Displaying 20 results from an estimated 500 matches similar to: "[Bug 1290] New: ptables: nftables layer breaks ipsec/policy keyword"
2024 Oct 29
21
[Bug 1777] New: Error: COMMAND_FAILED: 'python-nftables' failed
https://bugzilla.netfilter.org/show_bug.cgi?id=1777
Bug ID: 1777
Summary: Error: COMMAND_FAILED: 'python-nftables' failed
Product: nftables
Version: 1.0.x
Hardware: arm
OS: Debian GNU/Linux
Status: NEW
Severity: blocker
Priority: P5
Component: kernel
Assignee: pablo at
2013 Sep 26
2
[Bug 854] New: xtables_ipmask_to_cidr error code leaks into output of iptables --list
https://bugzilla.netfilter.org/show_bug.cgi?id=854
Summary: xtables_ipmask_to_cidr error code leaks into output of
iptables --list
Product: iptables
Version: 1.4.x
Platform: x86_64
OS/Version: Debian GNU/Linux
Status: NEW
Severity: trivial
Priority: P5
Component: iptables
2018 Jun 21
6
[Bug 1263] New: Device or resource busy on nat loading.
https://bugzilla.netfilter.org/show_bug.cgi?id=1263
Bug ID: 1263
Summary: Device or resource busy on nat loading.
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Gentoo
Status: NEW
Severity: normal
Priority: P5
Component: kernel
Assignee: pablo at netfilter.org
2016 Dec 24
6
[Bug 1105] New: masquerade fully broken when no prerouting chain is created
https://bugzilla.netfilter.org/show_bug.cgi?id=1105
Bug ID: 1105
Summary: masquerade fully broken when no prerouting chain is
created
Product: nftables
Version: unspecified
Hardware: x86_64
OS: other
Status: NEW
Severity: major
Priority: P5
Component: kernel
2018 Nov 24
5
[Bug 1303] New: nft improperly merges intervals
https://bugzilla.netfilter.org/show_bug.cgi?id=1303
Bug ID: 1303
Summary: nft improperly merges intervals
Product: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: critical
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
2016 Dec 31
1
[Bug 1108] New: Need a new release to build nftables --with-xtables
https://bugzilla.netfilter.org/show_bug.cgi?id=1108
Bug ID: 1108
Summary: Need a new release to build nftables --with-xtables
Product: iptables
Version: CVS (please indicate timestamp)
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: iptables
2018 Feb 02
0
[ANNOUNCE] nftables 0.8.2 release
Hi!
The Netfilter project proudly presents:
nftables 0.8.2
This release fixes ./configure --with-xtables that enables interaction
between iptables-compat [1] and nft, and it also includes a bunch of
documentation updates.
This release introduces a new explicit option for interval sets, that
enables auto-merge of adjacent/overlapping elements when adding them to
the set, eg.
table
2013 Jun 05
8
btrfs raid1 on 16TB goes read-only after "btrfs: block rsv returned -28"
Dear Devs,
I have x4 4TB HDDs formatted with:
mkfs.btrfs -L bu-16TB_0 -d raid1 -m raid1 /dev/sd[cdef]
/etc/fstab mounts with the options:
noatime,noauto,space_cache,inode_cache
All on kernel 3.8.13.
Upon using rsync to copy some heavily hardlinked backups from ReiserFS,
I''ve seen:
The following "block rsv returned -28" is repeated 7 times until there
is a call trace
2014 May 26
2
nwfilter usage
I'm trying to accomplish what I had hoped would be a fairly simple
filtering of traffic to my VMs, but I'm hitting a snag. The VMs are
allowing traffic when I wouldn't expect them to.
Host and Guest are both running the same platform:
Ubuntu 12.04.4 LTS
0.9.8-2ubuntu17.19
I have a basic bridge enabled on the host:
brctl addbr brdg
brctl addif brdg eth1
ip link set brdg up
The host
2013 May 29
1
[ANNOUNCE] iptables 1.4.19 release
Hi!
The Netfilter project proudly presents:
iptables 1.4.19
This release includes support for the new connlabel and bpf matches
available in Linux 3.9, several fixes and manpage updates.
See ChangeLog that comes attached to this email for more details.
You can download it from:
http://www.netfilter.org/projects/iptables/downloads.html
ftp://ftp.netfilter.org/pub/iptables/
Have fun!
2018 Aug 07
2
id <username> - doesnt list all groups
Thank for your answer:
But i dont know understand why is following not working:
I want to restrict the ssh access for a special domain member:
In my "sshd_config" i added:
AllowGroups restrictaccess root
With user2 im able to login via ssh!
log: pam_krb5(sshd:auth): user user2 authenticated as user2 at ROOTRUDI.DE
With user1 im not!
log: User user1 from 192.168.0.100 not allowed
2020 Apr 14
1
[PATCH v2] Fix: buffer overflow during hvc_alloc().
From: Andrew Melnychenko <andrew at daynix.com>
If there is a lot(more then 16) of virtio-console devices
or virtio_console module is reloaded
- buffers 'vtermnos' and 'cons_ops' are overflowed.
In older kernels it overruns spinlock which leads to kernel freezing:
https://bugzilla.redhat.com/show_bug.cgi?id=1786239
To reproduce the issue, you can try simple script that
2010 Aug 03
3
[ANNOUNCE]: Release of iptables-1.4.9
The netfilter coreteam presents:
iptables version 1.4.9
the iptables release for the 2.6.35 kernel. Changes include:
- support for the LED target, which hadn't been merged so far because
the kernel module had some bugs
- a new version of the set extension for the upcoming release supporting
IPv6
- negation support for the quota match
- support for the SACK-IMMEDIATELY SCTP
2014 Jan 30
2
CentOS 6.5: NFS server crashes with list_add corruption errors
Hi,
I'm running CentOS 6.5 as NFS server (v3 and v4) and exporting Ext4 and
XFS filesystem.
After many months that all works fine today the server crash:
Jan 30 09:46:13 qb-storage kernel: ------------[ cut here ]------------
Jan 30 09:46:13 qb-storage kernel: WARNING: at lib/list_debug.c:26
__list_add+0x6d/0xa0() (Not tainted)
Jan 30 09:46:13 qb-storage kernel: Hardware name: PowerEdge
2008 Feb 25
1
invalid opcode on Dom0
We have a (supposedly) quite standard setup: 2 Dom0 with drbd-on-lvm and a
bunch of DomU, on Quad Xeon Dell servers.
We tried with both sid-based and etch-based (+ 3.1 xen hypervisor and drbd 8
from backports.org ) Dom0, and quite consistently have "kernel: invalid
opcode: 0000 [1] SMP" errors which freezes Dom0 (during lasts tests a simple
start-and-stop loop of 10 DomU can trigger
2023 Jul 26
0
[Bug 1501] issue with DNAT port range
https://bugzilla.netfilter.org/show_bug.cgi?id=1501
Phil Sutter <phil at nwl.cc> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |phil at nwl.cc
--- Comment #7 from Phil Sutter <phil at nwl.cc> ---
Hi,
(In reply to marco.drummer from comment
2014 May 28
3
Re: nwfilter usage
On 05/27/2014 02:46 AM, Brian Rak wrote:
> Make sure you have:
>
> /proc/sys/net/bridge/bridge-nf-call-iptables = 1
That doesn't make sense. bridge-nf-call-iptables controls whether or not
traffic going across a Linux host bridge device will be sent through
iptables, but the rules created by nwfilter are applied to the "vnetX"
tap devices that connect the guest to the
2011 Apr 03
6
[Bug 713] New: CPPFLAGS are mishandled which breaks non-shared targets
http://bugzilla.netfilter.org/show_bug.cgi?id=713
Summary: CPPFLAGS are mishandled which breaks non-shared targets
Product: iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P5
Component: unknown
AssignedTo: netfilter-buglog at
2014 Apr 14
0
[ANNOUNCE]: Release of nftables 0.2
The netfilter project presents:
nftables 0.2
This release contains a rather large number of bug fixes, syntax cleanups,
new features, support for all new features contained in the recent 3.14
kernel release as well as *drumroll* documentation.
Syntax changes
==============
* More consistency in data type names
Data type names are used in set declarations. All address related types
now
2020 Apr 01
0
[ANNOUNCE] nftables 0.9.4 release
Hi!
The Netfilter project proudly presents:
nftables 0.9.4
This release contains fixes and new features available up to the Linux
kernel 5.6 release.
* Support for ranges in concatenations (requires Linux kernel >= 5.6),
e.g.
table ip foo {
set whitelist {
type ipv4_addr . ipv4_addr . inet_service
flags interval