Displaying 20 results from an estimated 11000 matches similar to: "[Bug 59] sparc64 conntrack issue with expecting related connections, FTP"
2003 Mar 03
0
[Bug 59] New: sparc64 conntrack issue with expecting related connections, FTP
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=59
Summary: sparc64 conntrack issue with expecting related
connections, FTP
Product: netfilter/iptables
Version: linux-2.4.x
Platform: sparc64
OS/Version: other
Status: NEW
Severity: normal
Priority: P2
Component:
2003 Feb 03
0
[Bug 41] New: pptp-conntrack-nat and sparc64 structures/padding/maskcomp bug
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=41
Summary: pptp-conntrack-nat and sparc64
structures/padding/maskcomp bug
Product: netfilter/iptables
Version: patch-o-matic
Platform: sparc64
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: connection
2003 Jun 30
6
[Bug 47] conntrack breaks nfs, corrupted packets
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=47
------- Additional Comments From dg@ezcom.de 2003-06-30 16:17 -------
today i replaced my 8139too with a 3c59x and the corruptions are gone
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.
2003 Feb 14
6
[Bug 49] TCP conntrack entries with huge timeouts
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=49
------- Additional Comments From laforge@netfilter.org 2003-02-14 08:39 -------
what patches from patch-o-matic do you use? Do you know how to reproduce this
behaviour?
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.
2003 Jun 15
9
[Bug 91] conntrack unload loops forever (reproducible)
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=91
------- Additional Comments From kaber@trash.net 2003-06-16 00:38 -------
problem seems to be a dropped reference in remove_expectations, can be reproduced by
unloading ip_conntrack after unloading a helper which is helping a connection.
Attached patch fixes my problems.
------- You are receiving this mail because: -------
2003 Feb 14
3
[Bug 47] conntrack breaks nfs, corrupted packets
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=47
------- Additional Comments From laforge@netfilter.org 2003-02-14 09:14 -------
did you load iptable_nat at the time the problem with wrong-destip does happen?
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.
2003 Mar 16
4
[Bug 64] Conntrack-Table is not cleared on inferface down using target MASQUERADE
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=64
laforge@netfilter.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |ASSIGNED
------- Additional Comments From laforge@netfilter.org 2003-03-16 09:36 -------
you seem to be running a
2003 Apr 21
1
[Bug 64] Conntrack-Table is not cleared on inferface down using target MASQUERADE
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=64
------- Additional Comments From tobias@portfolio16.de 2003-04-21 23:51 -------
Hi,
I think I just found a problem with the patch... It was my fault to use a automatic build
system and not check it... In the end the patch didn't apply in its whole and I didn't
discover it, because the build system just went on.
2003 Mar 30
10
[Bug 71] dnat breaks connection tracking?
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=71
------- Additional Comments From laforge@netfilter.org 2003-03-30 21:18 -------
First of all: You didn't even specify the particular kernel version you are
running, not even mentioning which versions of which patches you are using (if
any).
Secondly, I don't see anything strange in this setup. DNAT with FTP sessions
2004 Feb 25
4
[Bug 48] conntrack breaks udp path mtu discovery
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=48
------- Additional Comments From tatonet@tiscali.it 2004-02-25 15:05 -------
I know that this is an old bug report, but it's still opened...
If we save the size of each single fragment we have to face another problem:
how should we re-fragment the packet if original fragments were partially or
totally overlapped?
2009 Sep 24
3
[Bug 610] New: conntrack doesn't work
http://bugzilla.netfilter.org/show_bug.cgi?id=610
Summary: conntrack doesn't work
Product: netfilter/iptables
Version: linux-2.6.x
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P1
Component: unknown
AssignedTo: laforge at netfilter.org
ReportedBy: urykhy at
2009 Oct 08
3
[Bug 612] New: conntrack returns src, dst, dport and sport all zeroed
http://bugzilla.netfilter.org/show_bug.cgi?id=612
Summary: conntrack returns src, dst, dport and sport all zeroed
Product: libnfnetlink
Version: unspecified
Platform: i386
OS/Version: other
Status: NEW
Severity: major
Priority: P1
Component: libnfnetlink
AssignedTo: laforge at netfilter.org
2003 Mar 20
6
[Bug 68] Kernel panic
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=68
------- Additional Comments From laforge@netfilter.org 2003-03-20 10:55 -------
This looks strange.
The BUG in slab.c tells us that there is a GFP_ATOMIC missing. This means that
we are allocating kernel memory from softirq context with only GFP_KERNEL.
If I understand your backtrace correctly, what happens is:
- you are
2003 Feb 14
1
[Bug 48] conntrack breaks udp path mtu discovery
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=48
laforge@netfilter.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |ASSIGNED
------- Additional Comments From laforge@netfilter.org 2003-02-14 09:02 -------
This is a really hard
2006 Feb 14
14
[Bug 448] IPv6 conntrack does not work on a tunnel interface
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=448
laforge@netfilter.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Component|ip_conntrack |nf_conntrack
------- Additional Comments From laforge@netfilter.org 2006-02-14 09:05 MET -------
ipv6 conntrack is
2005 Oct 14
5
[PATCH] Fix NAT for domU checksum offload
Below is a fix for the current problem of checksum offload not working
in a NAT''ed network. The cause is the NAT/iptables code incorrectly
modifying the TCP/UDP checksum (for the checksum offload case). The
original code assumes a valid checksum, which is not the case for
checksum offload packets (which has a complimented, partial checksum for
the hardware to use). The fix is to
2009 Feb 03
2
[Bug 574] New: nf_conntrack_ftp.c ignores RFC 1123 regarding parentheses in FTP passive mode message 227
http://bugzilla.netfilter.org/show_bug.cgi?id=574
Summary: nf_conntrack_ftp.c ignores RFC 1123 regarding
parentheses in FTP passive mode message 227
Product: netfilter/iptables
Version: linux-2.6.x
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P3
Component:
2006 Feb 09
8
[Bug 440] Space in filename causes Forged DCC command from x.x.x.x: 0.0.0.0:0
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=440
laforge@netfilter.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |ASSIGNED
------- Additional Comments From laforge@netfilter.org 2006-02-09 15:51 MET -------
In the DCC Specifcication
2004 Jan 07
5
[Bug 91] conntrack unload loops forever (reproducible)
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=91
mschwendt@users.sf.net changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|RESOLVED |REOPENED
Resolution|FIXED |
------- Additional Comments From mschwendt@users.sf.net
2003 Aug 02
0
[SECURITY] Netfilter Security Advisory: Conntrack list_del() DoS
--mYCpIKhGyMATD0i+
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Netfilter Core Team Security Advisory
=20
CVE: CAN-2003-0187
Subject:
Netfilter / Connection Tracking Remote DoS
Released:
01 Aug 2003
Effects:
Any remote user may be able to DoS a machine