Displaying 20 results from an estimated 10000 matches similar to: "[Bug 601] log messages with flags "ACK PSH FIN""
2009 Aug 09
2
[Bug 601] New: log messages with flags "ACK PSH FIN"
http://bugzilla.netfilter.org/show_bug.cgi?id=601
Summary: log messages with flags "ACK PSH FIN"
Product: netfilter/iptables
Version: unspecified
Platform: All
OS/Version: Debian GNU/Linux
Status: NEW
Severity: minor
Priority: P3
Component: ip_conntrack
AssignedTo: laforge at
2013 Jun 10
0
[Bug 601] log messages with flags "ACK PSH FIN"
https://bugzilla.netfilter.org/show_bug.cgi?id=601
Phil Oester <netfilter at linuxace.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |netfilter at linuxace.com
--- Comment #3 from Phil Oester <netfilter at linuxace.com> 2013-06-10
2016 Nov 09
0
<-FIN <-RST ->FIN,ACK <-RST on SSL connection shutdown
Hello,
a typical connection close, tcpdump'ed on the server side, looks as follows:
21:44:01.168131 IP xxx.xxx.3.101.143 > xxx.xxx.3.96.35518: Flags [FP.], seq 3982457856:3982457959, ack 1570044906, win 243, options [nop,nop,TS val 138698279 ecr 159494908], length 103
21:44:01.172405 IP xxx.xxx.3.101.143 > xxx.xxx.3.96.35518: Flags [R], seq 3982457960, win 0, length 0
21:44:01.172442
2020 Aug 19
2
[Bug 1450] New: Using certain simple set combinations with TCP flags causes error in mergesort.c from nft list ruleset
https://bugzilla.netfilter.org/show_bug.cgi?id=1450
Bug ID: 1450
Summary: Using certain simple set combinations with TCP flags
causes error in mergesort.c from nft list ruleset
Product: nftables
Version: unspecified
Hardware: arm
OS: Ubuntu
Status: NEW
Severity: normal
1998 May 24
1
R-beta: problem with graphics parameter "fin"
Hi,
I have the following problem (with R 0.61.3 an Linux, and a new and empty
workspace)
> oldpar<-par()
> par(oldpar)
Error: attempt to set invalid value for graphics parameter "fin".
> oldpar$fin
[1] 6.992034 6.990803
but now:
> oldpar$fin <- c(6.99,6.99)
> par(oldpar)
it works.
It seems, that if I set oldpar$fin to values greater than listed above
1998 May 26
0
R-beta: Problem with graphics parameter 'fin'
Albrecht,
I tried this:
>oldfin<-par("fin")
>oldfin
[1] 6.990803 6.997416
>par(fin=oldfin)
on my system (Linux and R-0.61.2) and received no error message, as also
reported by Thomas Lumley. I then tried to create the error,
successfully, by:
>oldfin<-c(7,7)
>par(fin=oldfin)
Error: attempt to set invalid value for graphics parameter "fin".
Thinking
2008 Mar 11
1
Cingular/ATT killing my IMAP/POP connections with bad TCP FIN packets?
Hello all,
I've got an issue I'm almost positive is not related to Dovecot, but was
wondering whether anyone else has had similar problems or could
duplicate my results. Please accept my apologies if this is considered
off-topic or this issue is actually just a symptom of my own ignorance.
Also, sorry for how long this email got, I knew I wouldn't be able to
explain my issue in
2016 Sep 11
1
[Bug 1086] New: Nftables matching packet header fields and unexpected '(': wrong wiki info or bug?
https://bugzilla.netfilter.org/show_bug.cgi?id=1086
Bug ID: 1086
Summary: Nftables matching packet header fields and unexpected
'(': wrong wiki info or bug?
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: minor
2003 Mar 17
0
[Bug 65] New: Problem with error message when tcp-flags doesn't recognize a flag
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=65
Summary: Problem with error message when tcp-flags doesn't
recognize a flag
Product: iptables userspace
Version: 1.2.7a
Platform: other
OS/Version: other
Status: NEW
Severity: minor
Priority: P2
Component: iptables
2016 Jun 30
3
[CENTOS ]IPTABLES - How Secure & Best Practice
Ned,
Thank you very much for the response.
Great example following through on the premise.
It sounds like I need to have a better understanding of the traffic
patterns on my network to know the optimal order for iptables
filtering rules.
My brief example -
Premise: I want to limit outsiders from interfering with LAN client machines.
So, I have the following rules regarding forwarding traffic:
2005 May 11
2
Regsubsets()
Dear List members
I am using the regsubsets function to select a few predictor variables
using Mallow's Cp:
> sel.proc.regsub.full <- regsubsets(CO2 ~ v + log(v) + v.max + sd.v +
tad + no.stops.km + av.stop.T + a + sd.a + a.max + d + sd.d + d.max +
RPA + P + perc.stop.T + perc.a.T + perc.d.T + RPS + RPSS + sd.P.acc +
P.dec + da.acc.1 + RMSACC + RDI + RPSI + P.acc + cov.v + cov.a +
2016 Jul 01
0
[CENTOS ]IPTABLES - How Secure & Best Practice
On 30/06/16 23:19, Mike wrote:
> Ned,
>
> Thank you very much for the response.
> Great example following through on the premise.
> It sounds like I need to have a better understanding of the traffic
> patterns on my network to know the optimal order for iptables
> filtering rules.
>
Try running:
iptables -nv -L
which will show you in the left hand column a counter for
2003 May 15
0
My iptables (RH 7.2) firewall included
It's a shell script
#!/bin/bash
IPTABLES="/sbin/iptables"
# Load required modules
/sbin/insmod ip_tables
/sbin/insmod ip_conntrack
/sbin/insmod iptable_nat
/sbin/insmod ipt_MASQUERADE
# Then flush all rules
/sbin/iptables -F
/sbin/iptables -t nat -F
/sbin/iptables -P INPUT DROP
/sbin/iptables -P OUTPUT ACCEPT
/sbin/iptables -P FORWARD ACCEPT
# In the NAT table (-t nat), Append
2000 Oct 04
1
Par arguments and pin and fin
Hi R Gurus,
I want to change the size and shape of the plot region, but cannot work out
how to use the arguments pin and fin in the par() function e.g. :
par(lwd=1.5, font=1, mfrow=c(2,1), pty="m", plt=c(.1,.9, 0.1,.9),
mar=c(1,4,0.1,0.1)
pin=c(6,12))
this gives me a syntax error associated with pin. How should I be using
these arguments?
Thanks,
Matt Redding
2005 Jul 02
3
packets with syn/fin vs pf_norm.c
Hi,
First of all, I know that not dropping SYN/FIN isn't really a big deal, it
just makes no sense. But since it doesn't make any sense, I don't see
the reason why not to discard them.
I'm running pf on FreeBSD 5.4-RELEASE-p3 and I scrub any traffic. I've
read some other posts on google and as far as I can tell, clearly invalid
packets (like packets with SYN/RST set) is
2004 Feb 10
0
ACK's overhead
Good day time!
We've noticed the following issue with Samba 3.0.1 on Linux. When SMB client
asks for the first time on FID for a locking or read request on an opened
file, it causes an ACK to be sent from client side. Windows server also
requests ACK BUT much more rarely.
Sending ACK causes additional overhead when working in heavy locking and
unlocking environment. Windows server
2004 Feb 20
0
FW: ACK's overhead (AGAIN)
Good day time!
We've noticed the following issue with Samba 3.0.1 on Linux. When SMB client
asks for the first time on FID for a locking or read request on an opened
file, it causes an ACK to be sent from client side. Windows server also
requests ACK BUT much more rarely.
Sending ACK causes additional overhead when working in heavy locking and
unlocking environment. Windows server
2007 Sep 29
1
samba with iptables
Hi,
system info:
ubuntu 7.04 (Host OS)
samba 3.0.24 (installed with apt-get)
vmware-server 6.0.1
windows XP (Guest OS)
I was using the iptables script provided by iptablesrocks.org. It's been
quite useful, but I ran into a problem when I tried to connect samba.
Without any iptables rules, I have no problem when connecting host
os(ubuntu samba server) from guest os Windows XP.
I referenced
2019 Dec 06
0
tinc-pre* between gentoo and raspbian
Dear all,
I have a bit of a complicated tinc setup yielding weird results that I
cannot explain. I would be glad if maybe someone here could help me out.
I have 3 machines (with IP addresses in my tinc network)
machine A (10.0.0.2) runs gentoo, tinc-1.1_pre17, behind router Y
machine B (10.0.0.3) runs gentoo, tinc-1.1pre15, behind router X
machine C (10.0.0.1) runs raspbian, tinc-1.1pre15, behind
2019 Oct 09
2
[Bug 1370] New: iptables-restore-translate
https://bugzilla.netfilter.org/show_bug.cgi?id=1370
Bug ID: 1370
Summary: iptables-restore-translate
Product: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
Reporter: