similar to: [Bug 1322] New: Accepting in an nfqueue breaks multi-chain processing

Displaying 20 results from an estimated 3000 matches similar to: "[Bug 1322] New: Accepting in an nfqueue breaks multi-chain processing"

2024 Apr 03
10
[Bug 1742] New: using nfqueue breaks SCTP connection (tracking)
https://bugzilla.netfilter.org/show_bug.cgi?id=1742 Bug ID: 1742 Summary: using nfqueue breaks SCTP connection (tracking) Product: libnetfilter_queue Version: unspecified Hardware: All OS: All Status: NEW Severity: normal Priority: P5 Component: libnetfilter_queue Assignee:
2014 Dec 30
1
[Bug 992] New: Missing space between NFQUEUE extra parameters
https://bugzilla.netfilter.org/show_bug.cgi?id=992 Bug ID: 992 Summary: Missing space between NFQUEUE extra parameters Product: iptables Version: 1.4.x Hardware: x86_64 OS: Ubuntu Status: NEW Severity: enhancement Priority: P5 Component: iptables-save Assignee:
2014 May 13
0
[Bug 939] New: extensions: NFQUEUE: missing cpu-fanout
https://bugzilla.netfilter.org/show_bug.cgi?id=939 Summary: extensions: NFQUEUE: missing cpu-fanout Product: netfilter/iptables Version: linux-2.6.x Platform: x86_64 OS/Version: Debian GNU/Linux Status: NEW Severity: enhancement Priority: P5 Component: ip_tables (kernel) AssignedTo:
2011 Dec 27
1
Netfilter QUEUE (NFQUEUE) Support on XEN based VPS
Hi all, I have been trying to run an IDS system on OpenVZ based VPS which requires that I run this IPTABLES command : iptables -A FORWARD -j NFQUEUE However, so far I have not suceeded. I always get this errors: iptables: Unknown error 4294967295 Even when the NFQUEUE  IP modules was enabled by the VPS provider, I still get these errors and this appears to be OpenVZ bug.  So I want to
2024 Aug 26
13
[Bug 1766] New: nfqueue randomly drops packets with same tuple
https://bugzilla.netfilter.org/show_bug.cgi?id=1766 Bug ID: 1766 Summary: nfqueue randomly drops packets with same tuple Product: netfilter/iptables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: major Priority: P5 Component: netfilter hooks Assignee:
2018 Jun 27
3
[Bug 1265] New: Creating named sets concatenating ifname and anything else does not work
https://bugzilla.netfilter.org/show_bug.cgi?id=1265 Bug ID: 1265 Summary: Creating named sets concatenating ifname and anything else does not work Product: nftables Version: unspecified Hardware: All OS: All Status: NEW Severity: normal Priority: P5 Component: nft
2013 Apr 11
1
[Bug 778] NFQUEUE --queue-bypass accepts all packets when no userspace application is available
https://bugzilla.netfilter.org/show_bug.cgi?id=778 Florian Westphal <fw at strlen.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |ASSIGNED CC| |fw at strlen.de --- Comment #1 from Florian Westphal
2011 Mar 07
2
[Bug 708] New: Some accepted packets get lost
http://bugzilla.netfilter.org/show_bug.cgi?id=708 Summary: Some accepted packets get lost Product: libnetfilter_queue Version: unspecified Platform: x86_64 OS/Version: Debian GNU/Linux Status: NEW Severity: normal Priority: P3 Component: libnetfilter_queue AssignedTo: netfilter-buglog at
2009 Jan 19
1
Non-linear skbs apparently prevent NFQUEUE from working properly
Dear list members (especially Xen network wizards), I''m using the netfilter_queue mechanism to modify packets on the wire that are sent from one domU to another while they travel over the dom0 bridge. This has worked fine as long as I was tinkering with UDP packets only - but when I try to reinject TCP frames with an increased length, I run into a BUG() because
2012 Apr 25
1
forwarding packets to service in same host without using loopback network
This question is not about linux usage. But still i think user list is a good crowd for linux programmer. So here it goes. I have this libnetfilter_queue application which receives packets from kernel based on some iptables rule. Before going straight to my problem, i'm giving a sample workable code and other tools to set up a test environment so that We problem definition and possible
2007 Nov 20
3
Shorewall 4.1.0
I''ve opened up development of Shorewall 4.1. While I had previously announced that Shorewall 4.1 would focus on IPv6, I have since learned that the netfilter team are developing ''xtables'', a unified IP0v4/IPv6 utility. It seems silly to spend the effort to add Shorewall support for IPv6 only to then have to turn around and convert it to use xtables. So I''ve
2013 Aug 02
1
[Bug 837] New: Large ICMP packets are lost
https://bugzilla.netfilter.org/show_bug.cgi?id=837 Summary: Large ICMP packets are lost Product: libnetfilter_queue Version: unspecified Platform: x86_64 OS/Version: other Status: NEW Severity: normal Priority: P5 Component: libnetfilter_queue AssignedTo: netfilter-buglog at lists.netfilter.org
2020 Aug 27
0
[Bug 1455] New: Queue verdict cannot be used in vmap
https://bugzilla.netfilter.org/show_bug.cgi?id=1455 Bug ID: 1455 Summary: Queue verdict cannot be used in vmap Product: nftables Version: unspecified Hardware: arm OS: Ubuntu Status: NEW Severity: normal Priority: P5 Component: nft Assignee: pablo at netfilter.org
2014 May 19
6
[Bug 941] New: --queue-balance sending all traffic to queue 0
https://bugzilla.netfilter.org/show_bug.cgi?id=941 Summary: --queue-balance sending all traffic to queue 0 Product: netfilter/iptables Version: linux-2.6.x Platform: x86_64 OS/Version: other Status: NEW Severity: normal Priority: P5 Component: nfnetlink_queue AssignedTo: netfilter-buglog at
2012 Jan 14
0
iptable rule for bypassing netfilter queue for a matching address.‏
I have two iptable rules for userspace modification : iptable -t mangle -A PREROUTING -p udp --dport 9090 -j NFQUEUE iptable -t mangle -A OUTPUT -p udp --sport 9090 -j NFQUEUE I have the following network setup: client ---------------->Linux Box or router--------------------->server. What i'm trying to achieve is modifying all packets which comes from client to 9090 port of the
2020 Jul 08
3
[Bug 1440] New: kernel oops allowing a connection with nfq_set_verdict() on kernel 5.7.x with hardening parameters
https://bugzilla.netfilter.org/show_bug.cgi?id=1440 Bug ID: 1440 Summary: kernel oops allowing a connection with nfq_set_verdict() on kernel 5.7.x with hardening parameters Product: libnetfilter_queue Version: unspecified Hardware: x86_64 OS: Debian GNU/Linux Status: NEW
2019 Sep 05
4
[Bug 1364] New: nft list outputs mark rules with boolean or in a form that can be parsed by nft -f
https://bugzilla.netfilter.org/show_bug.cgi?id=1364 Bug ID: 1364 Summary: nft list outputs mark rules with boolean or in a form that can be parsed by nft -f Product: nftables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: normal Priority: P5
2011 May 26
1
[ANNOUNCE]: Release of iptables-1.4.11
The netfilter coreteam presents: iptables version 1.4.10 the iptables release for the 2.6.39 kernels. Due to some mistakes on my side we didn't have a release for longer than expected, so this contains a rather large number of changes. Changes include: - various bugfixes, cleanups and documentation updates - a new "guided option parser" from Jan, replacing a lot of the
2014 Mar 25
1
Routing
Hello, I think routing could be improved in several ways, at least, there lacks some documentation describing how Tinc routes packets. In order to test Tinc, I setup the following virtual network: - tinc 1.1pre9 with ExperimentalProtocol=yes - use of network namespaces (actually python-nemu[1]) - star topology, where all nodes runs tinc except the center, which I use to filter communications,
2016 May 12
3
[Bug 1066] New: nfq_get_timestamp() not setting timeval struc
https://bugzilla.netfilter.org/show_bug.cgi?id=1066 Bug ID: 1066 Summary: nfq_get_timestamp() not setting timeval struc Product: libnetfilter_queue Version: unspecified Hardware: x86_64 OS: Ubuntu Status: NEW Severity: normal Priority: P5 Component: libnetfilter_queue