similar to: [Bug 1273] New: hashlimit never appears to fail to match under 4.9.x

Displaying 20 results from an estimated 100 matches similar to: "[Bug 1273] New: hashlimit never appears to fail to match under 4.9.x"

2024 Mar 24
3
[Bug 1740] New: hashlimit limit: reduction to lowest terms in the output is confusing
https://bugzilla.netfilter.org/show_bug.cgi?id=1740 Bug ID: 1740 Summary: hashlimit limit: reduction to lowest terms in the output is confusing Product: iptables Version: 1.8.x Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: minor Priority: P5 Component:
2019 Feb 05
3
[Bug 1320] New: iptables hashlimit - problem with traffic limitation
https://bugzilla.netfilter.org/show_bug.cgi?id=1320 Bug ID: 1320 Summary: iptables hashlimit - problem with traffic limitation Product: iptables Version: 1.6.x Hardware: All OS: Debian GNU/Linux Status: NEW Severity: major Priority: P5 Component: iptables Assignee:
2013 May 31
0
[Bug 650] --hashlimit-burst does not update when using --hashlimit-name for a second time
https://bugzilla.netfilter.org/show_bug.cgi?id=650 Phil Oester <netfilter at linuxace.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|ASSIGNED |RESOLVED CC| |netfilter at linuxace.com Resolution|
2009 Jan 10
2
[Bug 568] New: iptables-save saves option hashlimit-htable-gcinterval with error
http://bugzilla.netfilter.org/show_bug.cgi?id=568 Summary: iptables-save saves option hashlimit-htable-gcinterval with error Product: iptables Version: unspecified Platform: All OS/Version: All Status: NEW Severity: normal Priority: P2 Component: iptables-save AssignedTo:
2018 Mar 16
0
[Bug 1235] New: Error Message "Memory allocation problem" using hashlimit match
https://bugzilla.netfilter.org/show_bug.cgi?id=1235 Bug ID: 1235 Summary: Error Message "Memory allocation problem" using hashlimit match Product: iptables Version: 1.6.x Hardware: x86_64 OS: Gentoo Status: NEW Severity: normal Priority: P5 Component:
2013 May 31
0
[Bug 650] --hashlimit-burst does not update when using --hashlimit-name for a second time
https://bugzilla.netfilter.org/show_bug.cgi?id=650 --- Comment #8 from Andre Druhmann <andre at druhmann.de> 2013-05-31 19:01:55 CEST --- Hello, thank you for your reply.I deleted the rules in between the stepps, sorry i didnt captured that on the screenshots. Your explantation to Jan makes it clear for me thanks. -- Configure bugmail:
2012 Apr 21
7
[Bug 782] New: -j LOG --log-prefix handling broken
http://bugzilla.netfilter.org/show_bug.cgi?id=782 Summary: -j LOG --log-prefix handling broken Product: iptables Version: CVS (please indicate timestamp) Platform: x86_64 OS/Version: All Status: NEW Severity: normal Priority: P5 Component: iptables-restore AssignedTo: netfilter-buglog at
2017 Jan 12
0
[Bug 1111] New: extensions: libxt_hashlimit: fix print_rate.
https://bugzilla.netfilter.org/show_bug.cgi?id=1111 Bug ID: 1111 Summary: extensions: libxt_hashlimit: fix print_rate. Product: netfilter/iptables Version: unspecified Hardware: i386 OS: All Status: NEW Severity: major Priority: P5 Component: unknown Assignee: netfilter-buglog
2018 Feb 02
0
[ANNOUNCE] iptables 1.6.2 release
Hi! The Netfilter project proudly presents: iptables 1.6.2 iptables is the userspace command line program used to configure the Linux 2.4.x and later packet filtering ruleset. It is targeted towards system administrators. This update contains accumulated bugfixes, a few new extensions and lots of translations via iptables-translate to ease migration to nftables. See ChangeLog that comes
2009 Jun 04
3
Dovecot under brute force attack - nice attacker
Hi List, optimizing the configuration on one of our servers (which was hit by a brute force attack on dovecot) showed an odd behavior. Dovecot Version 1.0.7 (CentOS 5.2) The short story: On one of our servers an attacker did a brute force attack on dovecot (pop3). Since the attacker closed and reopened the connection after every user/password combination the logs showed many lines like
2009 Jun 02
3
Dovecot under brute force attack - nice attacker
Hi List, optimizing the configuration on one of our servers (which was hit by a brute force attack on dovecot) showed an odd behavior. The short story: On one of our servers an attacker did a brute force attack on dovecot (pop3). Since the attacker closed and reopened the connection after every user/password combination the logs showed many lines like this: dovecot: pop3-login: Aborted
2009 Jun 07
2
[Bug 597] New: ip6tables connlimit - cannot set CIDR greater than 32 (includes fix)
http://bugzilla.netfilter.org/show_bug.cgi?id=597 Summary: ip6tables connlimit - cannot set CIDR greater than 32 (includes fix) Product: iptables Version: unspecified Platform: All OS/Version: All Status: NEW Severity: major Priority: P1 Component: ip6tables AssignedTo: laforge
2017 Feb 16
3
[Bug 1123] New: conntrackd will not accept connection records into kernel table from another machine
https://bugzilla.netfilter.org/show_bug.cgi?id=1123 Bug ID: 1123 Summary: conntrackd will not accept connection records into kernel table from another machine Product: conntrack-tools Version: unspecified Hardware: x86_64 OS: other Status: NEW Severity: major Priority: P5
2020 Jul 24
1
[Bug 1445] New: conntrackd: segfaults when not disabling internal cache
https://bugzilla.netfilter.org/show_bug.cgi?id=1445 Bug ID: 1445 Summary: conntrackd: segfaults when not disabling internal cache Product: conntrack-tools Version: unspecified Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: critical Priority: P5
2005 Oct 11
1
How to do network emulation on incoming traffic?
I''m trying to simulate a satellite link to a Linux server to test application performance. I haven''t used any of the tc stuff before, but I blandly assured people it would be "easy" to set up a simulated long thin pipe on a spare network interface. However, now that I''m exploring, it''s proving quite difficult. Let me start with the general question
2012 Nov 21
1
Conntrackd - fail at startup.
Hi all. I currently try to start conntrackd to test it. CentOS release 6.3 (Final) Linux lb1.local 2.6.32-279.11.1.el6.x86_64 #1 SMP Tue Oct 16 15:57:10 UTC 2012 x86_64 x86_64 x86_64 GNU/Linux This is a VirtualBox vm. I try: /usr/sbin/conntrackd -C /etc/conntrackd/conntrackd.conf -d My config: [root at lb1 log]# egrep -v '^\s*#|^$' /etc/conntrackd/conntrackd.conf | less Sync {
2016 Jun 02
0
[ANNOUNCE] nftables 0.6 release
Hi! The Netfilter project proudly presents: nftables 0.6 This release contains many accumulated bug fixes and new features availale up to the Linux 4.7-rc1 kernel release. New features ============ * Rule replacement: You can replace any rule from the unique 64-bits handle. You have to retrieve the handle from the ruleset listing. # nft list ruleset -a table ip filter { chain
2007 Oct 05
6
shaping by packet count rather than bytes ?
In wireless networks it can be handy to shape by packet rate rather than bytes/s (because capacity is packet-rate-limited). Has anyone done any work on packet-rate shaping ? Thanks.
2007 Jun 20
2
iptables question
Hi all Can iptables have log and deny rule together? if no. how can I make a deny rule and log rule and the log rule can limit the log entry eg: 200 if yes, how can I make it I am using freebsd ipfw. eg: ipfw add 22 deny log all from any to x.x.x.x thank you ____________________________________________________________________________________ Take the Internet to Go: Yahoo!Go puts the
2006 Aug 30
4
pps limit ?
Hello, list members, can i limit pps rate with linux? How? -m limit does not fit, as i understood: it can help with low rates only (is that true? any suggestions?) Thank you, -- _,-=._ /|_/| `-.} `=._,.-=-._., @ @._, `._ _,-. ) _,.-'' ` G.m-"^m`m'' Dmytro O. Redchuk