Displaying 20 results from an estimated 10000 matches similar to: "[Bug 580] iptables-restore and iptables-save lack comparison of a saved ruleset against the currently deployed rules"
2013 Jun 24
0
[Bug 580] iptables-restore and iptables-save lack comparison of a saved ruleset against the currently deployed rules
https://bugzilla.netfilter.org/show_bug.cgi?id=580
--- Comment #6 from Jan Engelhardt <jengelh at medozas.de> 2013-06-24 20:32:22 CEST ---
>Unclear how you can say with certainty that this is impossible
Right now, tables are output in permutations that are considered to be random.
(Sure there is module load order, but that is not documented, nor is it
actually a usable assumption for
2013 Aug 27
0
[Bug 580] iptables-restore and iptables-save lack comparison of a saved ruleset against the currently deployed rules
https://bugzilla.netfilter.org/show_bug.cgi?id=580
Phil Oester <netfilter at linuxace.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
AssignedTo|jengelh at medozas.de |netfilter-buglog at lists.netf
| |ilter.org
--
Configure
2009 Feb 26
1
[Bug 580] New: iptables-restore and iptables-save lack comparison of a saved ruleset against the currently deployed rules
http://bugzilla.netfilter.org/show_bug.cgi?id=580
Summary: iptables-restore and iptables-save lack comparison of a
saved ruleset against the currently deployed rules
Product: iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P1
2013 Jun 24
0
[Bug 580] iptables-restore and iptables-save lack comparison of a saved ruleset against the currently deployed rules
https://bugzilla.netfilter.org/show_bug.cgi?id=580
Phil Oester <netfilter at linuxace.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
CC| |netfilter at linuxace.com
Resolution|
2013 Jun 24
0
[Bug 580] iptables-restore and iptables-save lack comparison of a saved ruleset against the currently deployed rules
https://bugzilla.netfilter.org/show_bug.cgi?id=580
--- Comment #5 from Phil Oester <netfilter at linuxace.com> 2013-06-24 20:07:02 CEST ---
Unclear how you can say with certainty that this is impossible, but let's
ignore that point for the moment.
Is there some reason that iptables-save should do the sorting for userspace
scripts? Another alternative would be to always load the
2013 Jun 24
0
[Bug 580] iptables-restore and iptables-save lack comparison of a saved ruleset against the currently deployed rules
https://bugzilla.netfilter.org/show_bug.cgi?id=580
--- Comment #7 from Phil Oester <netfilter at linuxace.com> 2013-06-24 23:34:51 CEST ---
> would you be thrilled if all the rules were in random order too?
This comparison is a bit far fetched, given that ordering of rules is so
important (accept before drop, etc). The order in which tables are output in
iptables-save is largely
2011 Mar 03
2
[Bug 706] Iptables randomly reject some packets that have accept rule
http://bugzilla.netfilter.org/show_bug.cgi?id=706
Jan Engelhardt <jengelh at medozas.de> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |jengelh at medozas.de
--- Comment #1 from Jan Engelhardt <jengelh at medozas.de> 2011-03-03 14:20:30
2013 Jul 09
0
[Bug 600] ULOG target does not support --log-uid
https://bugzilla.netfilter.org/show_bug.cgi?id=600
Jan Engelhardt <jengelh at medozas.de> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |jengelh at medozas.de
--- Comment #8 from Jan Engelhardt <jengelh at medozas.de> 2013-07-09 16:14:23 CEST
2013 May 30
0
[Bug 773] iptables performance limits on # of rules using ipset
https://bugzilla.netfilter.org/show_bug.cgi?id=773
Phil Oester <netfilter at linuxace.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
CC|jengelh at medozas.de |netfilter at linuxace.com
Resolution|
2011 Jun 24
1
[Bug 665] Can't start error opening /var/log/ ...
http://bugzilla.netfilter.org/show_bug.cgi?id=665
--- Comment #10 from Jan Engelhardt <jengelh at medozas.de> 2011-06-24 20:27:26 ---
Because I can't know what the user would like to log, s/he still has to define
his/her own ulogd logging stack (as it is called).
--
Configure bugmail: http://bugzilla.netfilter.org/userprefs.cgi?tab=email
------- You are receiving this mail
2011 Oct 13
2
[Bug 756] New: iptables: Memory allocation problem.
http://bugzilla.netfilter.org/show_bug.cgi?id=756
Summary: iptables: Memory allocation problem.
Product: iptables
Version: CVS (please indicate timestamp)
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P5
Component: iptables
AssignedTo: netfilter-buglog at lists.netfilter.org
2011 Jun 15
2
[Bug 724] New: Iptables doesn't delete rules matching if target is RATEEST - patch attached
http://bugzilla.netfilter.org/show_bug.cgi?id=724
Summary: Iptables doesn't delete rules matching if target is
RATEEST - patch attached
Product: iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P3
Component: iptables
2011 Apr 02
2
[Bug 712] New: iptables-save does not save correcly rateest bps parameter
http://bugzilla.netfilter.org/show_bug.cgi?id=712
Summary: iptables-save does not save correcly rateest bps
parameter
Product: iptables
Version: unspecified
Platform: x86_64
OS/Version: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
Component: unknown
AssignedTo:
2011 Jul 29
2
[Bug 732] New: Iptables 1.4.11 or 1.4.12 does not compile on CentOS 5.6
http://bugzilla.netfilter.org/show_bug.cgi?id=732
Summary: Iptables 1.4.11 or 1.4.12 does not compile on CentOS 5.6
Product: netfilter/iptables
Version: linux-2.6.x
Platform: x86_64
OS/Version: RedHat Linux
Status: NEW
Severity: critical
Priority: P1
Component: ip_tables (kernel)
AssignedTo:
2008 Apr 12
2
[Bug 926] pam_session_close called as user or not at all
https://bugzilla.mindrot.org/show_bug.cgi?id=926
Jan Engelhardt <jengelh at gmx.de> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |jengelh at gmx.de
--- Comment #33 from Jan Engelhardt <jengelh at
2011 Jun 07
4
[Bug 720] New: iptables no longer compiles for Linux 2.4 because it uses linux/magic.h
http://bugzilla.netfilter.org/show_bug.cgi?id=720
Summary: iptables no longer compiles for Linux 2.4 because it
uses linux/magic.h
Product: iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: major
Priority: P3
Component: iptables
AssignedTo:
[Bug 762] New: The lastest snapshot iptables compiled error"ERROR: ld.so: object 'libxtables.so.7' "
2011 Nov 28
2
[Bug 762] New: The lastest snapshot iptables compiled error"ERROR: ld.so: object 'libxtables.so.7' "
http://bugzilla.netfilter.org/show_bug.cgi?id=762
Summary: The lastest snapshot iptables compiled error"ERROR:
ld.so: object 'libxtables.so.7' "
Product: iptables
Version: unspecified
Platform: arm
OS/Version: Ubuntu
Status: NEW
Severity: major
Priority: P5
Component:
2009 Sep 14
1
[Bug 606] New: Iptables-restore removing the wrong rules
http://bugzilla.netfilter.org/show_bug.cgi?id=606
Summary: Iptables-restore removing the wrong rules
Product: iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P1
Component: iptables-restore
AssignedTo: laforge at netfilter.org
ReportedBy: me
2011 Aug 10
2
[Bug 736] New: typo in TRACE target section of iptables man page
http://bugzilla.netfilter.org/show_bug.cgi?id=736
Summary: typo in TRACE target section of iptables man page
Product: iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P5
Component: iptables
AssignedTo: netfilter-buglog at lists.netfilter.org
2011 Sep 06
2
[Bug 747] New: IPtables marked packets not being inpsected in NAT table.
http://bugzilla.netfilter.org/show_bug.cgi?id=747
Summary: IPtables marked packets not being inpsected in NAT
table.
Product: iptables
Version: CVS (please indicate timestamp)
Platform: All
OS/Version: All
Status: NEW
Severity: major
Priority: P3
Component: iptables
AssignedTo: