Displaying 20 results from an estimated 800 matches similar to: "[Bug 1356] New: adding element to map inverts byte order"
2017 Feb 09
4
[Bug 1120] New: nf_tables_check_loops error on adding element to vmap
https://bugzilla.netfilter.org/show_bug.cgi?id=1120
Bug ID: 1120
Summary: nf_tables_check_loops error on adding element to vmap
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Ubuntu
Status: NEW
Severity: trivial
Priority: P5
Component: kernel
Assignee: pablo at
2018 Dec 03
1
[Bug 1306] New: burst packets becomes burst bytes
https://bugzilla.netfilter.org/show_bug.cgi?id=1306
Bug ID: 1306
Summary: burst packets becomes burst bytes
Product: nftables
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
2015 Aug 06
0
CUPS Print job inverts colours halfway
I have two Canon printers a MF4720W and LBP7100Cw. Previously a PC
running CentOS 6 were able to print without problems via network.
Unfortunately the hard disk died and in replacing it, we also upgraded
to CentOS 7.
Now the problem is that a test print to either printers looks OK for
the first half then inverts colours for the second half. i.e black
text on white background becomes white text on
2007 Sep 01
4
[Bug 1356] New: X11 forwarding broken.
http://bugzilla.mindrot.org/show_bug.cgi?id=1356
Summary: X11 forwarding broken.
Product: Portable OpenSSH
Version: 4.5p1
Platform: Other
OS/Version: FreeBSD
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: bitbucket at mindrot.org
ReportedBy: marka at isc.org
Created
2014 Oct 06
0
CEBA-2014:1356 CentOS 7 dhcp BugFix Update
CentOS Errata and Bugfix Advisory 2014:1356
Upstream details at : https://rhn.redhat.com/errata/RHBA-2014-1356.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
3e4301b534eb11741fb80f5887918e06b0821db1f66e37fe3e957a9d5e9bf761 dhclient-4.2.5-27.el7.centos.2.x86_64.rpm
1997 Jul 15
0
SAMBA digest 1356
mac@nibsc.ac.uk wrote:
>
> karipid@ucnetnom.ucnet.uch.gr wrote:
> >
> > I would like the files to be created with read/write
> >permission for the user and group and execute for nobody (not even the
> >user). Is there a way to accomplish this without mangling with the source
> >code?
>
> Nope. Unless the p17alpha releases have got new
2010 Sep 04
3
Vitelity offline?
Vitelity seems to be offline to both IP and voice traffic. Is there any
place to find out what their status is?
Roger Marquis
2019 Jul 23
2
Files not populated in var/www
The logs don't show a fault. The configuration for the "web" files
are usually under /etc/icecast2/web/ (or similar... RedHat may put
them somewhere else).
Have you actually tried viewing the server on port 8000?
eg. http://your.server.example.com:8000/
--
Paul Martin <pm at nowster.me.uk>
2024 Feb 13
16
[Bug 1736] New: nftables - dynamic update for verdict map from the packet path
https://bugzilla.netfilter.org/show_bug.cgi?id=1736
Bug ID: 1736
Summary: nftables - dynamic update for verdict map from the
packet path
Product: nftables
Version: 1.0.x
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
2024 Apr 03
9
[Bug 1742] New: using nfqueue breaks SCTP connection (tracking)
https://bugzilla.netfilter.org/show_bug.cgi?id=1742
Bug ID: 1742
Summary: using nfqueue breaks SCTP connection (tracking)
Product: libnetfilter_queue
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: libnetfilter_queue
Assignee:
2020 Aug 27
0
[Bug 1455] New: Queue verdict cannot be used in vmap
https://bugzilla.netfilter.org/show_bug.cgi?id=1455
Bug ID: 1455
Summary: Queue verdict cannot be used in vmap
Product: nftables
Version: unspecified
Hardware: arm
OS: Ubuntu
Status: NEW
Severity: normal
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
2007 Apr 18
3
[Bridge] Re: do_IRQ: stack overflow: 872..
On Fri, 07 Jan 2005 17:05:59 +0000
David Woodhouse <dwmw2@infradead.org> wrote:
> On Sat, 2004-12-18 at 08:50 +0100, Andi Kleen wrote:
> > It's not really an oops, just a warning that stack space got quiet
> > tight.
> >
> > The problem seems to be that the br netfilter code is nesting far too
> > deeply and recursing several times. Looks like a design
2007 Apr 18
1
[Bridge] [PATCH/RFC] Reduce call chain length in netfilter (take 2)
Hi,
This is a second try to fix the long chain call lengths in netfilter.
The difference with the previous patch is that I got rid of the extra
argument. I somehow didn't see it could be done without using the 'int
*ret2' argument.
A comment on the number of arguments to nf_hook_slow: I don't think the
number of arguments should be decreased. For the bridge-nf code, f.e.,
the
2018 Jun 12
1
[Bug 1261] New: nft trace crash with msg "BUG: invalid verdict value 2"
https://bugzilla.netfilter.org/show_bug.cgi?id=1261
Bug ID: 1261
Summary: nft trace crash with msg "BUG: invalid verdict value
2"
Product: nftables
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: nft
2012 Apr 25
1
forwarding packets to service in same host without using loopback network
This question is not about linux usage. But still i think user list
is a good crowd for linux programmer. So here it goes.
I have this libnetfilter_queue application which receives packets from
kernel based on some iptables rule. Before going straight to my
problem, i'm giving a sample workable code and other tools to set up a
test environment so that We problem definition and possible
2005 Jan 08
1
OSX Intrusion Suspected, Advice Sought
JohnG <mcsjgs@cox.net> wrote:
> I run OS X 10.3.7 on a PowerMac MDD G4 on a cable broadband connection.
> I have reason to think my system has been tampered with. Security
> features in Mac OS X have been left unlocked (Preference Pane - Users)
OSX is substantially different from FreeBSD (even without netinfo)
despite having some of the same source code. I doubt you'll find
2020 Sep 23
1
[Bug 1471] New: consider quick accept verdict and delayed drop policy
https://bugzilla.netfilter.org/show_bug.cgi?id=1471
Bug ID: 1471
Summary: consider quick accept verdict and delayed drop policy
Product: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
Assignee: pablo at
2004 May 10
5
rate limiting sshd connections ?
Does anyone know of a way to rate limit ssh connections from an IP address
? We are starting to see more and more brute force attempts to guess
simple passwords "/usr/sbin/inetd -wWl -C 10" is nice for slowing down
attempts to services launched via inetd. Is there an equiv method for
doing this to sshd? Running from inetd has some issues supposedly.
---Mike
2023 Apr 14
5
[Bug 1673] New: bug egress hook virtio interface with VLAN
https://bugzilla.netfilter.org/show_bug.cgi?id=1673
Bug ID: 1673
Summary: bug egress hook virtio interface with VLAN
Product: nftables
Version: 1.0.x
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: kernel
Assignee: pablo at netfilter.org
2023 Apr 14
3
[Bug 1672] New: bug egress hook virtio interface with VLAN
https://bugzilla.netfilter.org/show_bug.cgi?id=1672
Bug ID: 1672
Summary: bug egress hook virtio interface with VLAN
Product: nftables
Version: 1.0.x
Hardware: All
OS: other
Status: NEW
Severity: normal
Priority: P5
Component: kernel
Assignee: pablo at netfilter.org