similar to: [Bug 533] New: PANIC: divide by zero in xt_connbytes

Displaying 20 results from an estimated 800 matches similar to: "[Bug 533] New: PANIC: divide by zero in xt_connbytes"

2007 Jan 18
3
[Bug 533] PANIC: divide by zero in xt_connbytes
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=533 ------- Additional Comments From xkr47@outerspace.dyndns.org 2007-01-18 12:39 MET ------- Created an attachment (id=283) --> (https://bugzilla.netfilter.org/bugzilla/attachment.cgi?id=283&action=view) Suggested fix by me ------- Additional Comments From xkr47@outerspace.dyndns.org 2007-01-18 12:40 MET ------- Created an
2007 Jan 11
0
[Bug 531] New: ip_tables.h: IPT_TABLE_MAXNAMELEN bogously #defined to XT_FUNCTION_MAXNAMELEN
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=531 Summary: ip_tables.h: IPT_TABLE_MAXNAMELEN bogously #defined to XT_FUNCTION_MAXNAMELEN Product: netfilter/iptables Version: linux-2.6.x Platform: All OS/Version: All Status: NEW Severity: normal Priority: P2 Component:
2007 Jul 08
0
Troubles with tc/iptables - per TCP session tc
Hello, I have read most of the relevant emails already posted to the LARTC mailingilist and I have not found a solution to my problem. What I am trying to do is: limit the HTTP output traffic to 30Mbps and also to limit each HTTP connection at 512Kbps, if the client downloads more than 1MB. I have managed to limit the total traffic but not the traffic of each HTTP connection. Here it is my
2017 Oct 12
0
[ANNOUNCE] nftables 0.8 release
Hi! The Netfilter project proudly presents: nftables 0.8 This release contains new features available up to the (upcoming) Linux 4.14 kernel release: * Support for stateful objects, these objects are uniquely identified by a user-defined name, you can refer to them from rules, and there is a well established interface to operate with them, eg. # nft add counter filter test
2006 Feb 15
1
[Bug 450] New: connbytes not working
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=450 Summary: connbytes not working Product: iptables Version: 1.3.5 Platform: i386 OS/Version: All Status: NEW Severity: normal Priority: P2 Component: iptables AssignedTo: laforge@netfilter.org ReportedBy: vselico@vselico.sk When
2002 May 23
3
ConnBytes iptables match
Hi, as I promised in LARTC list I created patch for new connbytes match. It matches packets which bellongs to connection which transfered given range of bytes. For those interested it is at http://luxik.cdi.cz/~devik/connbytes/ It was originaly meant to be used with HTB or other qdisc to reclassify long download streams to lower prio class. devik
2015 Jun 25
5
[Bug 2417] New: SOCKS5 should respond with appropriate error reply in error situations
https://bugzilla.mindrot.org/show_bug.cgi?id=2417 Bug ID: 2417 Summary: SOCKS5 should respond with appropriate error reply in error situations Product: Portable OpenSSH Version: 6.8p1 Hardware: All OS: Linux Status: NEW Severity: enhancement Priority: P5 Component:
2004 Jul 07
1
connmark+connbytes
Hello! Maybe someone needs connmark and connbytes working together? See attached file compatible with pom-ng-20040621 (I called it connmarkbytes :)). Kind Regards, Tomasz Chilinski
2012 Aug 29
2
tcclasses matching on the TOS field
Hello, I am trying to set up traffic shaping/control for my voip connection. I am running 4.4.22.3. Here is my current configuration: --- tcdevices --- #NUMBER: IN-BANDWITH OUT-BANDWIDTH OPTIONS REDIRECTED #INTERFACE INTERFACES eth1 2048kbps 1500kbps -- tcclasses --- #INTERFACE:CLASS MARK RATE: CEIL PRIORITY OPTIONS # DMAX:UMAX eth1 1 100kbps
2012 Jun 13
3
Default Route disappear
Hi I have a default route to 192.168.1.1 as soon as I start shorewall the default route dissapear. What do I need to do to have it not disappear. Kind Regards My network setup /etc/network/interfaces: # The primary network interface auto eth0 iface eth0 inet static address 192.168.1.17 netmask 255.255.255.0 network 192.168.1.0 broadcast 192.168.1.255
2004 Jun 16
0
[ANNOUNCE] Release of iptables-1.2.10
--3Y2Mr1SP1gWKl0+e Content-Type: multipart/mixed; boundary="j9XQ5cF5hebrmXqw" Content-Disposition: inline --j9XQ5cF5hebrmXqw Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hi! The netfilter coreteam proudly presents: iptables version 1.2.10 1.2.10 is (like most other 1.2.x releases) a maintainance release,
2010 Jan 21
6
Shorewall 4.4.6 and Multiple ISP with 2 routed subnets
Hello, I have 2 ISP uplinks (zones: inet1 and inet2), each with a fixed IP on the outside and a routed subnet (/25 and /26) on the inside. So, behind the firewall i have 2 networksegments (lan1 and lan2) with public IP-addresses. The segments are completely isolated from eachother: hosts in zone "lan1" connect only to "inet1" and hosts in zone "lan2" only connect
2013 Dec 03
5
Multiple ISP + traffic shapping = poor download speed
Hello, Thanks for the great Shorewall which has replaced my hard to maintain home-made scripts. First, what works. Our local network is 10.48.X.X with multiple vlan, each on a dedicated interface. We use Shorewall 4.4.11 from Debian Squeeze. We have a 2 ISP: - isp1 : an optical fiber provider with 10 Mbps. - isp2 : a DSL provider with 15Mbits/1Mbits. We use isp2 as the default outgoing
2014 Jun 26
14
[Bug 2250] New: SOCKS5 should return "NO ACCEPTABLE METHODS" instead of nothing
https://bugzilla.mindrot.org/show_bug.cgi?id=2250 Bug ID: 2250 Summary: SOCKS5 should return "NO ACCEPTABLE METHODS" instead of nothing Product: Portable OpenSSH Version: -current Hardware: All OS: All Status: NEW Severity: enhancement Priority: P5
2003 Nov 03
1
Iptables connbytes
Hello, Is it possible to mark packets from particular IP and if it downloads over 100Kbytes, then it enters in CBQ shaper 32kbit/s for example ? My kernel is 2.4.22. If someone experimented with connection bytes patch please answer me. Regards, Todor Neshev _______________________________________________ LARTC mailing list / LARTC@mailman.ds9a.nl http://mailman.ds9a.nl/mailman/listinfo/lartc
2004 Oct 25
6
Limit traffic that use to download a file
Dear All, I want to limit traffic that use by my client to download files directly from browser, I have already limit the traffic for the same purpose to ftp connection. But I don''t want to limit traffic that using for browsing the web. Can I do this with IMQ/HTB or any other method to make this happen. Thank You. Sorry my English is bad. RInto Exandi
2003 Jun 04
0
[Bug 533] sshd failure on Tru64 (OSF/1) 5.1a
http://bugzilla.mindrot.org/show_bug.cgi?id=533 ------- Additional Comments From djm at mindrot.org 2003-06-04 23:35 ------- Could you try adding a "#define BROKEN_GETADDRINFO 1" to config.h and then doing a "make clean ; make" (don't rerun configure after adding the #define) Please tell us whether or not that helps? ------- You are receiving this mail because:
2017 May 19
4
[Bug 1149] New: xtables-eb.c:533: bad test ?
https://bugzilla.netfilter.org/show_bug.cgi?id=1149 Bug ID: 1149 Summary: xtables-eb.c:533: bad test ? Product: netfilter/iptables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: enhancement Priority: P5 Component: ip_tables (kernel) Assignee:
2003 Apr 04
5
[Bug 533] sshd failure on Tru64 (OSF/1) 5.1a
http://bugzilla.mindrot.org/show_bug.cgi?id=533 Summary: sshd failure on Tru64 (OSF/1) 5.1a Product: Portable OpenSSH Version: 3.6p1 Platform: Alpha OS/Version: OSF/1 Status: NEW Severity: critical Priority: P2 Component: sshd AssignedTo: openssh-unix-dev at mindrot.org ReportedBy:
2005 Oct 22
4
Differentiating between http downloads and interactive traffic
Hi, I''ve been wondering if anyone has thought of a way to differentiate between an established http download and interactive http traffic? I would like to give interactive http traffic priority over someone downloading large files. Has anyone any ideas how to detect packets that are part of a download like this? Thanks. _______________________________________________