Displaying 20 results from an estimated 1000 matches similar to: "[Bug 1320] New: iptables hashlimit - problem with traffic limitation"
2024 Mar 24
3
[Bug 1740] New: hashlimit limit: reduction to lowest terms in the output is confusing
https://bugzilla.netfilter.org/show_bug.cgi?id=1740
Bug ID: 1740
Summary: hashlimit limit: reduction to lowest terms in the
output is confusing
Product: iptables
Version: 1.8.x
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: minor
Priority: P5
Component:
2018 Jul 26
1
[Bug 1273] New: hashlimit never appears to fail to match under 4.9.x
https://bugzilla.netfilter.org/show_bug.cgi?id=1273
Bug ID: 1273
Summary: hashlimit never appears to fail to match under 4.9.x
Product: netfilter/iptables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: major
Priority: P5
Component: ip_tables (kernel)
2013 May 31
0
[Bug 650] --hashlimit-burst does not update when using --hashlimit-name for a second time
https://bugzilla.netfilter.org/show_bug.cgi?id=650
Phil Oester <netfilter at linuxace.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|ASSIGNED |RESOLVED
CC| |netfilter at linuxace.com
Resolution|
2009 Jan 10
2
[Bug 568] New: iptables-save saves option hashlimit-htable-gcinterval with error
http://bugzilla.netfilter.org/show_bug.cgi?id=568
Summary: iptables-save saves option hashlimit-htable-gcinterval
with error
Product: iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: iptables-save
AssignedTo:
2018 Mar 16
0
[Bug 1235] New: Error Message "Memory allocation problem" using hashlimit match
https://bugzilla.netfilter.org/show_bug.cgi?id=1235
Bug ID: 1235
Summary: Error Message "Memory allocation problem" using
hashlimit match
Product: iptables
Version: 1.6.x
Hardware: x86_64
OS: Gentoo
Status: NEW
Severity: normal
Priority: P5
Component:
2013 May 31
0
[Bug 650] --hashlimit-burst does not update when using --hashlimit-name for a second time
https://bugzilla.netfilter.org/show_bug.cgi?id=650
--- Comment #8 from Andre Druhmann <andre at druhmann.de> 2013-05-31 19:01:55 CEST ---
Hello,
thank you for your reply.I deleted the rules in between the stepps, sorry i
didnt captured that on the screenshots.
Your explantation to Jan makes it clear for me thanks.
--
Configure bugmail:
2005 Oct 17
3
Kernel Audit Messages
Since updating to 4.2 my Opteron server has been flooded by messages like:
audit(1129565701.837:155): user pid=4700 uid=0 auid=4294967295 msg='PAM session open:
user=root exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron result=Success)'
to both /var/log/messages and the kernel ring buffer. Looks like they are being
generated by cron jobs being run on the server.
Does
2012 Apr 21
7
[Bug 782] New: -j LOG --log-prefix handling broken
http://bugzilla.netfilter.org/show_bug.cgi?id=782
Summary: -j LOG --log-prefix handling broken
Product: iptables
Version: CVS (please indicate timestamp)
Platform: x86_64
OS/Version: All
Status: NEW
Severity: normal
Priority: P5
Component: iptables-restore
AssignedTo: netfilter-buglog at
2017 Jan 12
0
[Bug 1111] New: extensions: libxt_hashlimit: fix print_rate.
https://bugzilla.netfilter.org/show_bug.cgi?id=1111
Bug ID: 1111
Summary: extensions: libxt_hashlimit: fix print_rate.
Product: netfilter/iptables
Version: unspecified
Hardware: i386
OS: All
Status: NEW
Severity: major
Priority: P5
Component: unknown
Assignee: netfilter-buglog
2018 Feb 02
0
[ANNOUNCE] iptables 1.6.2 release
Hi!
The Netfilter project proudly presents:
iptables 1.6.2
iptables is the userspace command line program used to configure the
Linux 2.4.x and later packet filtering ruleset. It is targeted towards
system administrators.
This update contains accumulated bugfixes, a few new extensions and
lots of translations via iptables-translate to ease migration to
nftables.
See ChangeLog that comes
2009 Jun 04
3
Dovecot under brute force attack - nice attacker
Hi List,
optimizing the configuration on one of our servers (which was
hit by a brute force attack on dovecot) showed an odd behavior.
Dovecot Version 1.0.7 (CentOS 5.2)
The short story:
On one of our servers an attacker did a brute force
attack on dovecot (pop3).
Since the attacker closed and reopened the connection
after every user/password combination the logs showed
many lines like
2007 Jun 11
20
[Bug 1320] New: Add support for ldns
http://bugzilla.mindrot.org/show_bug.cgi?id=1320
Summary: Add support for ldns
Product: Portable OpenSSH
Version: -current
Platform: Other
OS/Version: Linux
Status: NEW
Severity: enhancement
Priority: P2
Component: ssh
AssignedTo: bitbucket at mindrot.org
ReportedBy: svallet at
2005 Oct 27
3
calendars
Hi
what do you guys use for shared calendars these days? I've been using
corporate time but that is now part of Oracle suite so looking for an
alternative that is hopefully open source/free to complete my 'get away from
exchange' package.
thanks
2009 Jun 02
3
Dovecot under brute force attack - nice attacker
Hi List,
optimizing the configuration on one of our servers (which was
hit by a brute force attack on dovecot) showed an odd behavior.
The short story:
On one of our servers an attacker did a brute force
attack on dovecot (pop3).
Since the attacker closed and reopened the connection
after every user/password combination the logs showed
many lines like this:
dovecot: pop3-login: Aborted
2007 Sep 25
0
Bug#444007: CVE-2007-1320 multiple heap based buffer overflows
Package: xen-3.0
Version: 3.0.3-0-2
Severity: grave
Tags: security
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for xen-3.0.
CVE-2007-1320[0]:
| Multiple heap-based buffer overflows in the cirrus_invalidate_region
| function in the Cirrus VGA extension in QEMU 0.8.2 might allow local
| users to execute arbitrary code via unspecified vectors related to
|
2012 Oct 03
0
CEBA-2012:1320 CentOS 6 dvd+rw-tools FASTTRACK Update
CentOS Errata and Bugfix Advisory 2012:1320
Upstream details at : https://rhn.redhat.com/errata/RHBA-2012-1320.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
68f0f297d208a999d5bbb909c95f288dc925f5bd54f7015125ef356448ac9115 dvd+rw-tools-7.1-6.el6.i686.rpm
x86_64:
2017 May 26
0
CEBA-2017:1320 CentOS 7 accountsservice BugFix Update
CentOS Errata and Bugfix Advisory 2017:1320
Upstream details at : https://rhn.redhat.com/errata/RHBA-2017-1320.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
c632eef3057f07075b7570470a63c50a0e75e409b2a00cf6a382cd8dd7f512ec accountsservice-0.6.35-14.el7_3.x86_64.rpm
2009 Jun 07
2
[Bug 597] New: ip6tables connlimit - cannot set CIDR greater than 32 (includes fix)
http://bugzilla.netfilter.org/show_bug.cgi?id=597
Summary: ip6tables connlimit - cannot set CIDR greater than 32
(includes fix)
Product: iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: major
Priority: P1
Component: ip6tables
AssignedTo: laforge
2008 Apr 04
6
PDC migration: printing trouble.
Hi all,
we've been moving an old Samba 2.2.x PDC install to a Samba 3.0.28 PDC
install. We copied the ntdrivers.tdb and ntprinters.tdb from to old to the new
server. After the migration, everything was just fine, except printing seemed
to be somewhat slower. As more and more user logged on, the machine got really
sluggish and printing took quite long. We figured out we've got bitten
2016 Aug 02
0
[Bug 1320] Add support for ldns
https://bugzilla.mindrot.org/show_bug.cgi?id=1320
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|RESOLVED |CLOSED
--- Comment #16 from Damien Miller <djm at mindrot.org> ---
Close all resolved bugs after 7.3p1 release