 Component: ip6tables AssignedTo: laforge at netfilter.org
2009 Jun 07
2
[Bug 597] New: ip6tables connlimit - cannot set CIDR greater than 32 (includes fix)
http://bugzilla.netfilter.org/show_bug.cgi?id=597 Summary: ip6tables connlimit - cannot set CIDR greater than 32 (includes fix) Product: iptables Version: unspecified Platform: All OS/Version: All Status: NEW Severity: major Priority: P1 Component: ip6tables AssignedTo: laforge
2003 Jun 21
0
[Bug 103] New: ip6tables -L does not separate address and mask if mask is odd
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=103 Summary: ip6tables -L does not separate address and mask if mask is odd Product: iptables userspace Version: 1.2.8 Platform: All OS/Version: All Status: NEW Severity: trivial Priority: P2 Component: ip6tables
2006 Sep 13
0
[Bug 508] New: ip6tables conntrack marks all incoming packets as INVALID
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=508 Summary: ip6tables conntrack marks all incoming packets as INVALID Product: netfilter/iptables Version: linux-2.6.x Platform: i386 OS/Version: Gentoo Status: NEW Severity: normal Priority: P2 Component: ip_conntrack
2020 May 26
0
ip6tables equivalent for NAT?
I finally got an ISP connection with working IPv6 and now I need to add firewall rules for forwarding connections from my LAN to the WAN. I'm using firewalld to handle the high-level description that gets translated to iptables/ip6tables on CentOS 7. Of course, with IPv6, one doesn't do NAT, so the usual masquerade target doesn't make sense. But I want similar connection logic,
2020 May 26
0
ip6tables equivalent for NAT?
I figure that TCP is easy: Add a rule to the forward chain to allow SYN packets. There's already connection tracking to handle established connections. Does connection tracking handle UDP? If I allow all UDP from the LAN interface and one sends a DNS query from LAN to WAN, will the reply get back? I don't want to blanket authorize all UDP. ICMPv6, maybe, to allow traceroutes. Unless
2020 May 26
3
ip6tables equivalent for NAT?
with ipv6, you just allow the specific ports destined to the specific local machine(s) in on your WAN side, they don't need translating. same sort of rule as if you had a internet-facing service running on the routing system On Tue, May 26, 2020 at 11:55 AM Kenneth Porter <shiva at sewingwitch.com> wrote: > I finally got an ISP connection with working IPv6 and now I need to add
2014 Feb 02
0
[Bug 892] New: ip6tables --match policy needs to accept IPv4 addresses for --tunnel-src and --tunnel-dst
https://bugzilla.netfilter.org/show_bug.cgi?id=892 Summary: ip6tables --match policy needs to accept IPv4 addresses for --tunnel-src and --tunnel-dst Product: iptables Version: 1.4.x Platform: All OS/Version: All Status: NEW Severity: enhancement Priority: P5 Component: ip6tables
2006 Feb 06
1
[Bug 442] New: skb->data_len corrupted in NF_IP_LOCAL_OUT in mangle table
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=442 Summary: skb->data_len corrupted in NF_IP_LOCAL_OUT in mangle table Product: netfilter/iptables Version: linux-2.6.x Platform: i386 OS/Version: Debian GNU/Linux Status: NEW Severity: major Priority: P2 Component: ip_tables
2014 May 13
0
[Bug 940] New: ip6tables-save output invalid rule when using D/SNPT
https://bugzilla.netfilter.org/show_bug.cgi?id=940 Summary: ip6tables-save output invalid rule when using D/SNPT Product: iptables Version: 1.4.x Platform: x86_64 OS/Version: All Status: NEW Severity: normal Priority: P5 Component: ip6tables AssignedTo: netfilter-buglog at lists.netfilter.org
2018 Oct 26
2
ip6tables on C7
On 10/26/18, Andrew Pearce <andrew at andew.org.uk> wrote: > On 2018-10-26 16:25, mark wrote: > I believe this should remove any ipv6 rules (rules and chains) > > ip6tables -F > ip6tables -X You might want to clear the other tables, too: for x in filter nat mangle raw security "" do ip6tables ${x:+-t $x} -F ip6tables ${x:+-t $x} -X done > You may need to
2003 Aug 02
1
[SECURITY] Netfilter Security Advisory: NAT Remote DOS (SACK mangle)
--7ZAtKRhVyVSsbBD2 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Netfilter Core Team Security Advisory =20 CVE: CAN-2003-0467 Subject: Netfilter / NAT Remote DoS Released: 01 Aug 2003 Effects: Under limited circumstances, a remote user may be able to crash
2012 Jun 28
2
[Bug 796] New: ip6tables (iptables) "state" test fails to correctly determine the state of packet streams; will not jump to ACCEPT on ESTABLISHED,RELATED connections
http://bugzilla.netfilter.org/show_bug.cgi?id=796 Summary: ip6tables (iptables) "state" test fails to correctly determine the state of packet streams; will not jump to ACCEPT on ESTABLISHED,RELATED connections Product: iptables Version: unspecified Platform: All OS/Version: All
2018 Oct 26
2
ip6tables on C7
Working on a script, and to test, I need to shut down ip6tables temporarily. firewalld is running; is there any way to shut down *just* ip6tables? I tried installinf iptables-services, and did a systemctl stop ip6tables, and no joy. mark
2003 Aug 19
0
[Bug 108] strange text response for illegal ipv6 ip numbers in rules
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=108 laforge@netfilter.org changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution| |WORKSFORME ------- Additional Comments From
2018 Oct 26
0
ip6tables on C7
Gordon Messmer wrote: > On 10/26/18, Andrew Pearce <andrew at andew.org.uk> wrote: > >> On 2018-10-26 16:25, mark wrote: >> I believe this should remove any ipv6 rules (rules and chains) >> >> ip6tables -F ip6tables -X > > You might want to clear the other tables, too: > > > for x in filter nat mangle raw security "" do ip6tables ${x:+-t
2011 Jan 11
1
IPv6, HE tunnel and ip6tables problems
CentOS 5.5, fully patched. I have a HE tunnel (tunnelbroker.net) IPv6 tunnel. This works pretty well and is simple to setup. Everything works fine. Until I try to set up an ip6tables firewall. eg if I try to view https://dnssec.surfnet.nl/?p=464 then the page never displays and the firewall shows kernel: IN=sit1 OUT=eth0 SRC=2001:0610:0001:40cd:0145:0100:0186:0033 DST=my.machine LEN=80 TC=0
2017 Aug 08
1
CentOS6, IP6tables, Routing, TPROXY (squid34 epel package)
Hello, how do achieve this: how must files /etc/sysconfig/network-scripts/ look like to be the same as entering the following two commands ... ip -f inet6 rule add fwmark 1 lookup 100 ip -f inet6 route add local ::/0 dev lo table 100 is there the localhost device lo correct, or does it have to be br0? e.g. a file route-br0 with 192.168.1.0/24 via 10.10.10.1 dev br0 does the routing to the