similar to: [Bug 730] New: DHCP request (and other?) traffic bypasses iptables/netfilter

Displaying 20 results from an estimated 10000 matches similar to: "[Bug 730] New: DHCP request (and other?) traffic bypasses iptables/netfilter"

2013 Jun 10
0
[Bug 599] netfilter/iptables leaking traffic when long chains are defined
https://bugzilla.netfilter.org/show_bug.cgi?id=599 Phil Oester <netfilter at linuxace.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution| |WORKSFORME --- Comment #5 from Phil Oester
2006 Dec 20
3
Disable netfilter for bridged traffic
Hi All, Can anybody suggests how can I disable netfilter for bridged traffic in linux-2.4.27 kernel ? Thanks and Regards, Senthil
2020 Feb 16
3
[Bug 1407] New: Segfault with iptables-nft-restore when flush rules included
https://bugzilla.netfilter.org/show_bug.cgi?id=1407 Bug ID: 1407 Summary: Segfault with iptables-nft-restore when flush rules included Product: nftables Version: unspecified Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: normal Priority: P5 Component:
2019 Feb 05
3
[Bug 1320] New: iptables hashlimit - problem with traffic limitation
https://bugzilla.netfilter.org/show_bug.cgi?id=1320 Bug ID: 1320 Summary: iptables hashlimit - problem with traffic limitation Product: iptables Version: 1.6.x Hardware: All OS: Debian GNU/Linux Status: NEW Severity: major Priority: P5 Component: iptables Assignee:
2020 Jan 21
5
[Bug 1400] New: "COMMIT expected at line ..." when iptables-restore 1.8.4 (nft) parses stdin with empty lines
https://bugzilla.netfilter.org/show_bug.cgi?id=1400 Bug ID: 1400 Summary: "COMMIT expected at line ..." when iptables-restore 1.8.4 (nft) parses stdin with empty lines Product: iptables Version: unspecified Hardware: x86_64 URL: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=9495
2020 Apr 19
1
Netfilter fails to filter traffic from a netblock?
On Sun, Apr 19, 2020 at 9:40 AM Mike <1100100 at gmail.com> wrote: > > Thought it might also be helpful to confirm that firewalld is not > interfering in any way. > > what is the output of ~$# systemctl status firewalld Thanks Mike. # systemctl status firewalld Unit firewalld.service could not be found. Jeff
2020 Jan 06
2
[Bug 1394] New: "Bad argument `ACCEPT'" when iptables-restore (nft) parses stdin
https://bugzilla.netfilter.org/show_bug.cgi?id=1394 Bug ID: 1394 Summary: "Bad argument `ACCEPT'" when iptables-restore (nft) parses stdin Product: iptables Version: unspecified Hardware: x86_64 URL: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=9462 89
2008 Nov 06
2
iptables starts blocking outbound http traffic
Hello: I have a machine running CentOS 5 x86_64. It is running apache httpd and tomcat. For some reason, after running for a few days, web requests stop responding. It happened again this morning. I check the syslog and see a HUGE number of logs like this: OUTPUT IN= OUT=eth0 SRC=[MyIP] DST=[OutsideIP] LEN=532 TOS=0x00 PREC=0x00 TTL=64 ID=52669 DF PROTO=TCP SPT=80 DPT=54697 WINDOW=61
2008 Jan 12
2
Factor Analysis
Good Morning, Is it possible to use the R program for a CFA with dichotomous data? Thank you, Kathleen Kathleen Kemp, M.A. Doctoral Clinical Psychology Student, Concentration: Forensic Psychology Drexel University Philadelphia, PA 19104 kk354@drexel.edu [[alternative HTML version deleted]]
2006 Nov 08
1
Running iptables/netfilter module connlimit with stock CentOS4
Greetings folks, I've been researching the various iptables modules that are included with the stock CentOS4 distro; particularly the connlimit module. Is connlimit included by default? I thought it is since performing # iptables -m connlimit --help returns information on connlimit usage along with the general iptables help info: <SNIP> connlimit v1.2.11 options: [!]
2008 Apr 21
2
How to do survival analysis with time-related IVs?
Hello folks, I am wondering how to do survival analysis with time-related IVs in R. For example, > > If we have time-related variables, such as the Overall Condition of 1990, 1991 etc., how can we include these variables in coxph model? > > > > If we can not use coxph model, do we need to rearrange the dataset to make it something like: > > ID time age
2009 Dec 30
1
Bug query (PR#14173)
I'm seeing a probable error in the way R boot.ci calculates certain confidence intervals. Not sure where to submit it. Should this go to the package maintainer? If so, how would I identify that person? =20 Thanks...Ed =20 Ed J. Gracely, Ph.D. Drexel University College of Medicine & Drexel University School of Public Health Mail to: Family, Community, and Preventive Medicine Drexel
2005 Oct 20
3
IPP2P version 0.8.0 released
Hi, The new version ipp2p 0.8.0 is released. Klaus -- www.ipp2p.com
2012 Jan 14
0
iptable rule for bypassing netfilter queue for a matching address.‏
I have two iptable rules for userspace modification : iptable -t mangle -A PREROUTING -p udp --dport 9090 -j NFQUEUE iptable -t mangle -A OUTPUT -p udp --sport 9090 -j NFQUEUE I have the following network setup: client ---------------->Linux Box or router--------------------->server. What i'm trying to achieve is modifying all packets which comes from client to 9090 port of the
2019 Dec 01
0
[Bug 1384] New: memory leaks when netfilter is used to filter network traffic
https://bugzilla.netfilter.org/show_bug.cgi?id=1384 Bug ID: 1384 Summary: memory leaks when netfilter is used to filter network traffic Product: netfilter/iptables Version: unspecified Hardware: mips OS: other Status: NEW Severity: major Priority: P5 Component:
2002 Jun 20
0
[ANNOUNCE] netfilter/iptables Anonymous CVS has been moved
--88ivsf4xsnd8HFHJ Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hi! The anonymous CVS repository for the netfilter/iptables project has been moved. Please don't use the old (pserver.samba.org) repository anymore, since it is no longer updated and will run out of date very soon. The new location for accessing the
2003 Jan 07
0
[ANNOUNCE] New netfilter/iptables patch-o-matic release
--KMIs29sPfC/9Gbii Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Good news, Everyone! (TM) The netfilter core team announces a new release of the netfilter patch-o-matic suite: patch-o-matic-20030107 This release contains the most up-to-date bugfixes and new features for=20 the netfilter/iptables subsystem of the 2.4.x Linux
2003 Oct 01
0
[ANNOUNCE] New netfilter/iptables patch-o-matic release
--BU7+kJFeeDlNltZg Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Good news, Everyone! (TM) The netfilter core team announces a new release of the netfilter patch-o-matic suite: patch-o-matic-20030912 This release contains the most up-to-date bugfixes and new features for=20 the netfilter/iptables subsystem of the 2.4.x Linux
2004 Jan 13
0
New netfilter/iptables homepage
--h1wVxq8aeHrvhZJz Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hi! I've just put the new (3rd incarnation) of the netfilter/iptables homepage online.=20 The changes shouldn't be too visible to the user, as everything is hidden behind the same layout as the old homepage. =20 However, the whole page is now built from
2006 May 23
0
Netfilter/Iptables does not NAT all packets?
Hi all, I am having a small problem with netfilter on Linux kernel 2.6.11.4. It seems not all packets are hitting the pre-routing chain. In pre-routing, I have the following rules: $IPTABLES -t nat -A PREROUTING -i $IF_OUT -d 10.50.18.22 -j DNAT --to-destination 192.168.1.22 $IPTABLES -t nat -A PREROUTING -i $IF_OUT -d ! 10.50.18.21 -m limit --limit 5/second -j LOG --log-prefix