similar to: [Bug 580] iptables-restore and iptables-save lack comparison of a saved ruleset against the currently deployed rules

Displaying 20 results from an estimated 10000 matches similar to: "[Bug 580] iptables-restore and iptables-save lack comparison of a saved ruleset against the currently deployed rules"

2013 Jun 24
0
[Bug 580] iptables-restore and iptables-save lack comparison of a saved ruleset against the currently deployed rules
https://bugzilla.netfilter.org/show_bug.cgi?id=580 --- Comment #6 from Jan Engelhardt <jengelh at medozas.de> 2013-06-24 20:32:22 CEST --- >Unclear how you can say with certainty that this is impossible Right now, tables are output in permutations that are considered to be random. (Sure there is module load order, but that is not documented, nor is it actually a usable assumption for
2013 Aug 27
0
[Bug 580] iptables-restore and iptables-save lack comparison of a saved ruleset against the currently deployed rules
https://bugzilla.netfilter.org/show_bug.cgi?id=580 Phil Oester <netfilter at linuxace.com> changed: What |Removed |Added ---------------------------------------------------------------------------- AssignedTo|jengelh at medozas.de |netfilter-buglog at lists.netf | |ilter.org -- Configure
2009 Feb 26
1
[Bug 580] New: iptables-restore and iptables-save lack comparison of a saved ruleset against the currently deployed rules
http://bugzilla.netfilter.org/show_bug.cgi?id=580 Summary: iptables-restore and iptables-save lack comparison of a saved ruleset against the currently deployed rules Product: iptables Version: unspecified Platform: All OS/Version: All Status: NEW Severity: enhancement Priority: P1
2013 Jun 24
0
[Bug 580] iptables-restore and iptables-save lack comparison of a saved ruleset against the currently deployed rules
https://bugzilla.netfilter.org/show_bug.cgi?id=580 Phil Oester <netfilter at linuxace.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED CC| |netfilter at linuxace.com Resolution|
2013 Jun 24
0
[Bug 580] iptables-restore and iptables-save lack comparison of a saved ruleset against the currently deployed rules
https://bugzilla.netfilter.org/show_bug.cgi?id=580 --- Comment #5 from Phil Oester <netfilter at linuxace.com> 2013-06-24 20:07:02 CEST --- Unclear how you can say with certainty that this is impossible, but let's ignore that point for the moment. Is there some reason that iptables-save should do the sorting for userspace scripts? Another alternative would be to always load the
2013 Jun 24
0
[Bug 580] iptables-restore and iptables-save lack comparison of a saved ruleset against the currently deployed rules
https://bugzilla.netfilter.org/show_bug.cgi?id=580 --- Comment #7 from Phil Oester <netfilter at linuxace.com> 2013-06-24 23:34:51 CEST --- > would you be thrilled if all the rules were in random order too? This comparison is a bit far fetched, given that ordering of rules is so important (accept before drop, etc). The order in which tables are output in iptables-save is largely
2011 Mar 03
2
[Bug 706] Iptables randomly reject some packets that have accept rule
http://bugzilla.netfilter.org/show_bug.cgi?id=706 Jan Engelhardt <jengelh at medozas.de> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |jengelh at medozas.de --- Comment #1 from Jan Engelhardt <jengelh at medozas.de> 2011-03-03 14:20:30
2013 Jul 09
0
[Bug 600] ULOG target does not support --log-uid
https://bugzilla.netfilter.org/show_bug.cgi?id=600 Jan Engelhardt <jengelh at medozas.de> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |jengelh at medozas.de --- Comment #8 from Jan Engelhardt <jengelh at medozas.de> 2013-07-09 16:14:23 CEST
2013 May 30
0
[Bug 773] iptables performance limits on # of rules using ipset
https://bugzilla.netfilter.org/show_bug.cgi?id=773 Phil Oester <netfilter at linuxace.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED CC|jengelh at medozas.de |netfilter at linuxace.com Resolution|
2011 Jun 24
1
[Bug 665] Can't start error opening /var/log/ ...
http://bugzilla.netfilter.org/show_bug.cgi?id=665 --- Comment #10 from Jan Engelhardt <jengelh at medozas.de> 2011-06-24 20:27:26 --- Because I can't know what the user would like to log, s/he still has to define his/her own ulogd logging stack (as it is called). -- Configure bugmail: http://bugzilla.netfilter.org/userprefs.cgi?tab=email ------- You are receiving this mail
2011 Oct 13
2
[Bug 756] New: iptables: Memory allocation problem.
http://bugzilla.netfilter.org/show_bug.cgi?id=756 Summary: iptables: Memory allocation problem. Product: iptables Version: CVS (please indicate timestamp) Platform: All OS/Version: All Status: NEW Severity: normal Priority: P5 Component: iptables AssignedTo: netfilter-buglog at lists.netfilter.org
2011 Jun 15
2
[Bug 724] New: Iptables doesn't delete rules matching if target is RATEEST - patch attached
http://bugzilla.netfilter.org/show_bug.cgi?id=724 Summary: Iptables doesn't delete rules matching if target is RATEEST - patch attached Product: iptables Version: unspecified Platform: All OS/Version: All Status: NEW Severity: normal Priority: P3 Component: iptables
2011 Apr 02
2
[Bug 712] New: iptables-save does not save correcly rateest bps parameter
http://bugzilla.netfilter.org/show_bug.cgi?id=712 Summary: iptables-save does not save correcly rateest bps parameter Product: iptables Version: unspecified Platform: x86_64 OS/Version: Debian GNU/Linux Status: NEW Severity: normal Priority: P5 Component: unknown AssignedTo:
2011 Jul 29
2
[Bug 732] New: Iptables 1.4.11 or 1.4.12 does not compile on CentOS 5.6
http://bugzilla.netfilter.org/show_bug.cgi?id=732 Summary: Iptables 1.4.11 or 1.4.12 does not compile on CentOS 5.6 Product: netfilter/iptables Version: linux-2.6.x Platform: x86_64 OS/Version: RedHat Linux Status: NEW Severity: critical Priority: P1 Component: ip_tables (kernel) AssignedTo:
2008 Apr 12
2
[Bug 926] pam_session_close called as user or not at all
https://bugzilla.mindrot.org/show_bug.cgi?id=926 Jan Engelhardt <jengelh at gmx.de> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |jengelh at gmx.de --- Comment #33 from Jan Engelhardt <jengelh at
2011 Jun 07
4
[Bug 720] New: iptables no longer compiles for Linux 2.4 because it uses linux/magic.h
http://bugzilla.netfilter.org/show_bug.cgi?id=720 Summary: iptables no longer compiles for Linux 2.4 because it uses linux/magic.h Product: iptables Version: unspecified Platform: All OS/Version: All Status: NEW Severity: major Priority: P3 Component: iptables AssignedTo:
2011 Nov 28
2
[Bug 762] New: The lastest snapshot iptables compiled error"ERROR: ld.so: object 'libxtables.so.7' "
http://bugzilla.netfilter.org/show_bug.cgi?id=762 Summary: The lastest snapshot iptables compiled error"ERROR: ld.so: object 'libxtables.so.7' " Product: iptables Version: unspecified Platform: arm OS/Version: Ubuntu Status: NEW Severity: major Priority: P5 Component:
2009 Sep 14
1
[Bug 606] New: Iptables-restore removing the wrong rules
http://bugzilla.netfilter.org/show_bug.cgi?id=606 Summary: Iptables-restore removing the wrong rules Product: iptables Version: unspecified Platform: All OS/Version: All Status: NEW Severity: normal Priority: P1 Component: iptables-restore AssignedTo: laforge at netfilter.org ReportedBy: me
2011 Aug 10
2
[Bug 736] New: typo in TRACE target section of iptables man page
http://bugzilla.netfilter.org/show_bug.cgi?id=736 Summary: typo in TRACE target section of iptables man page Product: iptables Version: unspecified Platform: All OS/Version: All Status: NEW Severity: enhancement Priority: P5 Component: iptables AssignedTo: netfilter-buglog at lists.netfilter.org
2011 Sep 06
2
[Bug 747] New: IPtables marked packets not being inpsected in NAT table.
http://bugzilla.netfilter.org/show_bug.cgi?id=747 Summary: IPtables marked packets not being inpsected in NAT table. Product: iptables Version: CVS (please indicate timestamp) Platform: All OS/Version: All Status: NEW Severity: major Priority: P3 Component: iptables AssignedTo: