Displaying 20 results from an estimated 20000 matches similar to: "[Bug 650] --hashlimit-burst does not update when using --hashlimit-name for a second time"
2013 May 31
0
[Bug 650] --hashlimit-burst does not update when using --hashlimit-name for a second time
https://bugzilla.netfilter.org/show_bug.cgi?id=650
Phil Oester <netfilter at linuxace.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|ASSIGNED |RESOLVED
CC| |netfilter at linuxace.com
Resolution|
2024 Mar 24
3
[Bug 1740] New: hashlimit limit: reduction to lowest terms in the output is confusing
https://bugzilla.netfilter.org/show_bug.cgi?id=1740
Bug ID: 1740
Summary: hashlimit limit: reduction to lowest terms in the
output is confusing
Product: iptables
Version: 1.8.x
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: minor
Priority: P5
Component:
2019 Feb 05
3
[Bug 1320] New: iptables hashlimit - problem with traffic limitation
https://bugzilla.netfilter.org/show_bug.cgi?id=1320
Bug ID: 1320
Summary: iptables hashlimit - problem with traffic limitation
Product: iptables
Version: 1.6.x
Hardware: All
OS: Debian GNU/Linux
Status: NEW
Severity: major
Priority: P5
Component: iptables
Assignee:
2018 Jul 26
1
[Bug 1273] New: hashlimit never appears to fail to match under 4.9.x
https://bugzilla.netfilter.org/show_bug.cgi?id=1273
Bug ID: 1273
Summary: hashlimit never appears to fail to match under 4.9.x
Product: netfilter/iptables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: major
Priority: P5
Component: ip_tables (kernel)
2018 Mar 16
0
[Bug 1235] New: Error Message "Memory allocation problem" using hashlimit match
https://bugzilla.netfilter.org/show_bug.cgi?id=1235
Bug ID: 1235
Summary: Error Message "Memory allocation problem" using
hashlimit match
Product: iptables
Version: 1.6.x
Hardware: x86_64
OS: Gentoo
Status: NEW
Severity: normal
Priority: P5
Component:
2009 Jan 10
2
[Bug 568] New: iptables-save saves option hashlimit-htable-gcinterval with error
http://bugzilla.netfilter.org/show_bug.cgi?id=568
Summary: iptables-save saves option hashlimit-htable-gcinterval
with error
Product: iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: iptables-save
AssignedTo:
2018 Dec 03
1
[Bug 1306] New: burst packets becomes burst bytes
https://bugzilla.netfilter.org/show_bug.cgi?id=1306
Bug ID: 1306
Summary: burst packets becomes burst bytes
Product: nftables
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
2017 Aug 17
0
[Bug 1170] New: limit-burst is not fully consumed and rule stops matching
https://bugzilla.netfilter.org/show_bug.cgi?id=1170
Bug ID: 1170
Summary: limit-burst is not fully consumed and rule stops
matching
Product: netfilter/iptables
Version: unspecified
Hardware: x86_64
OS: Ubuntu
Status: NEW
Severity: major
Priority: P5
Component:
2016 Apr 02
1
[Bug 1061] New: net-firewall/nftables-0.5-r2: limit rate: burst parameter doesn't work
https://bugzilla.netfilter.org/show_bug.cgi?id=1061
Bug ID: 1061
Summary: net-firewall/nftables-0.5-r2: limit rate: burst
parameter doesn't work
Product: nftables
Version: unspecified
Hardware: x86_64
URL: http://wiki.nftables.org/wiki-nftables/index.php/Rate_
limiting_matchings
2014 May 13
1
[Bug 931] New: limit: -limit-burst is not supported in nft
https://bugzilla.netfilter.org/show_bug.cgi?id=931
Summary: limit: -limit-burst is not supported in nft
Product: nftables
Version: unspecified
Platform: x86_64
OS/Version: Debian GNU/Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
AssignedTo: pablo at netfilter.org
2012 Apr 21
7
[Bug 782] New: -j LOG --log-prefix handling broken
http://bugzilla.netfilter.org/show_bug.cgi?id=782
Summary: -j LOG --log-prefix handling broken
Product: iptables
Version: CVS (please indicate timestamp)
Platform: x86_64
OS/Version: All
Status: NEW
Severity: normal
Priority: P5
Component: iptables-restore
AssignedTo: netfilter-buglog at
2018 Feb 02
0
[ANNOUNCE] iptables 1.6.2 release
Hi!
The Netfilter project proudly presents:
iptables 1.6.2
iptables is the userspace command line program used to configure the
Linux 2.4.x and later packet filtering ruleset. It is targeted towards
system administrators.
This update contains accumulated bugfixes, a few new extensions and
lots of translations via iptables-translate to ease migration to
nftables.
See ChangeLog that comes
2006 Nov 17
1
echo canceller issue with sudden burst of sound
Hi,When captured speech contain sudden burst of sound like a bell ringing or a loud click sound along with echo, echo canceller seems go wrong in latest svn version. Is it because of sudden change from normal speech to say some high frequency sound?ThanksJam
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
2008 Jun 08
1
eliminating and relabeling the first column
Hello everyone,
I have a data frame in which I am wanting to eliminate the row labels and then relabel the rows with
g1-g2000.I have used the following code:
dat<-read.table(file="C:\\Documents and Settings\\Owner\\My Documents\\colon cancer1.txt",header=T,row.names=1)
file.show(file="C:\\Documents and Settings\\Owner\\My Documents\\colon cancer1.txt")
I thought that this
2005 Jan 02
1
Disable Burst-on-Connect
Thanks Karl-
Setting the burst-size to 0 does indeed disable Burst-on-Connect.
FYI: I have verified that disabling Burst-on-Connect allows VLC Player to
play Icecast2 streams.
I am notifying the VLC developers of this, so hopefully they can support
Burst-on-Connect Icecast2 streams. SHOUTcast burst seems to work just
fine, so maybe it won't be such a big problem to fix. Any other
2005 Jan 02
3
Disable Burst-on-Connect
I am trying to narrow-down a problem with VLC Player and I would like to
temporarily disable burst-on-connect. I have set this to 0, but it doesn't
seem to disable.
<burst-on-connect>0</burst-on-connect>
<burst-size>65535</burst-size>
http://stream.orban.com:80/eval
Any ideas?
Thanks.
-greg.
2006 Oct 21
1
Additional "icy-burst-size" header ?
Hello,
I have a request for an additional header.
This header is needed to inform the client of the burst it is going to
receive.
Why ? This header could be very usefull for the streaming-client to have
an idea of it's delay, and (much more important) to be able to do
early-on streaming.
The question is not on how to implement this in code (probably send the
header in the
2007 Jun 18
1
Fwd: police burst is mandatory?
Hi.
I''m using the following filter from lartc "ultimate PPP" example:
tc filter add dev $DEV parent ffff: protocol ip prio 50 u32 match ip src \
0.0.0.0/0 police rate ${DOWNLINK}kbit burst 10k drop flowid :1
It works fine, but when I remove the "burst 10k", I receive the following
error:
"burst" requires "rate".
Illegal "police"
2006 Feb 28
0
burst argument in as.ltraj()
Hi. I am running the as.ltraj () function in adehabitat (v 1.4 under R 2.2.1)
but can't seem to correctly specify the burst argument. i.e., the ltraj
object returned consists of only one component, when in fact my data consist
of more than one burst of reloctions per animal. i've set up the data (xy,
date, id, burst) in list form following the example given in ?as.ltraj. to
simplify,
2006 Oct 04
1
QoS HTB burst and cburst parameters-FLEX
All:
Does anyone know what the burst and cburst parameter do?
My understanding so far:
* I see a lot of different definitions on the web. It
seems like burst is the number of bytes sent before serving other
queues/classes. So if burst was 1000 bytes and class rate was 100kibit
per second. It would send 1000 bytes each time the scheduler service
that queue to a rate of 100 kbit per