Displaying 20 results from an estimated 1000 matches similar to: "[Bug 884] New: the rule of TEE target with '--oif' option cannot be deleted."
2012 Mar 01
15
[Bug 774] New: iptables-restore can't parses the quoted parameter correctly.
http://bugzilla.netfilter.org/show_bug.cgi?id=774
Summary: iptables-restore can't parses the quoted parameter
correctly.
Product: iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P5
Component: iptables-restore
AssignedTo:
2011 Jun 15
2
[Bug 724] New: Iptables doesn't delete rules matching if target is RATEEST - patch attached
http://bugzilla.netfilter.org/show_bug.cgi?id=724
Summary: Iptables doesn't delete rules matching if target is
RATEEST - patch attached
Product: iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P3
Component: iptables
2013 Sep 14
7
[Bug 852] New: IPv6 TEE target sends packets to original IP address on wrong network device
https://bugzilla.netfilter.org/show_bug.cgi?id=852
Summary: IPv6 TEE target sends packets to original IP address
on wrong network device
Product: netfilter/iptables
Version: unspecified
Platform: x86_64
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P5
Component: unknown
2006 Dec 16
1
ipfw: did i forget anything?
Hello, i hope this is the right list!
I tried making a firewall for my laptop..it wasn't as terribly difficult as i
thought it would be but i'm not sure if i forgot anything. And things can always
be done better :)
I'm not sure what i should've put under incoming connections... what i have put
there now is pretty useless because the default is to deny, but should i accept
any
2005 Apr 29
1
problem with nth patch, counter parameter...I think
Hi all, I need some guidance to get my problem fixed. I believe there
is an issue with the ''nth'' patch from the patch-o-matic, which is
labeled as status ''works''.
I have tunnels back and forth across the internet, using ''nth'' to
balance packets between different public networks (over the tunnels).
I need to access some networks over two
2005 Jan 26
0
Controlling Outbound traffic...alternative to dsl_qos_queue
Hi , this probably was asked many times before , but here it goes..
Until now i was using dsl_qos_queue - http://www.sonicspike.net/software/
Which limits outbound traffic and does packet priorites with iptables
using MARKed packets.. works very well , I run a ftpserver + webserver so
it''s usefull to set these 2 with lowest priority and my multiplayer gaming
running on certain UDP ports
2018 Jan 30
5
[Bug 1220] New: Reverse path filtering using "fib" needs better documentation
https://bugzilla.netfilter.org/show_bug.cgi?id=1220
Bug ID: 1220
Summary: Reverse path filtering using "fib" needs better
documentation
Product: nftables
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: minor
Priority: P5
Component: nft
2018 Jan 30
7
[Bug 1221] New: "fib" produces strange results with an IPv6 default route
https://bugzilla.netfilter.org/show_bug.cgi?id=1221
Bug ID: 1221
Summary: "fib" produces strange results with an IPv6 default
route
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: major
Priority: P5
2013 May 22
6
[Bug 823] New: IPv6 NAT memory leaking
https://bugzilla.netfilter.org/show_bug.cgi?id=823
Summary: IPv6 NAT memory leaking
Product: netfilter/iptables
Version: unspecified
Platform: x86_64
OS/Version: other
Status: NEW
Severity: critical
Priority: P5
Component: ip6_tables (kernel)
AssignedTo: netfilter-buglog at lists.netfilter.org
2013 Nov 28
3
[Bug 877] New: nftables - Set - define core dumps
https://bugzilla.netfilter.org/show_bug.cgi?id=877
Summary: nftables - Set - define core dumps
Product: nftables
Version: unspecified
Platform: x86_64
OS/Version: Ubuntu
Status: NEW
Severity: major
Priority: P5
Component: nft
AssignedTo: pablo at netfilter.org
ReportedBy: anandrm at
2014 Jan 23
3
[Bug 886] New: iptables-xml segfaults on "-APOSTROUTING"
https://bugzilla.netfilter.org/show_bug.cgi?id=886
Summary: iptables-xml segfaults on "-APOSTROUTING"
Product: iptables
Version: unspecified
Platform: All
OS/Version: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
Component: unknown
AssignedTo: netfilter-buglog at
2013 Oct 09
3
[Bug 857] New: ConnLimit unable to work properly
https://bugzilla.netfilter.org/show_bug.cgi?id=857
Summary: ConnLimit unable to work properly
Product: iptables
Version: 1.4.x
Platform: All
OS/Version: RedHat Linux
Status: NEW
Severity: critical
Priority: P5
Component: iptables
AssignedTo: netfilter-buglog at lists.netfilter.org
2013 Oct 19
4
[Bug 864] New: Verbose output options rejected when modifying chains
https://bugzilla.netfilter.org/show_bug.cgi?id=864
Summary: Verbose output options rejected when modifying chains
Product: iptables
Version: 1.4.x
Platform: arm
OS/Version: other
Status: NEW
Severity: normal
Priority: P5
Component: iptables
AssignedTo: netfilter-buglog at lists.netfilter.org
2013 Oct 24
5
[Bug 868] New: Null pointer segfault in netlink code
https://bugzilla.netfilter.org/show_bug.cgi?id=868
Summary: Null pointer segfault in netlink code
Product: nftables
Version: unspecified
Platform: x86_64
OS/Version: Ubuntu
Status: NEW
Severity: normal
Priority: P5
Component: nft
AssignedTo: pablo at netfilter.org
ReportedBy: john at
2013 Jul 14
7
[Bug 833] New: iptables --with-kernel=/usr/src/linux against kernel {3.9.9, 3.10} fatal error: asm/cache.h: No such file or directory
https://bugzilla.netfilter.org/show_bug.cgi?id=833
Summary: iptables --with-kernel=/usr/src/linux against kernel
{3.9.9, 3.10} fatal error: asm/cache.h: No such file
or directory
Product: iptables
Version: 1.4.x
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
2013 Oct 03
2
[Bug 855] New: Can create user chains with names unparsable by iptables-restore
https://bugzilla.netfilter.org/show_bug.cgi?id=855
Summary: Can create user chains with names unparsable by
iptables-restore
Product: iptables
Version: 1.4.x
Platform: All
OS/Version: Debian GNU/Linux
Status: NEW
Severity: minor
Priority: P5
Component: iptables
AssignedTo:
2013 May 14
8
[Bug 820] New: Quotas not limiting the exact specified limit
https://bugzilla.netfilter.org/show_bug.cgi?id=820
Summary: Quotas not limiting the exact specified limit
Product: netfilter/iptables
Version: linux-2.6.x
Platform: x86_64
OS/Version: Debian GNU/Linux
Status: NEW
Severity: critical
Priority: P5
Component: unknown
AssignedTo: netfilter-buglog at
2013 Aug 24
5
[Bug 847] New: Owner matching fails on listening socket
https://bugzilla.netfilter.org/show_bug.cgi?id=847
Summary: Owner matching fails on listening socket
Product: netfilter/iptables
Version: unspecified
Platform: x86_64
OS/Version: Debian GNU/Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: ip_tables (kernel)
AssignedTo:
2013 May 22
3
[Bug 822] New: iptables shows negative or other bad packet/byte counts
https://bugzilla.netfilter.org/show_bug.cgi?id=822
Summary: iptables shows negative or other bad packet/byte
counts
Product: iptables
Version: unspecified
Platform: All
OS/Version: Fedora
Status: NEW
Severity: critical
Priority: P5
Component: iptables
AssignedTo:
2013 Sep 26
2
[Bug 854] New: xtables_ipmask_to_cidr error code leaks into output of iptables --list
https://bugzilla.netfilter.org/show_bug.cgi?id=854
Summary: xtables_ipmask_to_cidr error code leaks into output of
iptables --list
Product: iptables
Version: 1.4.x
Platform: x86_64
OS/Version: Debian GNU/Linux
Status: NEW
Severity: trivial
Priority: P5
Component: iptables