similar to: [Bug 1176] New: Invalid identifiers produce unhelpful error messages

Displaying 20 results from an estimated 5000 matches similar to: "[Bug 1176] New: Invalid identifiers produce unhelpful error messages"

2017 Oct 06
6
[Bug 1188] New: nft fails to parse own output; unable to save-restore active state
https://bugzilla.netfilter.org/show_bug.cgi?id=1188 Bug ID: 1188 Summary: nft fails to parse own output; unable to save-restore active state Product: nftables Version: unspecified Hardware: All OS: All Status: NEW Severity: critical Priority: P5 Component: nft
2017 Aug 23
3
[Bug 1175] New: Document limitations on identifier names
https://bugzilla.netfilter.org/show_bug.cgi?id=1175 Bug ID: 1175 Summary: Document limitations on identifier names Product: nftables Version: unspecified Hardware: All OS: All Status: NEW Severity: major Priority: P5 Component: nft Assignee: pablo at netfilter.org
2017 Aug 23
5
[Bug 1178] New: Provide better error messaging when a rule can't be executed in its context
https://bugzilla.netfilter.org/show_bug.cgi?id=1178 Bug ID: 1178 Summary: Provide better error messaging when a rule can't be executed in its context Product: nftables Version: unspecified Hardware: All OS: All Status: NEW Severity: enhancement Priority: P5
2018 Jan 20
10
[Bug 1216] New: Error messaging for "interval overlaps with previous one" misidentifies location
https://bugzilla.netfilter.org/show_bug.cgi?id=1216 Bug ID: 1216 Summary: Error messaging for "interval overlaps with previous one" misidentifies location Product: nftables Version: unspecified Hardware: All OS: All Status: NEW Severity: major Priority: P5
2017 Sep 21
11
[Bug 1184] New: disable implicit concatenating of elements of sets with flag interval
https://bugzilla.netfilter.org/show_bug.cgi?id=1184 Bug ID: 1184 Summary: disable implicit concatenating of elements of sets with flag interval Product: nftables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: enhancement Priority: P5 Component:
2023 Apr 07
3
[Bug 1671] New: Implicit chains and nesting result in parser_bison.y aborting
https://bugzilla.netfilter.org/show_bug.cgi?id=1671 Bug ID: 1671 Summary: Implicit chains and nesting result in parser_bison.y aborting Product: nftables Version: 0.9.x Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: major Priority: P5 Component: nft
2017 Aug 24
5
[Bug 1179] New: vmap and sets cause "BUG: invalid range expression type set"
https://bugzilla.netfilter.org/show_bug.cgi?id=1179 Bug ID: 1179 Summary: vmap and sets cause "BUG: invalid range expression type set" Product: nftables Version: unspecified Hardware: All OS: All Status: NEW Severity: major Priority: P5 Component: nft
2017 Aug 22
5
[Bug 1173] New: Documentation/error messages around NAT statements in "inet" tables incorrect
https://bugzilla.netfilter.org/show_bug.cgi?id=1173 Bug ID: 1173 Summary: Documentation/error messages around NAT statements in "inet" tables incorrect Product: nftables Version: unspecified Hardware: All OS: All Status: NEW Severity: critical Priority: P5
2017 Aug 22
2
[Bug 1174] New: 'define' functionality not sufficient for maintaining sets and the like
https://bugzilla.netfilter.org/show_bug.cgi?id=1174 Bug ID: 1174 Summary: 'define' functionality not sufficient for maintaining sets and the like Product: nftables Version: unspecified Hardware: All OS: All Status: NEW Severity: enhancement Priority: P5
2016 Oct 24
4
[Bug 1093] New: 'Flush ruleset' is undocumented
https://bugzilla.netfilter.org/show_bug.cgi?id=1093 Bug ID: 1093 Summary: 'Flush ruleset' is undocumented Product: nftables Version: unspecified Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: normal Priority: P5 Component: nft Assignee: pablo at
2020 Apr 17
2
CentO 8 and nftables default policy
Hi list, I'm studying nftables. I'm using CentOS 8.1 (Gnome) and I disabled firewalld. I noticed that a default policy is created with tables and chains probably for firewalld. So I created a .nft script where I stored my rules with a flush for previous ruleset, then saved on /etc/sysconfig/nftables.conf and the enabled nftables service. Running the script with nft -f script.nft all
2019 Sep 15
3
[Bug 1365] New: nft crashes in chain_print_declaration()
https://bugzilla.netfilter.org/show_bug.cgi?id=1365 Bug ID: 1365 Summary: nft crashes in chain_print_declaration() Product: nftables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: normal Priority: P5 Component: nft Assignee: pablo at netfilter.org
2017 Apr 01
6
[Bug 1140] New: nft dump invalid (flow table)
https://bugzilla.netfilter.org/show_bug.cgi?id=1140 Bug ID: 1140 Summary: nft dump invalid (flow table) Product: nftables Version: unspecified Hardware: x86_64 OS: other Status: NEW Severity: major Priority: P5 Component: nft Assignee: pablo at netfilter.org
2019 Jul 05
2
[Bug 1349] New: "nft list ruleset" shows rules twice
https://bugzilla.netfilter.org/show_bug.cgi?id=1349 Bug ID: 1349 Summary: "nft list ruleset" shows rules twice Product: nftables Version: unspecified Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: minor Priority: P5 Component: nft Assignee: pablo at
2020 Apr 18
1
CentO 8 and nftables default policy
I had the same problem. If you are not using virtual machines then # systemctl disable libvirtd works and is easily reversible. Alan On 18/04/2020 23:03, Alessandro Baggi wrote: > Il 17/04/20 11:01, Alessandro Baggi ha scritto: >> Hi list, >> >> I'm studying nftables. I'm using CentOS 8.1 (Gnome) and I disabled >> firewalld. I noticed that a default
2020 Jun 09
3
firewalld / iptables / nftables
Despite that the migration of our applications comes with a significant workload. It seems that also every aspect of common services had changed with EL8. In EL8 firewalld uses nftables as backend. I wonder why iptables does not list any rules while also configured to use nftables as backend. # iptables -V iptables v1.8.2 (nf_tables) # firewall-cmd --list-all |egrep -o '22|ssh' ssh
2019 Nov 12
6
[Bug 1382] New: nftables.py cmd leaking memory when ruleset contain mapping ip length to range with high limit 65535
https://bugzilla.netfilter.org/show_bug.cgi?id=1382 Bug ID: 1382 Summary: nftables.py cmd leaking memory when ruleset contain mapping ip length to range with high limit 65535 Product: nftables Version: unspecified Hardware: x86_64 OS: Gentoo Status: NEW Severity: major
2017 Mar 22
5
[Bug 1135] New: When used as a script interpreter, nft fails if extra arguments are passed
https://bugzilla.netfilter.org/show_bug.cgi?id=1135 Bug ID: 1135 Summary: When used as a script interpreter, nft fails if extra arguments are passed Product: nftables Version: unspecified Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: normal Priority: P5
2020 Jun 18
10
[Bug 1434] New: Usability improvements, enabling creation of complex firewalls
https://bugzilla.netfilter.org/show_bug.cgi?id=1434 Bug ID: 1434 Summary: Usability improvements, enabling creation of complex firewalls Product: nftables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: enhancement Priority: P5 Component: nft
2019 Jul 02
5
[Bug 1347] New: ebtables-nft: regression in -o option
https://bugzilla.netfilter.org/show_bug.cgi?id=1347 Bug ID: 1347 Summary: ebtables-nft: regression in -o option Product: nftables Version: unspecified Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: normal Priority: P5 Component: iptables over nftable Assignee: