similar to: [Bug 601] log messages with flags "ACK PSH FIN"

Displaying 20 results from an estimated 10000 matches similar to: "[Bug 601] log messages with flags "ACK PSH FIN""

2009 Aug 09
2
[Bug 601] New: log messages with flags "ACK PSH FIN"
http://bugzilla.netfilter.org/show_bug.cgi?id=601 Summary: log messages with flags "ACK PSH FIN" Product: netfilter/iptables Version: unspecified Platform: All OS/Version: Debian GNU/Linux Status: NEW Severity: minor Priority: P3 Component: ip_conntrack AssignedTo: laforge at
2013 Jun 10
0
[Bug 601] log messages with flags "ACK PSH FIN"
https://bugzilla.netfilter.org/show_bug.cgi?id=601 Phil Oester <netfilter at linuxace.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |netfilter at linuxace.com --- Comment #3 from Phil Oester <netfilter at linuxace.com> 2013-06-10
2016 Nov 09
0
<-FIN <-RST ->FIN,ACK <-RST on SSL connection shutdown
Hello, a typical connection close, tcpdump'ed on the server side, looks as follows: 21:44:01.168131 IP xxx.xxx.3.101.143 > xxx.xxx.3.96.35518: Flags [FP.], seq 3982457856:3982457959, ack 1570044906, win 243, options [nop,nop,TS val 138698279 ecr 159494908], length 103 21:44:01.172405 IP xxx.xxx.3.101.143 > xxx.xxx.3.96.35518: Flags [R], seq 3982457960, win 0, length 0 21:44:01.172442
2020 Aug 19
2
[Bug 1450] New: Using certain simple set combinations with TCP flags causes error in mergesort.c from nft list ruleset
https://bugzilla.netfilter.org/show_bug.cgi?id=1450 Bug ID: 1450 Summary: Using certain simple set combinations with TCP flags causes error in mergesort.c from nft list ruleset Product: nftables Version: unspecified Hardware: arm OS: Ubuntu Status: NEW Severity: normal
1998 May 24
1
R-beta: problem with graphics parameter "fin"
Hi, I have the following problem (with R 0.61.3 an Linux, and a new and empty workspace) > oldpar<-par() > par(oldpar) Error: attempt to set invalid value for graphics parameter "fin". > oldpar$fin [1] 6.992034 6.990803 but now: > oldpar$fin <- c(6.99,6.99) > par(oldpar) it works. It seems, that if I set oldpar$fin to values greater than listed above
1998 May 26
0
R-beta: Problem with graphics parameter 'fin'
Albrecht, I tried this: >oldfin<-par("fin") >oldfin [1] 6.990803 6.997416 >par(fin=oldfin) on my system (Linux and R-0.61.2) and received no error message, as also reported by Thomas Lumley. I then tried to create the error, successfully, by: >oldfin<-c(7,7) >par(fin=oldfin) Error: attempt to set invalid value for graphics parameter "fin". Thinking
2008 Mar 11
1
Cingular/ATT killing my IMAP/POP connections with bad TCP FIN packets?
Hello all, I've got an issue I'm almost positive is not related to Dovecot, but was wondering whether anyone else has had similar problems or could duplicate my results. Please accept my apologies if this is considered off-topic or this issue is actually just a symptom of my own ignorance. Also, sorry for how long this email got, I knew I wouldn't be able to explain my issue in
2016 Sep 11
1
[Bug 1086] New: Nftables matching packet header fields and unexpected '(': wrong wiki info or bug?
https://bugzilla.netfilter.org/show_bug.cgi?id=1086 Bug ID: 1086 Summary: Nftables matching packet header fields and unexpected '(': wrong wiki info or bug? Product: nftables Version: unspecified Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: minor
2003 Mar 17
0
[Bug 65] New: Problem with error message when tcp-flags doesn't recognize a flag
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=65 Summary: Problem with error message when tcp-flags doesn't recognize a flag Product: iptables userspace Version: 1.2.7a Platform: other OS/Version: other Status: NEW Severity: minor Priority: P2 Component: iptables
2016 Jun 30
3
[CENTOS ]IPTABLES - How Secure & Best Practice
Ned, Thank you very much for the response. Great example following through on the premise. It sounds like I need to have a better understanding of the traffic patterns on my network to know the optimal order for iptables filtering rules. My brief example - Premise: I want to limit outsiders from interfering with LAN client machines. So, I have the following rules regarding forwarding traffic:
2005 May 11
2
Regsubsets()
Dear List members I am using the regsubsets function to select a few predictor variables using Mallow's Cp: > sel.proc.regsub.full <- regsubsets(CO2 ~ v + log(v) + v.max + sd.v + tad + no.stops.km + av.stop.T + a + sd.a + a.max + d + sd.d + d.max + RPA + P + perc.stop.T + perc.a.T + perc.d.T + RPS + RPSS + sd.P.acc + P.dec + da.acc.1 + RMSACC + RDI + RPSI + P.acc + cov.v + cov.a +
2016 Jul 01
0
[CENTOS ]IPTABLES - How Secure & Best Practice
On 30/06/16 23:19, Mike wrote: > Ned, > > Thank you very much for the response. > Great example following through on the premise. > It sounds like I need to have a better understanding of the traffic > patterns on my network to know the optimal order for iptables > filtering rules. > Try running: iptables -nv -L which will show you in the left hand column a counter for
2003 May 15
0
My iptables (RH 7.2) firewall included
It's a shell script #!/bin/bash IPTABLES="/sbin/iptables" # Load required modules /sbin/insmod ip_tables /sbin/insmod ip_conntrack /sbin/insmod iptable_nat /sbin/insmod ipt_MASQUERADE # Then flush all rules /sbin/iptables -F /sbin/iptables -t nat -F /sbin/iptables -P INPUT DROP /sbin/iptables -P OUTPUT ACCEPT /sbin/iptables -P FORWARD ACCEPT # In the NAT table (-t nat), Append
2000 Oct 04
1
Par arguments and pin and fin
Hi R Gurus, I want to change the size and shape of the plot region, but cannot work out how to use the arguments pin and fin in the par() function e.g. : par(lwd=1.5, font=1, mfrow=c(2,1), pty="m", plt=c(.1,.9, 0.1,.9), mar=c(1,4,0.1,0.1) pin=c(6,12)) this gives me a syntax error associated with pin. How should I be using these arguments? Thanks, Matt Redding
2005 Jul 02
3
packets with syn/fin vs pf_norm.c
Hi, First of all, I know that not dropping SYN/FIN isn't really a big deal, it just makes no sense. But since it doesn't make any sense, I don't see the reason why not to discard them. I'm running pf on FreeBSD 5.4-RELEASE-p3 and I scrub any traffic. I've read some other posts on google and as far as I can tell, clearly invalid packets (like packets with SYN/RST set) is
2004 Feb 10
0
ACK's overhead
Good day time! We've noticed the following issue with Samba 3.0.1 on Linux. When SMB client asks for the first time on FID for a locking or read request on an opened file, it causes an ACK to be sent from client side. Windows server also requests ACK BUT much more rarely. Sending ACK causes additional overhead when working in heavy locking and unlocking environment. Windows server
2004 Feb 20
0
FW: ACK's overhead (AGAIN)
Good day time! We've noticed the following issue with Samba 3.0.1 on Linux. When SMB client asks for the first time on FID for a locking or read request on an opened file, it causes an ACK to be sent from client side. Windows server also requests ACK BUT much more rarely. Sending ACK causes additional overhead when working in heavy locking and unlocking environment. Windows server
2007 Sep 29
1
samba with iptables
Hi, system info: ubuntu 7.04 (Host OS) samba 3.0.24 (installed with apt-get) vmware-server 6.0.1 windows XP (Guest OS) I was using the iptables script provided by iptablesrocks.org. It's been quite useful, but I ran into a problem when I tried to connect samba. Without any iptables rules, I have no problem when connecting host os(ubuntu samba server) from guest os Windows XP. I referenced
2019 Dec 06
0
tinc-pre* between gentoo and raspbian
Dear all, I have a bit of a complicated tinc setup yielding weird results that I cannot explain. I would be glad if maybe someone here could help me out. I have 3 machines (with IP addresses in my tinc network) machine A (10.0.0.2) runs gentoo, tinc-1.1_pre17, behind router Y machine B (10.0.0.3) runs gentoo, tinc-1.1pre15, behind router X machine C (10.0.0.1) runs raspbian, tinc-1.1pre15, behind
2019 Oct 09
2
[Bug 1370] New: iptables-restore-translate
https://bugzilla.netfilter.org/show_bug.cgi?id=1370 Bug ID: 1370 Summary: iptables-restore-translate Product: nftables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: normal Priority: P5 Component: nft Assignee: pablo at netfilter.org Reporter: