Displaying 20 results from an estimated 300 matches similar to: "[Bug 1222] New: nft list ruleset – infinite memory use"
2020 Feb 05
3
[Bug 1406] New: nft dies with an assertion of consumed > 0
https://bugzilla.netfilter.org/show_bug.cgi?id=1406
Bug ID: 1406
Summary: nft dies with an assertion of consumed > 0
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Gentoo
Status: NEW
Severity: major
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
2014 May 13
1
[Bug 935] New: Frag: problem with frag-off
https://bugzilla.netfilter.org/show_bug.cgi?id=935
Summary: Frag: problem with frag-off
Product: nftables
Version: unspecified
Platform: x86_64
OS/Version: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
Component: nft
AssignedTo: pablo at netfilter.org
ReportedBy: anarey at
2014 May 13
1
[Bug 936] New: frag: "more-fragments" and "reserved" are not identified by nftables
https://bugzilla.netfilter.org/show_bug.cgi?id=936
Summary: frag: "more-fragments" and "reserved" are not
identified by nftables
Product: nftables
Version: unspecified
Platform: x86_64
OS/Version: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
Component:
2019 Mar 30
4
[Bug 1330] New: Parse error for importing set with netmask
https://bugzilla.netfilter.org/show_bug.cgi?id=1330
Bug ID: 1330
Summary: Parse error for importing set with netmask
Product: nftables
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: major
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
2020 May 26
1
[Bug 1429] New: Empty file in source directory - 'netlink_delinearize.'
https://bugzilla.netfilter.org/show_bug.cgi?id=1429
Bug ID: 1429
Summary: Empty file in source directory -
'netlink_delinearize.'
Product: nftables
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: trivial
Priority: P5
Component: nft
2017 Oct 21
3
[Bug 1195] New: 'list ruleset' of 'nft -f' outputs garbage while 'nft list ruleset' seems to work.
https://bugzilla.netfilter.org/show_bug.cgi?id=1195
Bug ID: 1195
Summary: 'list ruleset' of 'nft -f' outputs garbage while 'nft
list ruleset' seems to work.
Product: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
2015 Sep 17
0
[ANNOUNCE] nftables 0.5 release
Hi!
The Netfilter project proudly presents:
nftables 0.5
This release contains bug fixes and new features contained up to the
4.2 kernel release.
New features
============
* Concatenations: You can combine two or more selectors to build a
tuple, then use it to look up for a matching in sets, eg.
% nft add rule ip filter input ip saddr . tcp dport { \
1.1.1.1 . 22 , \
2006 Apr 05
0
Configuration of my QoS ruleset (now working fine with u32 classifier)
Hello all,
As I have promised I am sending my QoS rules. This now works fine
with u32 classifier (and parent 1:0 that I could not understand why it
did not worked well before).
Att,
Nataniel Klug
------------------------
#!/bin/sh
#------
# Script de QoS Cyber Nett
#------
# Nataniel Klug
# suporte@cnett.com.br
#------
TC="/sbin/tc"
IPT="/usr/local/sbin/iptables"
2012 Apr 12
0
PF - pf not loading non-persist tables from main ruleset on 8.3-PRERELEASE
Hello list,
I installed a box recently and updated it to 8.3-PRERELEASE on 2012/04/11
I'm experiencing this extremely weird behavior where PF refuses to
load standard and const table definitions from the main ruleset.
- persist tables load just fine
- normal and const tables inside anchors load just fine
Does anyone else have the same problem ?
I'll try to update the kernel again,
2009 Feb 26
1
[Bug 580] New: iptables-restore and iptables-save lack comparison of a saved ruleset against the currently deployed rules
http://bugzilla.netfilter.org/show_bug.cgi?id=580
Summary: iptables-restore and iptables-save lack comparison of a
saved ruleset against the currently deployed rules
Product: iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P1
2013 Jun 24
0
[Bug 580] iptables-restore and iptables-save lack comparison of a saved ruleset against the currently deployed rules
https://bugzilla.netfilter.org/show_bug.cgi?id=580
Phil Oester <netfilter at linuxace.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
CC| |netfilter at linuxace.com
Resolution|
2013 Jun 24
0
[Bug 580] iptables-restore and iptables-save lack comparison of a saved ruleset against the currently deployed rules
https://bugzilla.netfilter.org/show_bug.cgi?id=580
Jan Engelhardt <jengelh at medozas.de> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|RESOLVED |REOPENED
Resolution|WONTFIX |
--- Comment #4 from Jan Engelhardt <jengelh at
2013 Jun 24
0
[Bug 580] iptables-restore and iptables-save lack comparison of a saved ruleset against the currently deployed rules
https://bugzilla.netfilter.org/show_bug.cgi?id=580
--- Comment #5 from Phil Oester <netfilter at linuxace.com> 2013-06-24 20:07:02 CEST ---
Unclear how you can say with certainty that this is impossible, but let's
ignore that point for the moment.
Is there some reason that iptables-save should do the sorting for userspace
scripts? Another alternative would be to always load the
2013 Jun 24
0
[Bug 580] iptables-restore and iptables-save lack comparison of a saved ruleset against the currently deployed rules
https://bugzilla.netfilter.org/show_bug.cgi?id=580
--- Comment #6 from Jan Engelhardt <jengelh at medozas.de> 2013-06-24 20:32:22 CEST ---
>Unclear how you can say with certainty that this is impossible
Right now, tables are output in permutations that are considered to be random.
(Sure there is module load order, but that is not documented, nor is it
actually a usable assumption for
2013 Jun 24
0
[Bug 580] iptables-restore and iptables-save lack comparison of a saved ruleset against the currently deployed rules
https://bugzilla.netfilter.org/show_bug.cgi?id=580
--- Comment #7 from Phil Oester <netfilter at linuxace.com> 2013-06-24 23:34:51 CEST ---
> would you be thrilled if all the rules were in random order too?
This comparison is a bit far fetched, given that ordering of rules is so
important (accept before drop, etc). The order in which tables are output in
iptables-save is largely
2013 Aug 27
0
[Bug 580] iptables-restore and iptables-save lack comparison of a saved ruleset against the currently deployed rules
https://bugzilla.netfilter.org/show_bug.cgi?id=580
Phil Oester <netfilter at linuxace.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
AssignedTo|jengelh at medozas.de |netfilter-buglog at lists.netf
| |ilter.org
--
Configure
2024 Nov 19
1
[Bug 1781] New: Optimisation fails for raw payload expressions in a valid ruleset
https://bugzilla.netfilter.org/show_bug.cgi?id=1781
Bug ID: 1781
Summary: Optimisation fails for raw payload expressions in a
valid ruleset
Product: nftables
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: nft
2019 Jul 05
2
[Bug 1349] New: "nft list ruleset" shows rules twice
https://bugzilla.netfilter.org/show_bug.cgi?id=1349
Bug ID: 1349
Summary: "nft list ruleset" shows rules twice
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: minor
Priority: P5
Component: nft
Assignee: pablo at
2006 Jan 26
0
Profiling hotspots in my tc filter ruleset
Hi,
after I saw that my machine was having problems to forward
more than 200 Mbit/s, I decided to profile the kernel and
find out the hotspots. This is what I found:
[...]
1028 bridge.ko __br_forward
1033 bridge.ko br_nf_forward_finish
1074 bridge.ko ip_sabotage_in
1119 ebtable_filter.ko ebt_hook
1177 sky2.ko
2020 Oct 26
3
[Bug 1477] New: Unable to use saved ruleset when using dynamic sets
https://bugzilla.netfilter.org/show_bug.cgi?id=1477
Bug ID: 1477
Summary: Unable to use saved ruleset when using dynamic sets
Product: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: nft
Assignee: pablo at