Displaying 20 results from an estimated 10000 matches similar to: "[Bug 730] New: DHCP request (and other?) traffic bypasses iptables/netfilter"
2013 Jun 10
0
[Bug 599] netfilter/iptables leaking traffic when long chains are defined
https://bugzilla.netfilter.org/show_bug.cgi?id=599
Phil Oester <netfilter at linuxace.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |WORKSFORME
--- Comment #5 from Phil Oester
2006 Dec 20
3
Disable netfilter for bridged traffic
Hi All,
Can anybody suggests how can I disable netfilter for bridged traffic in
linux-2.4.27 kernel ?
Thanks and Regards,
Senthil
2020 Feb 16
3
[Bug 1407] New: Segfault with iptables-nft-restore when flush rules included
https://bugzilla.netfilter.org/show_bug.cgi?id=1407
Bug ID: 1407
Summary: Segfault with iptables-nft-restore when flush rules
included
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
Component:
2019 Feb 05
3
[Bug 1320] New: iptables hashlimit - problem with traffic limitation
https://bugzilla.netfilter.org/show_bug.cgi?id=1320
Bug ID: 1320
Summary: iptables hashlimit - problem with traffic limitation
Product: iptables
Version: 1.6.x
Hardware: All
OS: Debian GNU/Linux
Status: NEW
Severity: major
Priority: P5
Component: iptables
Assignee:
2020 Jan 21
5
[Bug 1400] New: "COMMIT expected at line ..." when iptables-restore 1.8.4 (nft) parses stdin with empty lines
https://bugzilla.netfilter.org/show_bug.cgi?id=1400
Bug ID: 1400
Summary: "COMMIT expected at line ..." when iptables-restore
1.8.4 (nft) parses stdin with empty lines
Product: iptables
Version: unspecified
Hardware: x86_64
URL: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=9495
2020 Apr 19
1
Netfilter fails to filter traffic from a netblock?
On Sun, Apr 19, 2020 at 9:40 AM Mike <1100100 at gmail.com> wrote:
>
> Thought it might also be helpful to confirm that firewalld is not
> interfering in any way.
>
> what is the output of ~$# systemctl status firewalld
Thanks Mike.
# systemctl status firewalld
Unit firewalld.service could not be found.
Jeff
2020 Jan 06
2
[Bug 1394] New: "Bad argument `ACCEPT'" when iptables-restore (nft) parses stdin
https://bugzilla.netfilter.org/show_bug.cgi?id=1394
Bug ID: 1394
Summary: "Bad argument `ACCEPT'" when iptables-restore (nft)
parses stdin
Product: iptables
Version: unspecified
Hardware: x86_64
URL: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=9462
89
2008 Nov 06
2
iptables starts blocking outbound http traffic
Hello:
I have a machine running CentOS 5 x86_64.
It is running apache httpd and tomcat.
For some reason, after running for a few days,
web requests stop responding. It happened again
this morning. I check the syslog and see a HUGE
number of logs like this:
OUTPUT IN= OUT=eth0 SRC=[MyIP] DST=[OutsideIP] LEN=532 TOS=0x00 PREC=0x00
TTL=64 ID=52669 DF PROTO=TCP SPT=80 DPT=54697 WINDOW=61
2008 Jan 12
2
Factor Analysis
Good Morning,
Is it possible to use the R program for a CFA with dichotomous data?
Thank you,
Kathleen
Kathleen Kemp, M.A.
Doctoral Clinical Psychology Student,
Concentration: Forensic Psychology
Drexel University
Philadelphia, PA 19104
kk354@drexel.edu
[[alternative HTML version deleted]]
2006 Nov 08
1
Running iptables/netfilter module connlimit with stock CentOS4
Greetings folks,
I've been researching the various iptables modules that are included
with the stock CentOS4 distro; particularly the connlimit module.
Is connlimit included by default?
I thought it is since performing
# iptables -m connlimit --help
returns information on connlimit usage along with the general iptables
help info:
<SNIP>
connlimit v1.2.11 options:
[!]
2008 Apr 21
2
How to do survival analysis with time-related IVs?
Hello folks,
I am wondering how to do survival analysis with time-related IVs in R. For
example,
> > If we have time-related variables, such as the Overall Condition of
1990, 1991 etc., how can we include these variables in coxph model?
> >
> > If we can not use coxph model, do we need to rearrange the dataset to
make it something like:
> > ID time age
2009 Dec 30
1
Bug query (PR#14173)
I'm seeing a probable error in the way R boot.ci calculates certain
confidence intervals. Not sure where to submit it. Should this go to the
package maintainer? If so, how would I identify that person?
=20
Thanks...Ed
=20
Ed J. Gracely, Ph.D.
Drexel University College of Medicine &
Drexel University School of Public Health
Mail to:
Family, Community, and Preventive Medicine
Drexel
2005 Oct 20
3
IPP2P version 0.8.0 released
Hi,
The new version ipp2p 0.8.0 is released.
Klaus
--
www.ipp2p.com
2012 Jan 14
0
iptable rule for bypassing netfilter queue for a matching address.
I have two iptable rules for userspace modification :
iptable -t mangle -A PREROUTING -p udp --dport 9090 -j NFQUEUE
iptable -t mangle -A OUTPUT -p udp --sport 9090 -j NFQUEUE
I have the following network setup:
client ---------------->Linux Box or router--------------------->server. What i'm trying to achieve is modifying all packets which comes from client to 9090 port of the
2019 Dec 01
0
[Bug 1384] New: memory leaks when netfilter is used to filter network traffic
https://bugzilla.netfilter.org/show_bug.cgi?id=1384
Bug ID: 1384
Summary: memory leaks when netfilter is used to filter network
traffic
Product: netfilter/iptables
Version: unspecified
Hardware: mips
OS: other
Status: NEW
Severity: major
Priority: P5
Component:
2002 Jun 20
0
[ANNOUNCE] netfilter/iptables Anonymous CVS has been moved
--88ivsf4xsnd8HFHJ
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Hi!
The anonymous CVS repository for the netfilter/iptables project has been
moved.
Please don't use the old (pserver.samba.org) repository anymore, since it
is no longer updated and will run out of date very soon.
The new location for accessing the
2003 Jan 07
0
[ANNOUNCE] New netfilter/iptables patch-o-matic release
--KMIs29sPfC/9Gbii
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Good news, Everyone! (TM)
The netfilter core team announces a new release of the netfilter
patch-o-matic suite:
patch-o-matic-20030107
This release contains the most up-to-date bugfixes and new features for=20
the netfilter/iptables subsystem of the 2.4.x Linux
2003 Oct 01
0
[ANNOUNCE] New netfilter/iptables patch-o-matic release
--BU7+kJFeeDlNltZg
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Good news, Everyone! (TM)
The netfilter core team announces a new release of the netfilter
patch-o-matic suite:
patch-o-matic-20030912
This release contains the most up-to-date bugfixes and new features for=20
the netfilter/iptables subsystem of the 2.4.x Linux
2004 Jan 13
0
New netfilter/iptables homepage
--h1wVxq8aeHrvhZJz
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Hi!
I've just put the new (3rd incarnation) of the netfilter/iptables
homepage online.=20
The changes shouldn't be too visible to the user, as everything is
hidden behind the same layout as the old homepage. =20
However, the whole page is now built from
2006 May 23
0
Netfilter/Iptables does not NAT all packets?
Hi all,
I am having a small problem with netfilter on Linux kernel 2.6.11.4. It
seems not all packets are hitting the pre-routing chain. In
pre-routing, I have the following rules:
$IPTABLES -t nat -A PREROUTING -i $IF_OUT -d 10.50.18.22 -j DNAT
--to-destination 192.168.1.22
$IPTABLES -t nat -A PREROUTING -i $IF_OUT -d ! 10.50.18.21 -m limit
--limit 5/second -j LOG --log-prefix