similar to: [Bug 1214] Allow limit to use any value for time unit

Displaying 20 results from an estimated 30000 matches similar to: "[Bug 1214] Allow limit to use any value for time unit"

2024 Mar 24
0
[Bug 874] Any conntrack conditions specified with --ctstate INVALID are not checked
https://bugzilla.netfilter.org/show_bug.cgi?id=874 Fabio <pedretti.fabio at gmail.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|RESOLVED |REOPENED CC| |pedretti.fabio at gmail.com Resolution|FIXED
2024 Mar 24
0
[Bug 873] iptables -I CHAIN -m conntrack ! --ctproto 0 is intended to produce an error message, but it doesn't (usually)
https://bugzilla.netfilter.org/show_bug.cgi?id=873 Fabio <pedretti.fabio at gmail.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED CC| |pedretti.fabio at gmail.com Resolution|---
2024 Mar 24
3
[Bug 1740] New: hashlimit limit: reduction to lowest terms in the output is confusing
https://bugzilla.netfilter.org/show_bug.cgi?id=1740 Bug ID: 1740 Summary: hashlimit limit: reduction to lowest terms in the output is confusing Product: iptables Version: 1.8.x Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: minor Priority: P5 Component:
2024 Mar 23
0
[Bug 1111] extensions: libxt_hashlimit: fix print_rate.
https://bugzilla.netfilter.org/show_bug.cgi?id=1111 Fabio <pedretti.fabio at gmail.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED CC| |pedretti.fabio at gmail.com Resolution|---
2018 Jan 10
14
[Bug 1214] New: Allow limit to use any value for time unit
https://bugzilla.netfilter.org/show_bug.cgi?id=1214 Bug ID: 1214 Summary: Allow limit to use any value for time unit Product: nftables Version: unspecified Hardware: All OS: All Status: NEW Severity: enhancement Priority: P5 Component: nft Assignee: pablo at netfilter.org
2024 Apr 17
2
[Bug 1745] New: recent man page
https://bugzilla.netfilter.org/show_bug.cgi?id=1745 Bug ID: 1745 Summary: recent man page Product: iptables Version: git (please indicate commit ID) Hardware: All OS: All Status: NEW Severity: normal Priority: P5 Component: iptables Assignee: netfilter-buglog at
2020 Nov 13
5
[Bug 1481] New: [ebtables-nft] ebtables -E gives error
https://bugzilla.netfilter.org/show_bug.cgi?id=1481 Bug ID: 1481 Summary: [ebtables-nft] ebtables -E gives error Product: iptables Version: unspecified Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: normal Priority: P5 Component: iptables Assignee:
2024 Mar 27
0
[Bug 874] Any conntrack conditions specified with --ctstate INVALID are not checked
https://bugzilla.netfilter.org/show_bug.cgi?id=874 --- Comment #4 from Phil Sutter <phil at nwl.cc> --- (In reply to Fabio from comment #3) > Reopening, it looks like 2e704f6ddd6d0 fixed 873, not 874. Oh, right! Thanks for spotting. -- You are receiving this mail because: You are watching all bug changes. -------------- next part -------------- An HTML attachment was scrubbed... URL:
2024 Feb 28
3
[Bug 1738] New: iptables unit test suite fails extensions/libip6t_mh.txlate
https://bugzilla.netfilter.org/show_bug.cgi?id=1738 Bug ID: 1738 Summary: iptables unit test suite fails extensions/libip6t_mh.txlate Product: iptables Version: 1.8.x Hardware: All OS: Gentoo Status: NEW Severity: normal Priority: P5 Component: ip6tables
2020 Feb 01
2
[Bug 1403] New: Timeout object with invalid time unit crashes nft
https://bugzilla.netfilter.org/show_bug.cgi?id=1403 Bug ID: 1403 Summary: Timeout object with invalid time unit crashes nft Product: nftables Version: unspecified Hardware: All OS: All Status: NEW Severity: normal Priority: P5 Component: nft Assignee: pablo at netfilter.org
2017 Aug 17
0
[Bug 1170] New: limit-burst is not fully consumed and rule stops matching
https://bugzilla.netfilter.org/show_bug.cgi?id=1170 Bug ID: 1170 Summary: limit-burst is not fully consumed and rule stops matching Product: netfilter/iptables Version: unspecified Hardware: x86_64 OS: Ubuntu Status: NEW Severity: major Priority: P5 Component:
2016 Apr 02
1
[Bug 1061] New: net-firewall/nftables-0.5-r2: limit rate: burst parameter doesn't work
https://bugzilla.netfilter.org/show_bug.cgi?id=1061 Bug ID: 1061 Summary: net-firewall/nftables-0.5-r2: limit rate: burst parameter doesn't work Product: nftables Version: unspecified Hardware: x86_64 URL: http://wiki.nftables.org/wiki-nftables/index.php/Rate_ limiting_matchings
2019 Mar 25
3
[Bug 1328] New: Please allow ipset add and del via the /proc/net/xt_ipset mechanism
https://bugzilla.netfilter.org/show_bug.cgi?id=1328 Bug ID: 1328 Summary: Please allow ipset add and del via the /proc/net/xt_ipset mechanism Product: ipset Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: enhancement Priority: P5 Component:
2020 Sep 23
2
[Bug 1466] New: [sets] add support for combination of counter and limit
https://bugzilla.netfilter.org/show_bug.cgi?id=1466 Bug ID: 1466 Summary: [sets] add support for combination of counter and limit Product: nftables Version: unspecified Hardware: All OS: Debian GNU/Linux Status: NEW Severity: enhancement Priority: P5 Component: nft
2020 Sep 25
1
[Bug 1473] New: [log] not printing in combination with ct state and set update a/o rate limit
https://bugzilla.netfilter.org/show_bug.cgi?id=1473 Bug ID: 1473 Summary: [log] not printing in combination with ct state and set update a/o rate limit Product: nftables Version: unspecified Hardware: arm OS: Debian GNU/Linux Status: NEW Severity: normal Priority: P5
2010 Jan 19
1
[Bug 630] New: Enhancement: Allow rules to specify ICMP type ranges.
http://bugzilla.netfilter.org/show_bug.cgi?id=630 Summary: Enhancement: Allow rules to specify ICMP type ranges. Product: iptables Version: unspecified Platform: All URL: http://www.ietf.org/rfc/rfc4890.txt OS/Version: All Status: NEW Severity: enhancement Priority: P5 Component: ip6tables
2018 Jul 02
3
[Bug 1267] New: unable to use limit with counter in meters
https://bugzilla.netfilter.org/show_bug.cgi?id=1267 Bug ID: 1267 Summary: unable to use limit with counter in meters Product: nftables Version: unspecified Hardware: x86_64 OS: Gentoo Status: NEW Severity: enhancement Priority: P5 Component: nft Assignee: pablo at
2015 Jan 08
1
[Bug 994] New: Named sets with type "ipv4_addr" do not allow adding CIDR elements
https://bugzilla.netfilter.org/show_bug.cgi?id=994 Bug ID: 994 Summary: Named sets with type "ipv4_addr" do not allow adding CIDR elements Product: nftables Version: unspecified Hardware: x86_64 OS: other Status: NEW Severity: enhancement Priority: P5
2012 Jan 03
1
[Bug 766] New: Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule
http://bugzilla.netfilter.org/show_bug.cgi?id=766 Summary: Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule Product: iptables Version: unspecified Platform: x86_64 OS/Version: Debian GNU/Linux Status: NEW Severity: major Priority: P5 Component: ip6tables
2011 Jul 28
2
[Bug 731] New: Allow duplicate IPs with different MACs in bitmap:ip.mac
http://bugzilla.netfilter.org/show_bug.cgi?id=731 Summary: Allow duplicate IPs with different MACs in bitmap:ip.mac Product: ipset Version: unspecified Platform: All OS/Version: All Status: NEW Severity: enhancement Priority: P5 Component: default AssignedTo: netfilter-buglog at lists.netfilter.org