Displaying 20 results from an estimated 10000 matches similar to: "[Bug 441] Feature Request; Resolve Domains/Hostnames"
2009 Oct 20
1
[Bug 616] New: Duplicate rules for multi-homed hostnames. IPv4 and IPv6 inconsistent treatment.
http://bugzilla.netfilter.org/show_bug.cgi?id=616
Summary: Duplicate rules for multi-homed hostnames. IPv4 and IPv6
inconsistent treatment.
Product: iptables
Version: unspecified
Platform: i386
OS/Version: All
Status: NEW
Severity: minor
Priority: P4
Component: iptables
2002 Feb 27
0
[ANNOUNCE] Security Advisory about IRC DCC connection tracking
--k1lZvvs/B4yU6o8G
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Hi!
It is my duty to inform you about this very unfortunate security issue
in the IRC DCC connection tracking code.
The following mail has just been sent to bugtraq, Linux Vendors have been
informed two weeks in advance in order to prepare their advisories.
2013 Jul 09
0
[Bug 616] Duplicate rules for multi-homed hostnames. IPv4 and IPv6 inconsistent treatment.
https://bugzilla.netfilter.org/show_bug.cgi?id=616
Phil Oester <netfilter at linuxace.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|ASSIGNED |RESOLVED
Resolution| |WONTFIX
--- Comment #10 from Phil Oester
2009 Feb 26
1
[Bug 580] New: iptables-restore and iptables-save lack comparison of a saved ruleset against the currently deployed rules
http://bugzilla.netfilter.org/show_bug.cgi?id=580
Summary: iptables-restore and iptables-save lack comparison of a
saved ruleset against the currently deployed rules
Product: iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P1
2003 Feb 08
0
[Bug 45] Feature: only count packets that get matched in a chain
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=45
laforge@netfilter.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |WONTFIX
------- Additional Comments From
2013 Jul 09
0
[Bug 616] Duplicate rules for multi-homed hostnames. IPv4 and IPv6 inconsistent treatment.
https://bugzilla.netfilter.org/show_bug.cgi?id=616
--- Comment #7 from - <kd6lvw at yahoo.com> 2013-07-09 09:35:30 CEST ---
Re: Comment #6 - It is up to the author of the ruleset to determine policy. It
is the duty of the software to properly execute that policy. Here, the
software fails to do so because it produces duplicate redundant rules which are
never used.
Note that iptables-save
2018 Dec 14
1
[Bug 1309] New: Error: Hostname resolves to multiple addresses
https://bugzilla.netfilter.org/show_bug.cgi?id=1309
Bug ID: 1309
Summary: Error: Hostname resolves to multiple addresses
Product: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
Assignee: pablo at
2003 Feb 06
0
[Bug 44] ip_conntrak_ftp / ip_nat_ftp enhancements
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=44
laforge@netfilter.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |WONTFIX
------- Additional Comments From
2013 Jul 09
0
[Bug 616] Duplicate rules for multi-homed hostnames. IPv4 and IPv6 inconsistent treatment.
https://bugzilla.netfilter.org/show_bug.cgi?id=616
--- Comment #8 from Phil Oester <netfilter at linuxace.com> 2013-07-09 15:56:45 CEST ---
(In reply to comment #7)
> It is the duty of the software to properly execute that policy. Here, the
> software fails to do so because it produces duplicate redundant rules which are
> never used.
And where is it documented that the software
2017 Mar 14
4
[Bug 1130] New: Better handling DNS names in nft ruleset
https://bugzilla.netfilter.org/show_bug.cgi?id=1130
Bug ID: 1130
Summary: Better handling DNS names in nft ruleset
Product: nftables
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
2003 Apr 19
4
[Bug 82] iptables doesn't compile if no optimization flags are set
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=82
laforge@netfilter.org changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |rusty@netfilter.org
Severity|normal |minor
Status|NEW
2003 Mar 20
6
[Bug 68] Kernel panic
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=68
------- Additional Comments From laforge@netfilter.org 2003-03-20 10:55 -------
This looks strange.
The BUG in slab.c tells us that there is a GFP_ATOMIC missing. This means that
we are allocating kernel memory from softirq context with only GFP_KERNEL.
If I understand your backtrace correctly, what happens is:
- you are
2003 Apr 30
1
[Bug 53] Feature request - Basic Denial of Service feature
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=53
laforge@netfilter.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |LATER
------- Additional Comments From
2004 Jun 16
0
[ANNOUNCE] Release of iptables-1.2.10
--3Y2Mr1SP1gWKl0+e
Content-Type: multipart/mixed; boundary="j9XQ5cF5hebrmXqw"
Content-Disposition: inline
--j9XQ5cF5hebrmXqw
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Hi!
The netfilter coreteam proudly presents:
iptables version 1.2.10
1.2.10 is (like most other 1.2.x releases) a maintainance release,
2016 Aug 17
6
[Bug 1082] New: Hard lockup when inserting nft rules (esp. ct rule)
https://bugzilla.netfilter.org/show_bug.cgi?id=1082
Bug ID: 1082
Summary: Hard lockup when inserting nft rules (esp. ct rule)
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: blocker
Priority: P5
Component: kernel
Assignee:
2024 Jul 13
2
[Bug 1758] New: Design flaw in chain traversal
https://bugzilla.netfilter.org/show_bug.cgi?id=1758
Bug ID: 1758
Summary: Design flaw in chain traversal
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Ubuntu
Status: NEW
Severity: major
Priority: P5
Component: kernel
Assignee: pablo at netfilter.org
2013 Aug 27
0
[Bug 514] Making DNAT --to-destination resolve service named of port
https://bugzilla.netfilter.org/show_bug.cgi?id=514
Phil Oester <netfilter at linuxace.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
AssignedTo|laforge at netfilter.org |netfilter-buglog at lists.netf
| |ilter.org
--
Configure
2006 Sep 19
0
[Bug 514] New: Making DNAT --to-destination resolve service named of port
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=514
Summary: Making DNAT --to-destination resolve service named of
port
Product: netfilter/iptables
Version: linux-2.6.x
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: ip_tables (kernel)
2013 Jun 24
0
[Bug 580] iptables-restore and iptables-save lack comparison of a saved ruleset against the currently deployed rules
https://bugzilla.netfilter.org/show_bug.cgi?id=580
Phil Oester <netfilter at linuxace.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
CC| |netfilter at linuxace.com
Resolution|
2014 Dec 16
0
[ANNOUNCE] nftables 0.4 release
Hi!
The Netfilter project proudly presents:
nftables 0.4
This release contains a lot of bug fixes and new features contained up
to the recent 3.18 kernel release (and some features coming up in the
yet unreleased 3.19-rc).
New features
============
* Add support for global ruleset operations (available since 3.18).
Get rid of all tables, chains, and rules in one go:
# nft