Displaying 20 results from an estimated 30000 matches similar to: "[Bug 1214] Allow limit to use any value for time unit"
2024 Mar 24
0
[Bug 874] Any conntrack conditions specified with --ctstate INVALID are not checked
https://bugzilla.netfilter.org/show_bug.cgi?id=874
Fabio <pedretti.fabio at gmail.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|RESOLVED |REOPENED
CC| |pedretti.fabio at gmail.com
Resolution|FIXED
2024 Mar 24
0
[Bug 873] iptables -I CHAIN -m conntrack ! --ctproto 0 is intended to produce an error message, but it doesn't (usually)
https://bugzilla.netfilter.org/show_bug.cgi?id=873
Fabio <pedretti.fabio at gmail.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
CC| |pedretti.fabio at gmail.com
Resolution|---
2024 Mar 24
3
[Bug 1740] New: hashlimit limit: reduction to lowest terms in the output is confusing
https://bugzilla.netfilter.org/show_bug.cgi?id=1740
Bug ID: 1740
Summary: hashlimit limit: reduction to lowest terms in the
output is confusing
Product: iptables
Version: 1.8.x
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: minor
Priority: P5
Component:
2024 Mar 23
0
[Bug 1111] extensions: libxt_hashlimit: fix print_rate.
https://bugzilla.netfilter.org/show_bug.cgi?id=1111
Fabio <pedretti.fabio at gmail.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
CC| |pedretti.fabio at gmail.com
Resolution|---
2018 Jan 10
14
[Bug 1214] New: Allow limit to use any value for time unit
https://bugzilla.netfilter.org/show_bug.cgi?id=1214
Bug ID: 1214
Summary: Allow limit to use any value for time unit
Product: nftables
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
2024 Apr 17
2
[Bug 1745] New: recent man page
https://bugzilla.netfilter.org/show_bug.cgi?id=1745
Bug ID: 1745
Summary: recent man page
Product: iptables
Version: git (please indicate commit ID)
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: iptables
Assignee: netfilter-buglog at
2020 Nov 13
5
[Bug 1481] New: [ebtables-nft] ebtables -E gives error
https://bugzilla.netfilter.org/show_bug.cgi?id=1481
Bug ID: 1481
Summary: [ebtables-nft] ebtables -E gives error
Product: iptables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
Component: iptables
Assignee:
2024 Mar 27
0
[Bug 874] Any conntrack conditions specified with --ctstate INVALID are not checked
https://bugzilla.netfilter.org/show_bug.cgi?id=874
--- Comment #4 from Phil Sutter <phil at nwl.cc> ---
(In reply to Fabio from comment #3)
> Reopening, it looks like 2e704f6ddd6d0 fixed 873, not 874.
Oh, right! Thanks for spotting.
--
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
2024 Feb 28
3
[Bug 1738] New: iptables unit test suite fails extensions/libip6t_mh.txlate
https://bugzilla.netfilter.org/show_bug.cgi?id=1738
Bug ID: 1738
Summary: iptables unit test suite fails
extensions/libip6t_mh.txlate
Product: iptables
Version: 1.8.x
Hardware: All
OS: Gentoo
Status: NEW
Severity: normal
Priority: P5
Component: ip6tables
2020 Feb 01
2
[Bug 1403] New: Timeout object with invalid time unit crashes nft
https://bugzilla.netfilter.org/show_bug.cgi?id=1403
Bug ID: 1403
Summary: Timeout object with invalid time unit crashes nft
Product: nftables
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
2017 Aug 17
0
[Bug 1170] New: limit-burst is not fully consumed and rule stops matching
https://bugzilla.netfilter.org/show_bug.cgi?id=1170
Bug ID: 1170
Summary: limit-burst is not fully consumed and rule stops
matching
Product: netfilter/iptables
Version: unspecified
Hardware: x86_64
OS: Ubuntu
Status: NEW
Severity: major
Priority: P5
Component:
2016 Apr 02
1
[Bug 1061] New: net-firewall/nftables-0.5-r2: limit rate: burst parameter doesn't work
https://bugzilla.netfilter.org/show_bug.cgi?id=1061
Bug ID: 1061
Summary: net-firewall/nftables-0.5-r2: limit rate: burst
parameter doesn't work
Product: nftables
Version: unspecified
Hardware: x86_64
URL: http://wiki.nftables.org/wiki-nftables/index.php/Rate_
limiting_matchings
2019 Mar 25
3
[Bug 1328] New: Please allow ipset add and del via the /proc/net/xt_ipset mechanism
https://bugzilla.netfilter.org/show_bug.cgi?id=1328
Bug ID: 1328
Summary: Please allow ipset add and del via the
/proc/net/xt_ipset mechanism
Product: ipset
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component:
2020 Sep 23
2
[Bug 1466] New: [sets] add support for combination of counter and limit
https://bugzilla.netfilter.org/show_bug.cgi?id=1466
Bug ID: 1466
Summary: [sets] add support for combination of counter and
limit
Product: nftables
Version: unspecified
Hardware: All
OS: Debian GNU/Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
2020 Sep 25
1
[Bug 1473] New: [log] not printing in combination with ct state and set update a/o rate limit
https://bugzilla.netfilter.org/show_bug.cgi?id=1473
Bug ID: 1473
Summary: [log] not printing in combination with ct state and
set update a/o rate limit
Product: nftables
Version: unspecified
Hardware: arm
OS: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
2010 Jan 19
1
[Bug 630] New: Enhancement: Allow rules to specify ICMP type ranges.
http://bugzilla.netfilter.org/show_bug.cgi?id=630
Summary: Enhancement: Allow rules to specify ICMP type ranges.
Product: iptables
Version: unspecified
Platform: All
URL: http://www.ietf.org/rfc/rfc4890.txt
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P5
Component: ip6tables
2018 Jul 02
3
[Bug 1267] New: unable to use limit with counter in meters
https://bugzilla.netfilter.org/show_bug.cgi?id=1267
Bug ID: 1267
Summary: unable to use limit with counter in meters
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Gentoo
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
Assignee: pablo at
2015 Jan 08
1
[Bug 994] New: Named sets with type "ipv4_addr" do not allow adding CIDR elements
https://bugzilla.netfilter.org/show_bug.cgi?id=994
Bug ID: 994
Summary: Named sets with type "ipv4_addr" do not allow adding
CIDR elements
Product: nftables
Version: unspecified
Hardware: x86_64
OS: other
Status: NEW
Severity: enhancement
Priority: P5
2012 Jan 03
1
[Bug 766] New: Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule
http://bugzilla.netfilter.org/show_bug.cgi?id=766
Summary: Segmentation Fault using Hop Limit and ICMPV6-TYPE in
same rule
Product: iptables
Version: unspecified
Platform: x86_64
OS/Version: Debian GNU/Linux
Status: NEW
Severity: major
Priority: P5
Component: ip6tables
2011 Jul 28
2
[Bug 731] New: Allow duplicate IPs with different MACs in bitmap:ip.mac
http://bugzilla.netfilter.org/show_bug.cgi?id=731
Summary: Allow duplicate IPs with different MACs in bitmap:ip.mac
Product: ipset
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P5
Component: default
AssignedTo: netfilter-buglog at lists.netfilter.org