Displaying 20 results from an estimated 3000 matches similar to: "[Bug 1322] New: Accepting in an nfqueue breaks multi-chain processing"
2024 Apr 03
10
[Bug 1742] New: using nfqueue breaks SCTP connection (tracking)
https://bugzilla.netfilter.org/show_bug.cgi?id=1742
Bug ID: 1742
Summary: using nfqueue breaks SCTP connection (tracking)
Product: libnetfilter_queue
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: libnetfilter_queue
Assignee:
2014 Dec 30
1
[Bug 992] New: Missing space between NFQUEUE extra parameters
https://bugzilla.netfilter.org/show_bug.cgi?id=992
Bug ID: 992
Summary: Missing space between NFQUEUE extra parameters
Product: iptables
Version: 1.4.x
Hardware: x86_64
OS: Ubuntu
Status: NEW
Severity: enhancement
Priority: P5
Component: iptables-save
Assignee:
2014 May 13
0
[Bug 939] New: extensions: NFQUEUE: missing cpu-fanout
https://bugzilla.netfilter.org/show_bug.cgi?id=939
Summary: extensions: NFQUEUE: missing cpu-fanout
Product: netfilter/iptables
Version: linux-2.6.x
Platform: x86_64
OS/Version: Debian GNU/Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: ip_tables (kernel)
AssignedTo:
2011 Dec 27
1
Netfilter QUEUE (NFQUEUE) Support on XEN based VPS
Hi all,
I have been trying to run an IDS system on OpenVZ based VPS which requires that I run this IPTABLES command :
iptables -A FORWARD -j NFQUEUE
However, so far I have not suceeded. I always get this errors:
iptables: Unknown error 4294967295
Even when the NFQUEUE IP modules was enabled by the VPS provider, I still get these errors and this appears to be OpenVZ bug.
So I want to
2024 Aug 26
13
[Bug 1766] New: nfqueue randomly drops packets with same tuple
https://bugzilla.netfilter.org/show_bug.cgi?id=1766
Bug ID: 1766
Summary: nfqueue randomly drops packets with same tuple
Product: netfilter/iptables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: major
Priority: P5
Component: netfilter hooks
Assignee:
2018 Jun 27
3
[Bug 1265] New: Creating named sets concatenating ifname and anything else does not work
https://bugzilla.netfilter.org/show_bug.cgi?id=1265
Bug ID: 1265
Summary: Creating named sets concatenating ifname and anything
else does not work
Product: nftables
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: nft
2013 Apr 11
1
[Bug 778] NFQUEUE --queue-bypass accepts all packets when no userspace application is available
https://bugzilla.netfilter.org/show_bug.cgi?id=778
Florian Westphal <fw at strlen.de> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |ASSIGNED
CC| |fw at strlen.de
--- Comment #1 from Florian Westphal
2011 Mar 07
2
[Bug 708] New: Some accepted packets get lost
http://bugzilla.netfilter.org/show_bug.cgi?id=708
Summary: Some accepted packets get lost
Product: libnetfilter_queue
Version: unspecified
Platform: x86_64
OS/Version: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P3
Component: libnetfilter_queue
AssignedTo: netfilter-buglog at
2009 Jan 19
1
Non-linear skbs apparently prevent NFQUEUE from working properly
Dear list members (especially Xen network wizards),
I''m using the netfilter_queue mechanism to modify packets on the wire that
are sent from one domU to another while they travel over the dom0 bridge.
This has worked fine as long as I was tinkering with UDP packets only -
but when I try to reinject TCP frames with an increased length, I run into
a BUG() because
2012 Apr 25
1
forwarding packets to service in same host without using loopback network
This question is not about linux usage. But still i think user list
is a good crowd for linux programmer. So here it goes.
I have this libnetfilter_queue application which receives packets from
kernel based on some iptables rule. Before going straight to my
problem, i'm giving a sample workable code and other tools to set up a
test environment so that We problem definition and possible
2007 Nov 20
3
Shorewall 4.1.0
I''ve opened up development of Shorewall 4.1.
While I had previously announced that Shorewall 4.1 would focus on IPv6, I
have since learned that the netfilter team are developing ''xtables'', a
unified IP0v4/IPv6 utility. It seems silly to spend the effort to add
Shorewall support for IPv6 only to then have to turn around and convert it
to use xtables. So I''ve
2013 Aug 02
1
[Bug 837] New: Large ICMP packets are lost
https://bugzilla.netfilter.org/show_bug.cgi?id=837
Summary: Large ICMP packets are lost
Product: libnetfilter_queue
Version: unspecified
Platform: x86_64
OS/Version: other
Status: NEW
Severity: normal
Priority: P5
Component: libnetfilter_queue
AssignedTo: netfilter-buglog at lists.netfilter.org
2020 Aug 27
0
[Bug 1455] New: Queue verdict cannot be used in vmap
https://bugzilla.netfilter.org/show_bug.cgi?id=1455
Bug ID: 1455
Summary: Queue verdict cannot be used in vmap
Product: nftables
Version: unspecified
Hardware: arm
OS: Ubuntu
Status: NEW
Severity: normal
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
2014 May 19
6
[Bug 941] New: --queue-balance sending all traffic to queue 0
https://bugzilla.netfilter.org/show_bug.cgi?id=941
Summary: --queue-balance sending all traffic to queue 0
Product: netfilter/iptables
Version: linux-2.6.x
Platform: x86_64
OS/Version: other
Status: NEW
Severity: normal
Priority: P5
Component: nfnetlink_queue
AssignedTo: netfilter-buglog at
2012 Jan 14
0
iptable rule for bypassing netfilter queue for a matching address.
I have two iptable rules for userspace modification :
iptable -t mangle -A PREROUTING -p udp --dport 9090 -j NFQUEUE
iptable -t mangle -A OUTPUT -p udp --sport 9090 -j NFQUEUE
I have the following network setup:
client ---------------->Linux Box or router--------------------->server. What i'm trying to achieve is modifying all packets which comes from client to 9090 port of the
2020 Jul 08
3
[Bug 1440] New: kernel oops allowing a connection with nfq_set_verdict() on kernel 5.7.x with hardening parameters
https://bugzilla.netfilter.org/show_bug.cgi?id=1440
Bug ID: 1440
Summary: kernel oops allowing a connection with
nfq_set_verdict() on kernel 5.7.x with hardening
parameters
Product: libnetfilter_queue
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
2019 Sep 05
4
[Bug 1364] New: nft list outputs mark rules with boolean or in a form that can be parsed by nft -f
https://bugzilla.netfilter.org/show_bug.cgi?id=1364
Bug ID: 1364
Summary: nft list outputs mark rules with boolean or in a form
that can be parsed by nft -f
Product: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: normal
Priority: P5
2011 May 26
1
[ANNOUNCE]: Release of iptables-1.4.11
The netfilter coreteam presents:
iptables version 1.4.10
the iptables release for the 2.6.39 kernels. Due to some mistakes
on my side we didn't have a release for longer than expected, so
this contains a rather large number of changes.
Changes include:
- various bugfixes, cleanups and documentation updates
- a new "guided option parser" from Jan, replacing a lot of the
2014 Mar 25
1
Routing
Hello,
I think routing could be improved in several ways, at least, there lacks some documentation describing how Tinc routes packets.
In order to test Tinc, I setup the following virtual network:
- tinc 1.1pre9 with ExperimentalProtocol=yes
- use of network namespaces (actually python-nemu[1])
- star topology, where all nodes runs tinc except the center, which I use to filter communications,
2016 May 12
3
[Bug 1066] New: nfq_get_timestamp() not setting timeval struc
https://bugzilla.netfilter.org/show_bug.cgi?id=1066
Bug ID: 1066
Summary: nfq_get_timestamp() not setting timeval struc
Product: libnetfilter_queue
Version: unspecified
Hardware: x86_64
OS: Ubuntu
Status: NEW
Severity: normal
Priority: P5
Component: libnetfilter_queue