Displaying 20 results from an estimated 1000 matches similar to: "ROUTE target broken under 2.6.18.3 kernel"
2006 Dec 11
21
iptables 1.3.7, kernel 2.6.19, ROUTE and Layer7 issues
Hi, I''m having problems with this configuration:
iptables 1.3.7 (vanilla or repackaged for fc5)
kernel 2.6.19 (vanilla)
ROUTE 1.11 (last pom-ng)
layer7-filter 2.6 (last in sf.net)
connlimit (last pom-ng)
When I try to use -j ROUTE in any chain in mangle table I have this error:
[root@myhost ~]# iptables -v -t mangle -A POSTROUTING -p tcp --dport msnp
-j ROUTE --gw
2006 Dec 14
0
Re: [RESOLVED] Layer7 module doesn''t detect nothing on my bridge with a 2.6.18.3 kernel
Hello,
loading conntrack resolve my problem ...
layer 7 have got a dependency with conntrack but doesn''t load it
automaticaly...
so module is loaded but no packets match with l7-protocols ...
reported as a bug
http://sourceforge.net/tracker/index.php?func=detail&aid=1596065&group_id=80085&atid=558668
regards
ArcosCom Linux User a écrit :
> With:
>
2006 Dec 12
1
Layer7 module doesn''t detect nothing on my bridge with a 2.6.18.3 kernel
Hello
I''ve setuped a QOS bridge under debian 3.1 using 2.6.18.3 kernel +
iptables 1.3.6
I''ve patched the kernel an Iptables with esfq+layer7 without problems.
This simple script doesn''t log nothing ... And I''m sure to have eMule
traffic (I''ve checked with tcpdump )
If I remove " -m layer7 --l7proto edonkey \" line I can see
2006 May 07
5
Detecting p2p traffic
After varying degrees of success with p2p detection modules, I would like to
write the following rules using iptables to reliably identify p2p traffic:
1. If a host on the network has 5 or more simutaneous tcp connections to ports
above 1024, mark all connections to ports 1024 and above as 60.
2. If a host has received (or sent) UDP packets from 5 different hosts'' ports
above 1024 in a
2006 Nov 08
1
Running iptables/netfilter module connlimit with stock CentOS4
Greetings folks,
I've been researching the various iptables modules that are included
with the stock CentOS4 distro; particularly the connlimit module.
Is connlimit included by default?
I thought it is since performing
# iptables -m connlimit --help
returns information on connlimit usage along with the general iptables
help info:
<SNIP>
connlimit v1.2.11 options:
[!]
2013 Oct 09
3
[Bug 857] New: ConnLimit unable to work properly
https://bugzilla.netfilter.org/show_bug.cgi?id=857
Summary: ConnLimit unable to work properly
Product: iptables
Version: 1.4.x
Platform: All
OS/Version: RedHat Linux
Status: NEW
Severity: critical
Priority: P5
Component: iptables
AssignedTo: netfilter-buglog at lists.netfilter.org
2006 Sep 21
0
layer7 http
hello,
I try to use layer7 filter to classify packets. I have a proble with http match. This protocol seems to work well with l7-filter (http://l7-filter.sourceforge.net/protocols) but for me nothing is filtering in http class. Someone can help me ?
Here is my script :
#!/bin/bash
IPT_BIN=/sbin/iptables
TC_BIN=/sbin/tc
INTER_OUT=ppp0
LINK_RATE_UP=1000Kbit
RATE_ACK=200Kbit
RATE_DEFAULT=100Kbit
2005 Aug 02
0
iptables -m layer7 - doesn''t work
I''ve compiled my kernel (2.6.12.3) and iptables (1.3.3) and now -m
layer7 option from iptables works (i don''t get any error when run the
iptables command with -m layer7).
The problem is that no packet is matched. For example iptables -A INPUT
-p tcp -m layer7 --l7proto http -j ACCEPT doesn''t match http packets.
The same for dns and ssh.
So, what am I doing wrong? Is this
2004 Oct 23
0
iptables and layer7
Hello!
I want to mark all outgoing traffic depending on its service.
Example:
eth0 = 192.168.0.1 (local interface)
ppp0 = 80.10.10.10 (internet 1)
ppp1 = 80.10.10.11 (internet 2)
http traffic over internet 1 (ppp0) ssh traffic to interface 2 (ppp1).
I tried the following (routing and rules are set):
iptables -A PREROUTING -t mangle -s 192.168.0.0/24 -p tcp --dport 80 -j MARK
--set-mark 1
2008 Jan 24
0
CentOS 5.0 64bit - can't using ipt_connlimit module
# iptables -m connlimit --help
.........
connlimit v1.3.5 options:
[!] --connlimit-above n match if the number of existing tcp
connections is (not) above n
--connlimit-mask n group hosts using mask
-----------------------------------------
The library seems to exist also:
/lib64/iptables/libipt_connlimit.so
However, creating a rule that uses connlimit fails:
#$IPTABLES -A
2008 Jun 26
1
iptables connlimit
hi,
i try use iptables connlimit,
# iptables -I INPUT -p tcp --dport 80 -m connlimit --connlimit-above 16
--connlimit-mask 24 -j DROP
iptables: Unknown error 4294967295
where is problem ?
thanks
# rpm -qa | grep iptables
iptables-1.3.5-4.el5
# uname -a
Linux test 2.6.18-92.1.1.el5 #1 SMP Sat Jun 21 19:04:27 EDT 2008 i686
i686 i386 GNU/Linux
2006 Sep 21
0
[Bug 515] New: connlimit filter doesn't work in 1.3.5 version of iptables
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=515
Summary: connlimit filter doesn't work in 1.3.5 version of
iptables
Product: iptables
Version: 1.3.5
Platform: All
OS/Version: Fedora
Status: NEW
Severity: normal
Priority: P2
Component: libiptc
AssignedTo:
2017 Dec 27
0
[Bug 1207] New: connlimit rule fires too often
https://bugzilla.netfilter.org/show_bug.cgi?id=1207
Bug ID: 1207
Summary: connlimit rule fires too often
Product: netfilter/iptables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: ip_tables (kernel)
Assignee:
2009 Nov 05
2
[Bug 618] New: connlimit doesn't work after upgrade to iptables 1.4.5
http://bugzilla.netfilter.org/show_bug.cgi?id=618
Summary: connlimit doesn't work after upgrade to iptables 1.4.5
Product: iptables
Version: unspecified
Platform: i386
OS/Version: All
Status: NEW
Severity: normal
Priority: P1
Component: iptables
AssignedTo: laforge at netfilter.org
2009 Dec 29
0
aMSN segfaults at login after configuring my home network
After configuring my home network, aMSN segfaults.
I posted this issue originally in the aMSN forums under this thread:
http://www.amsn-project.net/forums/viewtopic.php?t=7593
I was told that my issue is related to SAMBA, referring this thread:
http://www.amsn-project.net/forums/viewtopic.php?t=6343
After uninstalling SAMBA, aMSN stops segfaulting and works as expected.
After installing it
2009 Jun 07
2
[Bug 597] New: ip6tables connlimit - cannot set CIDR greater than 32 (includes fix)
http://bugzilla.netfilter.org/show_bug.cgi?id=597
Summary: ip6tables connlimit - cannot set CIDR greater than 32
(includes fix)
Product: iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: major
Priority: P1
Component: ip6tables
AssignedTo: laforge
2015 May 05
1
IPTABLES question
Would someone please explain to me the difference in effect between
the following two IPTABLES conditions and the significance thereof in
concurrent connection limiting?
--tcp-flags SYN,ACK,FIN,RST SYN -j REJECT \
--connlimit-above 3 --connlimit-mask 32
--state NEW -j REJECT \
--connlimit-above 3 --connlimit-mask 32
--
*** e-Mail is NOT a SECURE channel ***
Do
2006 May 16
0
[Bug 475] New: Incorrection in connlimit's man page
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=475
Summary: Incorrection in connlimit's man page
Product: iptables
Version: unspecified
Platform: All
URL: http://svn.netfilter.org/cgi-
bin/viewcvs.cgi/trunk/iptables/extensions/libipt_connlim
it.man?rev=3816&view=markup
2007 Sep 03
3
Classes do not receive any traffic ?
Hello everyone.
CONFIGURATION DESCRIPTION:
I have a linux box doing masquerade for two lan''s. Here is a piece of
mine network config:
eth0 : ISP , one public ip address (DSL modem)
eth1 : lan , private network address fe: 192.168.4.0/24
eth2 : wlan access point performing as lan2wlan bridge , private network
addes fe. 192.168.67.0/24
This box use 2.6.20 kernel with iptables-1.3.8
2006 Nov 12
1
Script for get bandwidth statistic from iptable
i search a lot forum how to get bandwidth statistic such number of packet, total byte in each application protocol by using IPTABLES + netfilter-layer7
but i don''t know which script for getting it in log file and use data after get it for plotting graph later
my IPTABLES command like this
iptables -t mangle -N all
iptables -t mangle -A POSTROUTING -j all
iptables -t mangle -A