Displaying 20 results from an estimated 100 matches similar to: "[Bug 1273] New: hashlimit never appears to fail to match under 4.9.x"
2024 Mar 24
3
[Bug 1740] New: hashlimit limit: reduction to lowest terms in the output is confusing
https://bugzilla.netfilter.org/show_bug.cgi?id=1740
Bug ID: 1740
Summary: hashlimit limit: reduction to lowest terms in the
output is confusing
Product: iptables
Version: 1.8.x
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: minor
Priority: P5
Component:
2019 Feb 05
3
[Bug 1320] New: iptables hashlimit - problem with traffic limitation
https://bugzilla.netfilter.org/show_bug.cgi?id=1320
Bug ID: 1320
Summary: iptables hashlimit - problem with traffic limitation
Product: iptables
Version: 1.6.x
Hardware: All
OS: Debian GNU/Linux
Status: NEW
Severity: major
Priority: P5
Component: iptables
Assignee:
2013 May 31
0
[Bug 650] --hashlimit-burst does not update when using --hashlimit-name for a second time
https://bugzilla.netfilter.org/show_bug.cgi?id=650
Phil Oester <netfilter at linuxace.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|ASSIGNED |RESOLVED
CC| |netfilter at linuxace.com
Resolution|
2009 Jan 10
2
[Bug 568] New: iptables-save saves option hashlimit-htable-gcinterval with error
http://bugzilla.netfilter.org/show_bug.cgi?id=568
Summary: iptables-save saves option hashlimit-htable-gcinterval
with error
Product: iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: iptables-save
AssignedTo:
2018 Mar 16
0
[Bug 1235] New: Error Message "Memory allocation problem" using hashlimit match
https://bugzilla.netfilter.org/show_bug.cgi?id=1235
Bug ID: 1235
Summary: Error Message "Memory allocation problem" using
hashlimit match
Product: iptables
Version: 1.6.x
Hardware: x86_64
OS: Gentoo
Status: NEW
Severity: normal
Priority: P5
Component:
2013 May 31
0
[Bug 650] --hashlimit-burst does not update when using --hashlimit-name for a second time
https://bugzilla.netfilter.org/show_bug.cgi?id=650
--- Comment #8 from Andre Druhmann <andre at druhmann.de> 2013-05-31 19:01:55 CEST ---
Hello,
thank you for your reply.I deleted the rules in between the stepps, sorry i
didnt captured that on the screenshots.
Your explantation to Jan makes it clear for me thanks.
--
Configure bugmail:
2012 Apr 21
7
[Bug 782] New: -j LOG --log-prefix handling broken
http://bugzilla.netfilter.org/show_bug.cgi?id=782
Summary: -j LOG --log-prefix handling broken
Product: iptables
Version: CVS (please indicate timestamp)
Platform: x86_64
OS/Version: All
Status: NEW
Severity: normal
Priority: P5
Component: iptables-restore
AssignedTo: netfilter-buglog at
2017 Jan 12
0
[Bug 1111] New: extensions: libxt_hashlimit: fix print_rate.
https://bugzilla.netfilter.org/show_bug.cgi?id=1111
Bug ID: 1111
Summary: extensions: libxt_hashlimit: fix print_rate.
Product: netfilter/iptables
Version: unspecified
Hardware: i386
OS: All
Status: NEW
Severity: major
Priority: P5
Component: unknown
Assignee: netfilter-buglog
2018 Feb 02
0
[ANNOUNCE] iptables 1.6.2 release
Hi!
The Netfilter project proudly presents:
iptables 1.6.2
iptables is the userspace command line program used to configure the
Linux 2.4.x and later packet filtering ruleset. It is targeted towards
system administrators.
This update contains accumulated bugfixes, a few new extensions and
lots of translations via iptables-translate to ease migration to
nftables.
See ChangeLog that comes
2009 Jun 04
3
Dovecot under brute force attack - nice attacker
Hi List,
optimizing the configuration on one of our servers (which was
hit by a brute force attack on dovecot) showed an odd behavior.
Dovecot Version 1.0.7 (CentOS 5.2)
The short story:
On one of our servers an attacker did a brute force
attack on dovecot (pop3).
Since the attacker closed and reopened the connection
after every user/password combination the logs showed
many lines like
2009 Jun 02
3
Dovecot under brute force attack - nice attacker
Hi List,
optimizing the configuration on one of our servers (which was
hit by a brute force attack on dovecot) showed an odd behavior.
The short story:
On one of our servers an attacker did a brute force
attack on dovecot (pop3).
Since the attacker closed and reopened the connection
after every user/password combination the logs showed
many lines like this:
dovecot: pop3-login: Aborted
2009 Jun 07
2
[Bug 597] New: ip6tables connlimit - cannot set CIDR greater than 32 (includes fix)
http://bugzilla.netfilter.org/show_bug.cgi?id=597
Summary: ip6tables connlimit - cannot set CIDR greater than 32
(includes fix)
Product: iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: major
Priority: P1
Component: ip6tables
AssignedTo: laforge
[Bug 1123] New: conntrackd will not accept connection records into kernel table from another machine
2017 Feb 16
3
[Bug 1123] New: conntrackd will not accept connection records into kernel table from another machine
https://bugzilla.netfilter.org/show_bug.cgi?id=1123
Bug ID: 1123
Summary: conntrackd will not accept connection records into
kernel table from another machine
Product: conntrack-tools
Version: unspecified
Hardware: x86_64
OS: other
Status: NEW
Severity: major
Priority: P5
2020 Jul 24
1
[Bug 1445] New: conntrackd: segfaults when not disabling internal cache
https://bugzilla.netfilter.org/show_bug.cgi?id=1445
Bug ID: 1445
Summary: conntrackd: segfaults when not disabling internal
cache
Product: conntrack-tools
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: critical
Priority: P5
2005 Oct 11
1
How to do network emulation on incoming traffic?
I''m trying to simulate a satellite link to a Linux server to test
application performance. I haven''t used any of the tc stuff before,
but I blandly assured people it would be "easy" to set up a simulated
long thin pipe on a spare network interface.
However, now that I''m exploring, it''s proving quite difficult.
Let me start with the general question
2012 Nov 21
1
Conntrackd - fail at startup.
Hi all.
I currently try to start conntrackd to test it.
CentOS release 6.3 (Final)
Linux lb1.local 2.6.32-279.11.1.el6.x86_64 #1 SMP Tue Oct 16 15:57:10 UTC
2012 x86_64 x86_64 x86_64 GNU/Linux
This is a VirtualBox vm.
I try:
/usr/sbin/conntrackd -C /etc/conntrackd/conntrackd.conf -d
My config:
[root at lb1 log]# egrep -v '^\s*#|^$' /etc/conntrackd/conntrackd.conf | less
Sync {
2016 Jun 02
0
[ANNOUNCE] nftables 0.6 release
Hi!
The Netfilter project proudly presents:
nftables 0.6
This release contains many accumulated bug fixes and new features
availale up to the Linux 4.7-rc1 kernel release.
New features
============
* Rule replacement: You can replace any rule from the unique 64-bits
handle. You have to retrieve the handle from the ruleset listing.
# nft list ruleset -a
table ip filter {
chain
2007 Oct 05
6
shaping by packet count rather than bytes ?
In wireless networks it can be handy to shape by packet rate
rather than bytes/s (because capacity is packet-rate-limited).
Has anyone done any work on packet-rate shaping ?
Thanks.
2007 Jun 20
2
iptables question
Hi all
Can iptables have log and deny rule together?
if no. how can I make a deny rule and log rule
and the log rule can limit the log entry eg: 200
if yes, how can I make it
I am using freebsd ipfw.
eg: ipfw add 22 deny log all from any to x.x.x.x
thank you
____________________________________________________________________________________
Take the Internet to Go: Yahoo!Go puts the
2006 Aug 30
4
pps limit ?
Hello, list members,
can i limit pps rate with linux? How?
-m limit does not fit, as i understood: it can help with low rates only
(is that true? any suggestions?)
Thank you,
--
_,-=._ /|_/|
`-.} `=._,.-=-._., @ @._,
`._ _,-. ) _,.-''
` G.m-"^m`m'' Dmytro O. Redchuk