Displaying 20 results from an estimated 10000 matches similar to: "Your Bugzilla bug list needs attention."
2012 Dec 17
31
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.]
You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require
attention.
All of these bugs are in the NEW or REOPENED state, and have not been
touched in 7 days or more.
You need to take a look at them, and decide on an initial action.
Generally, this means one of three things:
(1) You
2013 Jan 18
30
Your Bugzilla bug list needs attention.
[This e-mail has been automatically generated.]
You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require
attention.
All of these bugs are in the NEW or REOPENED state, and have not been
touched in 7 days or more.
You need to take a look at them, and decide on an initial action.
Generally, this means one of three things:
(1) You
2011 Apr 22
2
[Bug 715] New: nfq_nfnlh() and nfq_fd() should have const arguments
http://bugzilla.netfilter.org/show_bug.cgi?id=715
Summary: nfq_nfnlh() and nfq_fd() should have const arguments
Product: libnetfilter_queue
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P5
Component: libnetfilter_queue
AssignedTo: netfilter-buglog
2011 Sep 13
1
[Bug 748] New: Range check for ulog-cprange is wrong
http://bugzilla.netfilter.org/show_bug.cgi?id=748
Summary: Range check for ulog-cprange is wrong
Product: iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P5
Component: iptables
AssignedTo: netfilter-buglog at lists.netfilter.org
ReportedBy:
2012 Aug 21
3
[Bug 800] New: sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook
http://bugzilla.netfilter.org/show_bug.cgi?id=800
Summary: sk_buff.transport_header set incorrectly for
NF_IP_PRE_ROUTING hook
Product: netfilter/iptables
Version: linux-2.6.x
Platform: x86_64
OS/Version: Ubuntu
Status: NEW
Severity: normal
Priority: P5
Component: netfilter hooks
2011 Sep 30
1
[Bug 752] New: ipq_read() will return an error (rc = -1) and the error message says "Received truncated message"
http://bugzilla.netfilter.org/show_bug.cgi?id=752
Summary: ipq_read() will return an error (rc = -1) and the error
message says "Received truncated message"
Product: iptables
Version: 1.3.5
Platform: i386
OS/Version: RedHat Linux
Status: NEW
Severity: critical
Priority: P1
2013 May 23
1
[Bug 701] PPPoE masqeuraded connection reset when talking to Amazon S3
https://bugzilla.netfilter.org/show_bug.cgi?id=701
Phil Oester <netfilter at linuxace.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
CC| |netfilter at linuxace.com
Resolution|
2011 Oct 26
1
[Bug 760] New: nf_ct_sip dropping SIP messages larger then MTU
http://bugzilla.netfilter.org/show_bug.cgi?id=760
Summary: nf_ct_sip dropping SIP messages larger then MTU
Product: netfilter/iptables
Version: linux-2.6.x
Platform: i386
OS/Version: Ubuntu
Status: NEW
Severity: normal
Priority: P5
Component: ip_conntrack
AssignedTo: netfilter-buglog at
2007 Apr 17
6
[Bug 554] Packet illegaly bypassing SNAT
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=554
------- Additional Comments From fhagur@gmail.com 2007-04-17 05:04 MET -------
I have been wondering about this bug and had similar problems myself here in my
Debian system, linux-kernel 2.6.18 iptables 1.3.6.
I too saw that some packets became transmitted illegally through the ppp0
interface, when they just shoudn't.
What I
2006 Aug 03
28
[Bug 498] RTP packets are not hitting NAT table
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=498
cfilin@intermedia.net changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |chip@innovates.com
--
Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email
------- You are
2020 Feb 27
9
[Bug 1410] New: STATELESS, rules with notrack into a map
https://bugzilla.netfilter.org/show_bug.cgi?id=1410
Bug ID: 1410
Summary: STATELESS, rules with notrack into a map
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
Assignee: pablo at
2014 Jun 20
3
[Bug 963] New: nfq_udp_get_payload and nfq_udp_get_payload_len return wrong results
https://bugzilla.netfilter.org/show_bug.cgi?id=963
Summary: nfq_udp_get_payload and nfq_udp_get_payload_len return
wrong results
Product: libnetfilter_queue
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P5
Component: libnetfilter_queue
2013 Sep 11
8
[Bug 851] New: IPv6 SNAT target with --random doesn't work
https://bugzilla.netfilter.org/show_bug.cgi?id=851
Summary: IPv6 SNAT target with --random doesn't work
Product: netfilter/iptables
Version: unspecified
Platform: x86_64
OS/Version: All
Status: NEW
Severity: normal
Priority: P5
Component: NAT
AssignedTo: netfilter-buglog at lists.netfilter.org
2011 Aug 31
1
[Bug 743] New: Errors in compiling nfqnl_test.c
http://bugzilla.netfilter.org/show_bug.cgi?id=743
Summary: Errors in compiling nfqnl_test.c
Product: netfilter/iptables
Version: linux-2.6.x
Platform: All
OS/Version: Ubuntu
Status: NEW
Severity: enhancement
Priority: P5
Component: netfilter hooks
AssignedTo: netfilter-buglog at lists.netfilter.org
2007 Mar 15
5
[Bug 554] Packet illegaly bypassing SNAT
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=554
------- Additional Comments From kaber@trash.net 2007-03-15 02:53 MET -------
Most likely these packets are considered invalid by connection tracking and
therefore not handled by NAT. Try this:
iptables -t mangle -A POSTROUTING -m state --state INVALID -j DROP
--
Configure bugmail:
2014 May 07
1
[Bug 921] New: log, ulog and nflog: command-line parameters are not supported
https://bugzilla.netfilter.org/show_bug.cgi?id=921
Summary: log, ulog and nflog: command-line parameters are not
supported
Product: nftables
Version: unspecified
Platform: x86_64
OS/Version: All
Status: NEW
Severity: normal
Priority: P5
Component: nft
AssignedTo: pablo at
2018 May 03
5
[Bug 1255] New: nftables SNAT is not working
https://bugzilla.netfilter.org/show_bug.cgi?id=1255
Bug ID: 1255
Summary: nftables SNAT is not working
Product: nftables
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: critical
Priority: P5
Component: kernel
Assignee: pablo at netfilter.org
2012 Apr 25
1
forwarding packets to service in same host without using loopback network
This question is not about linux usage. But still i think user list
is a good crowd for linux programmer. So here it goes.
I have this libnetfilter_queue application which receives packets from
kernel based on some iptables rule. Before going straight to my
problem, i'm giving a sample workable code and other tools to set up a
test environment so that We problem definition and possible
2004 Oct 06
4
SNAT is less expensive than MASQ
hi,
in the masq file''s documentation, there is a sentence:
"If you have a static IP on that interface, listing it here makes
processing of output packets a little less expensive for the firewall."
this realy means that SNAT to the primary address is less expensive than
a MASQ rules in the netfilter? is this documented anywhere in
iptables/netfilter?
thanks.
--
Levente
2004 Nov 05
8
Using Shorewall + Linux Virtual Server LVS/DR
I''m havign a HUGE amount of difficulty getting shoreline to work with LVS.
We use it here constantly so we know it works. The problem is packets come
in, get directed to a webserver, webserver returns the packet to firewall,
and then it goes into a black hole. rp_filter is off globally on all
interfaces. LVS seems to be working right....
I use shorewall tcrules to mark packets on