similar to: ROUTE target broken under 2.6.18.3 kernel

Displaying 20 results from an estimated 1000 matches similar to: "ROUTE target broken under 2.6.18.3 kernel"

2006 Dec 11
21
iptables 1.3.7, kernel 2.6.19, ROUTE and Layer7 issues
Hi, I''m having problems with this configuration: iptables 1.3.7 (vanilla or repackaged for fc5) kernel 2.6.19 (vanilla) ROUTE 1.11 (last pom-ng) layer7-filter 2.6 (last in sf.net) connlimit (last pom-ng) When I try to use -j ROUTE in any chain in mangle table I have this error: [root@myhost ~]# iptables -v -t mangle -A POSTROUTING -p tcp --dport msnp -j ROUTE --gw
2006 Dec 14
0
Re: [RESOLVED] Layer7 module doesn''t detect nothing on my bridge with a 2.6.18.3 kernel
Hello, loading conntrack resolve my problem ... layer 7 have got a dependency with conntrack but doesn''t load it automaticaly... so module is loaded but no packets match with l7-protocols ... reported as a bug http://sourceforge.net/tracker/index.php?func=detail&aid=1596065&group_id=80085&atid=558668 regards ArcosCom Linux User a écrit : > With: >
2006 Dec 12
1
Layer7 module doesn''t detect nothing on my bridge with a 2.6.18.3 kernel
Hello I''ve setuped a QOS bridge under debian 3.1 using 2.6.18.3 kernel + iptables 1.3.6 I''ve patched the kernel an Iptables with esfq+layer7 without problems. This simple script doesn''t log nothing ... And I''m sure to have eMule traffic (I''ve checked with tcpdump ) If I remove " -m layer7 --l7proto edonkey \" line I can see
2006 May 07
5
Detecting p2p traffic
After varying degrees of success with p2p detection modules, I would like to write the following rules using iptables to reliably identify p2p traffic: 1. If a host on the network has 5 or more simutaneous tcp connections to ports above 1024, mark all connections to ports 1024 and above as 60. 2. If a host has received (or sent) UDP packets from 5 different hosts'' ports above 1024 in a
2006 Nov 08
1
Running iptables/netfilter module connlimit with stock CentOS4
Greetings folks, I've been researching the various iptables modules that are included with the stock CentOS4 distro; particularly the connlimit module. Is connlimit included by default? I thought it is since performing # iptables -m connlimit --help returns information on connlimit usage along with the general iptables help info: <SNIP> connlimit v1.2.11 options: [!]
2013 Oct 09
3
[Bug 857] New: ConnLimit unable to work properly
https://bugzilla.netfilter.org/show_bug.cgi?id=857 Summary: ConnLimit unable to work properly Product: iptables Version: 1.4.x Platform: All OS/Version: RedHat Linux Status: NEW Severity: critical Priority: P5 Component: iptables AssignedTo: netfilter-buglog at lists.netfilter.org
2006 Sep 21
0
layer7 http
hello, I try to use layer7 filter to classify packets. I have a proble with http match. This protocol seems to work well with l7-filter (http://l7-filter.sourceforge.net/protocols) but for me nothing is filtering in http class. Someone can help me ? Here is my script : #!/bin/bash IPT_BIN=/sbin/iptables TC_BIN=/sbin/tc INTER_OUT=ppp0 LINK_RATE_UP=1000Kbit RATE_ACK=200Kbit RATE_DEFAULT=100Kbit
2005 Aug 02
0
iptables -m layer7 - doesn''t work
I''ve compiled my kernel (2.6.12.3) and iptables (1.3.3) and now -m layer7 option from iptables works (i don''t get any error when run the iptables command with -m layer7). The problem is that no packet is matched. For example iptables -A INPUT -p tcp -m layer7 --l7proto http -j ACCEPT doesn''t match http packets. The same for dns and ssh. So, what am I doing wrong? Is this
2004 Oct 23
0
iptables and layer7
Hello! I want to mark all outgoing traffic depending on its service. Example: eth0 = 192.168.0.1 (local interface) ppp0 = 80.10.10.10 (internet 1) ppp1 = 80.10.10.11 (internet 2) http traffic over internet 1 (ppp0) ssh traffic to interface 2 (ppp1). I tried the following (routing and rules are set): iptables -A PREROUTING -t mangle -s 192.168.0.0/24 -p tcp --dport 80 -j MARK --set-mark 1
2008 Jan 24
0
CentOS 5.0 64bit - can't using ipt_connlimit module
# iptables -m connlimit --help ......... connlimit v1.3.5 options: [!] --connlimit-above n match if the number of existing tcp connections is (not) above n --connlimit-mask n group hosts using mask ----------------------------------------- The library seems to exist also: /lib64/iptables/libipt_connlimit.so However, creating a rule that uses connlimit fails: #$IPTABLES -A
2008 Jun 26
1
iptables connlimit
hi, i try use iptables connlimit, # iptables -I INPUT -p tcp --dport 80 -m connlimit --connlimit-above 16 --connlimit-mask 24 -j DROP iptables: Unknown error 4294967295 where is problem ? thanks # rpm -qa | grep iptables iptables-1.3.5-4.el5 # uname -a Linux test 2.6.18-92.1.1.el5 #1 SMP Sat Jun 21 19:04:27 EDT 2008 i686 i686 i386 GNU/Linux
2006 Sep 21
0
[Bug 515] New: connlimit filter doesn't work in 1.3.5 version of iptables
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=515 Summary: connlimit filter doesn't work in 1.3.5 version of iptables Product: iptables Version: 1.3.5 Platform: All OS/Version: Fedora Status: NEW Severity: normal Priority: P2 Component: libiptc AssignedTo:
2017 Dec 27
0
[Bug 1207] New: connlimit rule fires too often
https://bugzilla.netfilter.org/show_bug.cgi?id=1207 Bug ID: 1207 Summary: connlimit rule fires too often Product: netfilter/iptables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: enhancement Priority: P5 Component: ip_tables (kernel) Assignee:
2009 Nov 05
2
[Bug 618] New: connlimit doesn't work after upgrade to iptables 1.4.5
http://bugzilla.netfilter.org/show_bug.cgi?id=618 Summary: connlimit doesn't work after upgrade to iptables 1.4.5 Product: iptables Version: unspecified Platform: i386 OS/Version: All Status: NEW Severity: normal Priority: P1 Component: iptables AssignedTo: laforge at netfilter.org
2009 Dec 29
0
aMSN segfaults at login after configuring my home network
After configuring my home network, aMSN segfaults. I posted this issue originally in the aMSN forums under this thread: http://www.amsn-project.net/forums/viewtopic.php?t=7593 I was told that my issue is related to SAMBA, referring this thread: http://www.amsn-project.net/forums/viewtopic.php?t=6343 After uninstalling SAMBA, aMSN stops segfaulting and works as expected. After installing it
2009 Jun 07
2
[Bug 597] New: ip6tables connlimit - cannot set CIDR greater than 32 (includes fix)
http://bugzilla.netfilter.org/show_bug.cgi?id=597 Summary: ip6tables connlimit - cannot set CIDR greater than 32 (includes fix) Product: iptables Version: unspecified Platform: All OS/Version: All Status: NEW Severity: major Priority: P1 Component: ip6tables AssignedTo: laforge
2015 May 05
1
IPTABLES question
Would someone please explain to me the difference in effect between the following two IPTABLES conditions and the significance thereof in concurrent connection limiting? --tcp-flags SYN,ACK,FIN,RST SYN -j REJECT \ --connlimit-above 3 --connlimit-mask 32 --state NEW -j REJECT \ --connlimit-above 3 --connlimit-mask 32 -- *** e-Mail is NOT a SECURE channel *** Do
2006 May 16
0
[Bug 475] New: Incorrection in connlimit's man page
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=475 Summary: Incorrection in connlimit's man page Product: iptables Version: unspecified Platform: All URL: http://svn.netfilter.org/cgi- bin/viewcvs.cgi/trunk/iptables/extensions/libipt_connlim it.man?rev=3816&view=markup
2007 Sep 03
3
Classes do not receive any traffic ?
Hello everyone. CONFIGURATION DESCRIPTION: I have a linux box doing masquerade for two lan''s. Here is a piece of mine network config: eth0 : ISP , one public ip address (DSL modem) eth1 : lan , private network address fe: 192.168.4.0/24 eth2 : wlan access point performing as lan2wlan bridge , private network addes fe. 192.168.67.0/24 This box use 2.6.20 kernel with iptables-1.3.8
2006 Nov 12
1
Script for get bandwidth statistic from iptable
i search a lot forum how to get bandwidth statistic such number of packet, total byte in each application protocol by using IPTABLES + netfilter-layer7 but i don''t know which script for getting it in log file and use data after get it for plotting graph later my IPTABLES command like this iptables -t mangle -N all iptables -t mangle -A POSTROUTING -j all iptables -t mangle -A