Displaying 20 results from an estimated 60000 matches similar to: "C7 and ebtables"
2015 Dec 18
0
[ANNOUNCE] iptables 1.6.0 release
Hi!
The Netfilter project proudly presents:
iptables 1.6.0
This release includes accumulated fixes and enhancements for the
following matches:
* ah
* connlabel
* cgroup
* devgroup
* dst
* icmp6
* ipcomp
* ipv6header
* quota
* set
* socket
* string
and targets:
* CT
* REJECT
* SET
* SNAT
* SNPT,DNPT
* SYNPROXY
* TEE
We also got rid of the very very old MIRROR and SAME targets and the
2015 Apr 11
4
EBtables Problem
Hello ,
I have recently downloaded and setup Centos 7 1503 on a device and
encountered a remote connection problem which I was only able to solve via
removing ebtables package .
After setup , I wanted go forward with IPtables instead of Firewalld , so
remove firewalld and install iptables. After configuration and tests , I
installed Fail2Ban ,(which brought ebtables with it ) and after reboot I
2019 Dec 02
0
[ANNOUNCE] ebtables 2.0.11 release
Hi!
The Netfilter project presents:
ebtables 2.0.11
ebtables is the userspace command line program used to configure the
Linux 2.4.x and bridge packet filtering ruleset. It is targeted
towards system administrators.
NOTE: This is a release of legacy software. Patches may still be
accepted and pushed out to the git repository, which will remain active
and accessible as usual although
2020 May 27
1
[Bug 1432] New: ebtables ebtables-2.0.11 buffer overflow on getting kernel data ( ebtables compiled with address sanitizer)
https://bugzilla.netfilter.org/show_bug.cgi?id=1432
Bug ID: 1432
Summary: ebtables ebtables-2.0.11 buffer overflow on getting
kernel data ( ebtables compiled with address
sanitizer)
Product: netfilter/iptables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status:
2019 May 27
0
[ANNOUNCE] iptables 1.8.3 release
Hi!
The Netfilter project proudly presents:
iptables 1.8.3
iptables is the userspace command line program used to configure the
Linux 2.4.x and later packet filtering ruleset. It is targeted towards
system administrators.
See ChangeLog that comes attached to this email for more details.
You can download it from:
http://www.netfilter.org/projects/iptables/downloads.html
2020 Nov 13
5
[Bug 1481] New: [ebtables-nft] ebtables -E gives error
https://bugzilla.netfilter.org/show_bug.cgi?id=1481
Bug ID: 1481
Summary: [ebtables-nft] ebtables -E gives error
Product: iptables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
Component: iptables
Assignee:
2007 Apr 18
2
[Bridge] Re: [RESEND][PATCH] ebtables: clean up vmalloc usage in net/bridge/netfilter/ebtables.c
An earlier variant of your patch was applied already, included below.
You'll need to submit the newer parts relative to the current tree.
diff-tree 7ad4d2f6901437ba4717a26d395a73ea362d25c6 (from b8282dcf0417bbc8a0786c129fdff9cc768f8f3c)
Author: Jayachandran C <c.jayachandran@gmail.com>
Date: Tue Apr 11 17:25:38 2006 -0700
[BRIDGE] ebtables: fix allocation in
2023 Nov 10
0
[Bug 1723] New: ebtables-nft help output woes
https://bugzilla.netfilter.org/show_bug.cgi?id=1723
Bug ID: 1723
Summary: ebtables-nft help output woes
Product: ebtables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: ebtables-nft
Assignee: pablo at netfilter.org
2019 Jul 02
5
[Bug 1347] New: ebtables-nft: regression in -o option
https://bugzilla.netfilter.org/show_bug.cgi?id=1347
Bug ID: 1347
Summary: ebtables-nft: regression in -o option
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
Component: iptables over nftable
Assignee:
2023 Sep 08
1
[Bridge] [PATCH AUTOSEL 4.14 6/8] netfilter: ebtables: fix fortify warnings in size_entry_mwt()
From: "GONG, Ruiqi" <gongruiqi1 at huawei.com>
[ Upstream commit a7ed3465daa240bdf01a5420f64336fee879c09d ]
When compiling with gcc 13 and CONFIG_FORTIFY_SOURCE=y, the following
warning appears:
In function ?fortify_memcpy_chk?,
inlined from ?size_entry_mwt? at net/bridge/netfilter/ebtables.c:2118:2:
./include/linux/fortify-string.h:592:25: error: call to
2023 Sep 08
0
[Bridge] [PATCH AUTOSEL 6.5 33/45] netfilter: ebtables: fix fortify warnings in size_entry_mwt()
From: "GONG, Ruiqi" <gongruiqi1 at huawei.com>
[ Upstream commit a7ed3465daa240bdf01a5420f64336fee879c09d ]
When compiling with gcc 13 and CONFIG_FORTIFY_SOURCE=y, the following
warning appears:
In function ?fortify_memcpy_chk?,
inlined from ?size_entry_mwt? at net/bridge/netfilter/ebtables.c:2118:2:
./include/linux/fortify-string.h:592:25: error: call to
2023 Sep 08
0
[Bridge] [PATCH AUTOSEL 6.1 20/26] netfilter: ebtables: fix fortify warnings in size_entry_mwt()
From: "GONG, Ruiqi" <gongruiqi1 at huawei.com>
[ Upstream commit a7ed3465daa240bdf01a5420f64336fee879c09d ]
When compiling with gcc 13 and CONFIG_FORTIFY_SOURCE=y, the following
warning appears:
In function ?fortify_memcpy_chk?,
inlined from ?size_entry_mwt? at net/bridge/netfilter/ebtables.c:2118:2:
./include/linux/fortify-string.h:592:25: error: call to
2023 Sep 08
0
[Bridge] [PATCH AUTOSEL 6.4 30/41] netfilter: ebtables: fix fortify warnings in size_entry_mwt()
From: "GONG, Ruiqi" <gongruiqi1 at huawei.com>
[ Upstream commit a7ed3465daa240bdf01a5420f64336fee879c09d ]
When compiling with gcc 13 and CONFIG_FORTIFY_SOURCE=y, the following
warning appears:
In function ?fortify_memcpy_chk?,
inlined from ?size_entry_mwt? at net/bridge/netfilter/ebtables.c:2118:2:
./include/linux/fortify-string.h:592:25: error: call to
2023 Sep 08
0
[Bridge] [PATCH AUTOSEL 5.10 11/14] netfilter: ebtables: fix fortify warnings in size_entry_mwt()
From: "GONG, Ruiqi" <gongruiqi1 at huawei.com>
[ Upstream commit a7ed3465daa240bdf01a5420f64336fee879c09d ]
When compiling with gcc 13 and CONFIG_FORTIFY_SOURCE=y, the following
warning appears:
In function ?fortify_memcpy_chk?,
inlined from ?size_entry_mwt? at net/bridge/netfilter/ebtables.c:2118:2:
./include/linux/fortify-string.h:592:25: error: call to
2023 Sep 08
0
[Bridge] [PATCH AUTOSEL 5.15 12/15] netfilter: ebtables: fix fortify warnings in size_entry_mwt()
From: "GONG, Ruiqi" <gongruiqi1 at huawei.com>
[ Upstream commit a7ed3465daa240bdf01a5420f64336fee879c09d ]
When compiling with gcc 13 and CONFIG_FORTIFY_SOURCE=y, the following
warning appears:
In function ?fortify_memcpy_chk?,
inlined from ?size_entry_mwt? at net/bridge/netfilter/ebtables.c:2118:2:
./include/linux/fortify-string.h:592:25: error: call to
2023 Aug 16
0
[Bridge] [PATCH net-next v4] netfilter: ebtables: fix fortify warnings in size_entry_mwt()
From: "GONG, Ruiqi" <gongruiqi1 at huawei.com>
When compiling with gcc 13 and CONFIG_FORTIFY_SOURCE=y, the following
warning appears:
In function ?fortify_memcpy_chk?,
inlined from ?size_entry_mwt? at net/bridge/netfilter/ebtables.c:2118:2:
./include/linux/fortify-string.h:592:25: error: call to ?__read_overflow2_field?
declared with attribute warning: detected read beyond
2015 Apr 14
0
EBtables Problem
On 4/11/2015 2:00 AM, Mehmet Allar wrote:
> After setup , I wanted go forward with IPtables instead of Firewalld , so
> remove firewalld and install iptables. After configuration and tests , I
> installed Fail2Ban ,(which brought ebtables with it ) and after reboot I
> was not able to connect to the device.
where did you install fail2ban from? I don't believe its in the C7 base
2009 Mar 31
0
ebtables tying mac address to ip address problem
Hi all.
I''m trying to tie mac addresses to IP addresses to stop ip and mac spoofing
on my xen host running debian5.0 amd64. I''ve been trying to follow
http://archive.netbsd.se/?ml=xen-users&a=2007-11&m=5776600
The DomU''s network gets blocked both inward and outward.
I''ve patched my vif-bridge with the intructions on that page any they seem
to be
2018 Jun 01
3
[Bug 1259] New: Handling of EPROTONOSUPPORT in ebtables breaking Ubuntu 18.04 apt-get upgrade
https://bugzilla.netfilter.org/show_bug.cgi?id=1259
Bug ID: 1259
Summary: Handling of EPROTONOSUPPORT in ebtables breaking
Ubuntu 18.04 apt-get upgrade
Product: netfilter/iptables
Version: linux-2.6.x
Hardware: x86_64
OS: Ubuntu
Status: NEW
Severity: normal
Priority: P5
2007 Apr 18
1
[Bridge] [RELEASE] ebtables-brnf-3-vs-2.4.22 and ebtables-2-0-6
Hi,
At http://sourceforge.net/projects/ebtables/ you can find the following new
releases:
ebtables-brnf-3-vs-2.4.22
Changes:
- let iptables see VLAN tagged IP traffic
- bugfix for queued packets that get mangled in userspace
- ebt_among module (Grzegorz Borowiak)
- ebt_limit module (Tom Marshall)
The patch compiles but I've done no further tests, but I probably didn't screw
up.