Displaying 20 results from an estimated 120 matches similar to: "Brute Force Detection + Advanced Firewall Policy"
2004 Jul 15
3
slight simplification to firewall log_rule_limit code
I think you can change the existing firewall logging code for
log_rule_limit (where you have one case for for LOGRULENUMBERS and
another almost identical case without) down to this slightly shorter
version with no duplication (excerpt):
if [ -n "$LOGRULENUMBERS" ]; then
eval rulenum=\$${chain}_logrules
[ -z "$rulenum" ] && rulenum=1
fi
case
2004 Feb 10
22
Re: [Shorewall-newbies] specific log-prefix ... patch
Let''s move this to the Shorewall Development list....
On Tuesday 10 February 2004 03:14 pm, xavier wrote:
> here is a patch to allow this :
> |ACCEPT<10/sec:20>:debug fw lan:$ntp_servers udp 123 - - - - ntp
>
> a problem with the patch is that now the logprefix is mandatory.
> i''m trying to debug it, but i can''t find the flaw.
Also, with
2006 Sep 20
16
Multiple ISP Issues
Hi all,
I am having an issue with a multiple ISP setup. I have followed the
docs online and I think I have everything setup correctly but I can
get the desired traffice to go out my secondary ISP.
A quick run down on what I am trying to acomplish. I want to send all
sip/iax traffic out one ISP in the net zone and then send all other
traffic out my secondary ISP in the dsl zone.
Attached is
2005 Oct 06
4
Problems with ipp2p
Hello every body:
I have RedHat fedora core 2 machine, using iptables and squid. I am having a
lot of problems with peer2peer traffic. (bittorrent, kazaa, etc.) so I have
installed ipp2p from rpm.
Every thing was ok until I use iptables rules. I get this error.
[root@router iptables]# iptables -A INPUT -p tcp -m ipp2p --ipp2p -j DROP
iptables: No chain/target/match by that name
sames
2003 Oct 08
2
Problem with /bin/ash
I have /bin/ash from rh8 installation and I have following error when I
tried to change using ash instead of sh with shorewall-1.4.7:
+ eval options=$tap0_options
+ options=
+ list_search newnotsyn
+ local e=newnotsyn
+ [ 1 -gt 1 ]
+ return 1
+ run_user_exit newnotsyn
+ find_file newnotsyn
+ [ -n -a -f /newnotsyn ]
+ echo /etc/shorewall/newnotsyn
+ local user_exit=/etc/shorewall/newnotsyn
+ [
2015 Jul 08
7
[LLVMdev] LLVM loop vectorizer
Hello.
I am trying to vectorize a CSR SpMV (sparse matrix vector multiplication) procedure
but the LLVM loop vectorizer is not able to handle such code.
I am using cland and llvm version 3.4 (on Ubuntu 12.10). I use the -fvectorize option
with clang and -loop-vectorize with opt-3.4 .
The CSR SpMV function is inspired from
2013 Oct 18
1
[Bug 861] New: Repeated arguments with known final state
https://bugzilla.netfilter.org/show_bug.cgi?id=861
Summary: Repeated arguments with known final state
Product: iptables
Version: 1.4.x
Platform: arm
OS/Version: other
Status: NEW
Severity: minor
Priority: P5
Component: iptables
AssignedTo: netfilter-buglog at lists.netfilter.org
ReportedBy:
2006 Sep 05
1
Reserve and biobase
Hi
I am using Rserve for R2.3.1.
every time after I load Biobase library, a new Graphics window frame pops up. Could any onw know how can avoid it.
Best
Saeede
class testReserve {
public static void main(String[] args) {
RServeConnection rsCon = null;
Rconnection c = null;
Process proc = null;
try {
Runtime rt = Runtime.getRuntime();
proc
2007 Mar 14
6
ipp2p problems
Hello list,
I''m newbie in this list. Well, i''m going crazy with ipp2p.
Googling i find a mini-howto but i''ve got problems.
1) Download:
* iptables-dev (apt-get)
* kernel-headers-2.x.x (your kernel, "uname -r")
* src of your iptables (iptables -V and apt-get source)
* ipp2p-0.8.0.tar.gz (stable)
2) untar ipp2p and cd ipp2p
3) Edit Makefile, if it''s
2016 Feb 18
3
[LLVMdev] LLVM loop vectorizer
Hi Alex,
I'm not aware of efforts on loop coalescing in LLVM, but probably polly can do something like this. Also, one related thought: it might be worth making it a separate pass, not a part of loop vectorizer. LLVM already has several 'utility' passes (e.g. loop rotation), which primarily aims at enabling other passes.
Thanks,
Michael
> On Feb 15, 2016, at 6:44 AM, RCU
2016 Jun 04
4
[LLVMdev] LLVM loop vectorizer
Hi Alex,
I think the changes you want are actually not vectorizer related. Vectorizer just uses data provided by other passes.
What you probably might want is to look into routine Loop::getStartLoc() (see lib/Analysis/LoopInfo.cpp). If you find a way to improve it, patches are welcome:)
Thanks,
Michael
> On Jun 3, 2016, at 6:13 PM, Alex Susu <alex.e.susu at gmail.com> wrote:
>
2005 May 25
5
Patch to fix dynamic add/delete to zone functinality
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I''m running systems with openswan and modified _updown script supporting
shorewall dynamic hosts. Because on problems with cvs head version of
openswan I found a error from shorewall dynamic hosts support. When host
is already in zone shorewall aborts adding process with error. This is
not good thing(tm).
I found out that deleting host from
2016 Jun 07
2
[LLVMdev] LLVM loop vectorizer
Hi Alex,
This has been very recently fixed by Hal. See http://reviews.llvm.org/rL270771
Adam
> On Jun 4, 2016, at 3:13 AM, Alex Susu via llvm-dev <llvm-dev at lists.llvm.org> wrote:
>
> Hello.
> Mikhail, I come back to this older thread.
> I need to do a few changes to LoopVectorize.cpp.
>
> One of them is related to figuring out the exact C source line
2011 Oct 29
4
[LLVMdev] [llvm-commits] [PATCH] BasicBlock Autovectorization Pass
Ralf, et al.,
Attached is the latest version of my autovectorization patch. llvmdev
has been CC'd (as had been suggested to me); this e-mail contains
additional benchmark results.
First, these are preliminary results because I did not do the things
necessary to make them real (explicitly quiet the machine, bind the
processes to one cpu, etc.). But they should be good enough for
discussion.
2004 Jul 15
0
long rule action names with logging cause iptables errors
This rule with a long name and logging:
AllowInternetPrintingProtocol:debug
causes this iptables error:
Processing /etc/shorewall/rules...
Rule "AllowSSH:info net fw" added.
Rule "AllowPing:info net fw" added.
Rule "AllowWeb:debug net fw" added.
iptables v1.2.9: Maximum prefix length 29 for --log-prefix
Try `iptables
2003 Oct 02
8
upgrading 4.0 to stable
I'm still kind of hung up looking for some definitive answers on this issue.
Perhaps you guys can help me out?
Frank
Date: Mon, 29 Sep 2003 17:55:33 -0500 (CDT)
From: "F. Even" <freebsdlists@elitists.org>
Subject: re: upgrading 4.0 to stable
To: freebsd-questions@freebsd.org
Message-ID: <20030929225533.81D352FE@elitists.org>
Content-Type: text/plain; charset=iso-8859-1
2011 Oct 29
0
[LLVMdev] [llvm-commits] [PATCH] BasicBlock Autovectorization Pass
On Sat, 2011-10-29 at 12:30 -0500, Hal Finkel wrote:
> Ralf, et al.,
>
> Attached is the latest version of my autovectorization patch. llvmdev
> has been CC'd (as had been suggested to me); this e-mail contains
> additional benchmark results.
>
> First, these are preliminary results because I did not do the things
> necessary to make them real (explicitly quiet the
2015 Dec 18
0
[ANNOUNCE] iptables 1.6.0 release
Hi!
The Netfilter project proudly presents:
iptables 1.6.0
This release includes accumulated fixes and enhancements for the
following matches:
* ah
* connlabel
* cgroup
* devgroup
* dst
* icmp6
* ipcomp
* ipv6header
* quota
* set
* socket
* string
and targets:
* CT
* REJECT
* SET
* SNAT
* SNPT,DNPT
* SYNPROXY
* TEE
We also got rid of the very very old MIRROR and SAME targets and the
2004 Dec 08
9
Kernel/iptables question
As suggested here:
http://lists.shorewall.net/pipermail/shorewall-users/2004-October/015097.html
I''ve run:
adam@shrike:~$ /sbin/iptables -m policy --help
iptables v1.2.11
Usage: iptables -[AD] chain rule-specification [options]
iptables -[RI] chain rulenum rule-specification [options]
iptables -D chain rulenum [options]
--snip--
And:
adam@shrike:~$ sudo
2009 Feb 18
1
[Bug 578] New: Inserting Rule requires rulename as first argument (instead of the rulenumber)
http://bugzilla.netfilter.org/show_bug.cgi?id=578
Summary: Inserting Rule requires rulename as first argument
(instead of the rulenumber)
Product: iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: trivial
Priority: P1
Component: iptables