similar to: [Bug 59] sparc64 conntrack issue with expecting related connections, FTP

Displaying 20 results from an estimated 11000 matches similar to: "[Bug 59] sparc64 conntrack issue with expecting related connections, FTP"

2003 Mar 03
0
[Bug 59] New: sparc64 conntrack issue with expecting related connections, FTP
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=59 Summary: sparc64 conntrack issue with expecting related connections, FTP Product: netfilter/iptables Version: linux-2.4.x Platform: sparc64 OS/Version: other Status: NEW Severity: normal Priority: P2 Component:
2003 Feb 03
0
[Bug 41] New: pptp-conntrack-nat and sparc64 structures/padding/maskcomp bug
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=41 Summary: pptp-conntrack-nat and sparc64 structures/padding/maskcomp bug Product: netfilter/iptables Version: patch-o-matic Platform: sparc64 OS/Version: All Status: NEW Severity: normal Priority: P2 Component: connection
2003 Jun 30
6
[Bug 47] conntrack breaks nfs, corrupted packets
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=47 ------- Additional Comments From dg@ezcom.de 2003-06-30 16:17 ------- today i replaced my 8139too with a 3c59x and the corruptions are gone ------- You are receiving this mail because: ------- You are on the CC list for the bug, or are watching someone who is.
2003 Feb 14
6
[Bug 49] TCP conntrack entries with huge timeouts
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=49 ------- Additional Comments From laforge@netfilter.org 2003-02-14 08:39 ------- what patches from patch-o-matic do you use? Do you know how to reproduce this behaviour? ------- You are receiving this mail because: ------- You are on the CC list for the bug, or are watching someone who is.
2003 Jun 15
9
[Bug 91] conntrack unload loops forever (reproducible)
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=91 ------- Additional Comments From kaber@trash.net 2003-06-16 00:38 ------- problem seems to be a dropped reference in remove_expectations, can be reproduced by unloading ip_conntrack after unloading a helper which is helping a connection. Attached patch fixes my problems. ------- You are receiving this mail because: -------
2003 Feb 14
3
[Bug 47] conntrack breaks nfs, corrupted packets
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=47 ------- Additional Comments From laforge@netfilter.org 2003-02-14 09:14 ------- did you load iptable_nat at the time the problem with wrong-destip does happen? ------- You are receiving this mail because: ------- You are on the CC list for the bug, or are watching someone who is.
2003 Mar 16
4
[Bug 64] Conntrack-Table is not cleared on inferface down using target MASQUERADE
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=64 laforge@netfilter.org changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |ASSIGNED ------- Additional Comments From laforge@netfilter.org 2003-03-16 09:36 ------- you seem to be running a
2003 Apr 21
1
[Bug 64] Conntrack-Table is not cleared on inferface down using target MASQUERADE
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=64 ------- Additional Comments From tobias@portfolio16.de 2003-04-21 23:51 ------- Hi, I think I just found a problem with the patch... It was my fault to use a automatic build system and not check it... In the end the patch didn't apply in its whole and I didn't discover it, because the build system just went on.
2003 Mar 30
10
[Bug 71] dnat breaks connection tracking?
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=71 ------- Additional Comments From laforge@netfilter.org 2003-03-30 21:18 ------- First of all: You didn't even specify the particular kernel version you are running, not even mentioning which versions of which patches you are using (if any). Secondly, I don't see anything strange in this setup. DNAT with FTP sessions
2004 Feb 25
4
[Bug 48] conntrack breaks udp path mtu discovery
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=48 ------- Additional Comments From tatonet@tiscali.it 2004-02-25 15:05 ------- I know that this is an old bug report, but it's still opened... If we save the size of each single fragment we have to face another problem: how should we re-fragment the packet if original fragments were partially or totally overlapped?
2009 Sep 24
3
[Bug 610] New: conntrack doesn't work
http://bugzilla.netfilter.org/show_bug.cgi?id=610 Summary: conntrack doesn't work Product: netfilter/iptables Version: linux-2.6.x Platform: All OS/Version: All Status: NEW Severity: normal Priority: P1 Component: unknown AssignedTo: laforge at netfilter.org ReportedBy: urykhy at
2009 Oct 08
3
[Bug 612] New: conntrack returns src, dst, dport and sport all zeroed
http://bugzilla.netfilter.org/show_bug.cgi?id=612 Summary: conntrack returns src, dst, dport and sport all zeroed Product: libnfnetlink Version: unspecified Platform: i386 OS/Version: other Status: NEW Severity: major Priority: P1 Component: libnfnetlink AssignedTo: laforge at netfilter.org
2003 Mar 20
6
[Bug 68] Kernel panic
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=68 ------- Additional Comments From laforge@netfilter.org 2003-03-20 10:55 ------- This looks strange. The BUG in slab.c tells us that there is a GFP_ATOMIC missing. This means that we are allocating kernel memory from softirq context with only GFP_KERNEL. If I understand your backtrace correctly, what happens is: - you are
2003 Feb 14
1
[Bug 48] conntrack breaks udp path mtu discovery
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=48 laforge@netfilter.org changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |ASSIGNED ------- Additional Comments From laforge@netfilter.org 2003-02-14 09:02 ------- This is a really hard
2006 Feb 14
14
[Bug 448] IPv6 conntrack does not work on a tunnel interface
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=448 laforge@netfilter.org changed: What |Removed |Added ---------------------------------------------------------------------------- Component|ip_conntrack |nf_conntrack ------- Additional Comments From laforge@netfilter.org 2006-02-14 09:05 MET ------- ipv6 conntrack is
2005 Oct 14
5
[PATCH] Fix NAT for domU checksum offload
Below is a fix for the current problem of checksum offload not working in a NAT''ed network. The cause is the NAT/iptables code incorrectly modifying the TCP/UDP checksum (for the checksum offload case). The original code assumes a valid checksum, which is not the case for checksum offload packets (which has a complimented, partial checksum for the hardware to use). The fix is to
2009 Feb 03
2
[Bug 574] New: nf_conntrack_ftp.c ignores RFC 1123 regarding parentheses in FTP passive mode message 227
http://bugzilla.netfilter.org/show_bug.cgi?id=574 Summary: nf_conntrack_ftp.c ignores RFC 1123 regarding parentheses in FTP passive mode message 227 Product: netfilter/iptables Version: linux-2.6.x Platform: All OS/Version: All Status: NEW Severity: normal Priority: P3 Component:
2006 Feb 09
8
[Bug 440] Space in filename causes Forged DCC command from x.x.x.x: 0.0.0.0:0
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=440 laforge@netfilter.org changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |ASSIGNED ------- Additional Comments From laforge@netfilter.org 2006-02-09 15:51 MET ------- In the DCC Specifcication
2004 Jan 07
5
[Bug 91] conntrack unload loops forever (reproducible)
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=91 mschwendt@users.sf.net changed: What |Removed |Added ---------------------------------------------------------------------------- Status|RESOLVED |REOPENED Resolution|FIXED | ------- Additional Comments From mschwendt@users.sf.net
2003 Aug 02
0
[SECURITY] Netfilter Security Advisory: Conntrack list_del() DoS
--mYCpIKhGyMATD0i+ Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Netfilter Core Team Security Advisory =20 CVE: CAN-2003-0187 Subject: Netfilter / Connection Tracking Remote DoS Released: 01 Aug 2003 Effects: Any remote user may be able to DoS a machine