Displaying 20 results from an estimated 3000 matches similar to: "[Bug 580] New: iptables-restore and iptables-save lack comparison of a saved ruleset against the currently deployed rules"
2013 Jun 24
0
[Bug 580] iptables-restore and iptables-save lack comparison of a saved ruleset against the currently deployed rules
https://bugzilla.netfilter.org/show_bug.cgi?id=580
Jan Engelhardt <jengelh at medozas.de> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|RESOLVED |REOPENED
Resolution|WONTFIX |
--- Comment #4 from Jan Engelhardt <jengelh at
2013 Jun 24
0
[Bug 580] iptables-restore and iptables-save lack comparison of a saved ruleset against the currently deployed rules
https://bugzilla.netfilter.org/show_bug.cgi?id=580
--- Comment #6 from Jan Engelhardt <jengelh at medozas.de> 2013-06-24 20:32:22 CEST ---
>Unclear how you can say with certainty that this is impossible
Right now, tables are output in permutations that are considered to be random.
(Sure there is module load order, but that is not documented, nor is it
actually a usable assumption for
2013 Aug 27
0
[Bug 580] iptables-restore and iptables-save lack comparison of a saved ruleset against the currently deployed rules
https://bugzilla.netfilter.org/show_bug.cgi?id=580
Phil Oester <netfilter at linuxace.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
AssignedTo|jengelh at medozas.de |netfilter-buglog at lists.netf
| |ilter.org
--
Configure
2013 Jun 24
0
[Bug 580] iptables-restore and iptables-save lack comparison of a saved ruleset against the currently deployed rules
https://bugzilla.netfilter.org/show_bug.cgi?id=580
Phil Oester <netfilter at linuxace.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
CC| |netfilter at linuxace.com
Resolution|
2013 Jun 24
0
[Bug 580] iptables-restore and iptables-save lack comparison of a saved ruleset against the currently deployed rules
https://bugzilla.netfilter.org/show_bug.cgi?id=580
--- Comment #5 from Phil Oester <netfilter at linuxace.com> 2013-06-24 20:07:02 CEST ---
Unclear how you can say with certainty that this is impossible, but let's
ignore that point for the moment.
Is there some reason that iptables-save should do the sorting for userspace
scripts? Another alternative would be to always load the
2013 Jun 24
0
[Bug 580] iptables-restore and iptables-save lack comparison of a saved ruleset against the currently deployed rules
https://bugzilla.netfilter.org/show_bug.cgi?id=580
--- Comment #7 from Phil Oester <netfilter at linuxace.com> 2013-06-24 23:34:51 CEST ---
> would you be thrilled if all the rules were in random order too?
This comparison is a bit far fetched, given that ordering of rules is so
important (accept before drop, etc). The order in which tables are output in
iptables-save is largely
2011 Oct 13
2
[Bug 756] New: iptables: Memory allocation problem.
http://bugzilla.netfilter.org/show_bug.cgi?id=756
Summary: iptables: Memory allocation problem.
Product: iptables
Version: CVS (please indicate timestamp)
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P5
Component: iptables
AssignedTo: netfilter-buglog at lists.netfilter.org
2011 Apr 03
6
[Bug 713] New: CPPFLAGS are mishandled which breaks non-shared targets
http://bugzilla.netfilter.org/show_bug.cgi?id=713
Summary: CPPFLAGS are mishandled which breaks non-shared targets
Product: iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P5
Component: unknown
AssignedTo: netfilter-buglog at
2009 Oct 20
1
[Bug 616] New: Duplicate rules for multi-homed hostnames. IPv4 and IPv6 inconsistent treatment.
http://bugzilla.netfilter.org/show_bug.cgi?id=616
Summary: Duplicate rules for multi-homed hostnames. IPv4 and IPv6
inconsistent treatment.
Product: iptables
Version: unspecified
Platform: i386
OS/Version: All
Status: NEW
Severity: minor
Priority: P4
Component: iptables
2011 Jul 29
2
[Bug 732] New: Iptables 1.4.11 or 1.4.12 does not compile on CentOS 5.6
http://bugzilla.netfilter.org/show_bug.cgi?id=732
Summary: Iptables 1.4.11 or 1.4.12 does not compile on CentOS 5.6
Product: netfilter/iptables
Version: linux-2.6.x
Platform: x86_64
OS/Version: RedHat Linux
Status: NEW
Severity: critical
Priority: P1
Component: ip_tables (kernel)
AssignedTo:
2011 Jun 07
4
[Bug 720] New: iptables no longer compiles for Linux 2.4 because it uses linux/magic.h
http://bugzilla.netfilter.org/show_bug.cgi?id=720
Summary: iptables no longer compiles for Linux 2.4 because it
uses linux/magic.h
Product: iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: major
Priority: P3
Component: iptables
AssignedTo:
2011 Mar 03
2
[Bug 706] Iptables randomly reject some packets that have accept rule
http://bugzilla.netfilter.org/show_bug.cgi?id=706
Jan Engelhardt <jengelh at medozas.de> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |jengelh at medozas.de
--- Comment #1 from Jan Engelhardt <jengelh at medozas.de> 2011-03-03 14:20:30
2011 Jul 02
4
[Bug 727] New: Open your firewall by a simple typo
http://bugzilla.netfilter.org/show_bug.cgi?id=727
Summary: Open your firewall by a simple typo
Product: iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: major
Priority: P2
Component: iptables
AssignedTo: netfilter-buglog at lists.netfilter.org
ReportedBy:
2011 May 22
5
[Bug 718] New: New bugzilla account has no permissions to create bug for conntrack-tools
http://bugzilla.netfilter.org/show_bug.cgi?id=718
Summary: New bugzilla account has no permissions to create bug
for conntrack-tools
Product: bugzilla
Version: other
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P5
Component: netfilter bugzilla
AssignedTo:
2011 Mar 07
3
[Bug 707] New: Trivial SNAT manpage error
http://bugzilla.netfilter.org/show_bug.cgi?id=707
Summary: Trivial SNAT manpage error
Product: iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: trivial
Priority: P5
Component: iptables
AssignedTo: netfilter-buglog at lists.netfilter.org
ReportedBy:
2011 Jun 15
2
[Bug 724] New: Iptables doesn't delete rules matching if target is RATEEST - patch attached
http://bugzilla.netfilter.org/show_bug.cgi?id=724
Summary: Iptables doesn't delete rules matching if target is
RATEEST - patch attached
Product: iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P3
Component: iptables
[Bug 762] New: The lastest snapshot iptables compiled error"ERROR: ld.so: object 'libxtables.so.7' "
2011 Nov 28
2
[Bug 762] New: The lastest snapshot iptables compiled error"ERROR: ld.so: object 'libxtables.so.7' "
http://bugzilla.netfilter.org/show_bug.cgi?id=762
Summary: The lastest snapshot iptables compiled error"ERROR:
ld.so: object 'libxtables.so.7' "
Product: iptables
Version: unspecified
Platform: arm
OS/Version: Ubuntu
Status: NEW
Severity: major
Priority: P5
Component:
2011 Jul 13
4
[Bug 728] New: ip_tables: limit match: invalid size 40!=48
http://bugzilla.netfilter.org/show_bug.cgi?id=728
Summary: ip_tables: limit match: invalid size 40!=48
Product: netfilter/iptables
Version: linux-2.6.x
Platform: mips64
OS/Version: Debian GNU/Linux
Status: NEW
Severity: critical
Priority: P2
Component: ip_tables (kernel)
AssignedTo:
2009 Mar 18
4
[Bug 586] New: Problems changing the source address of a packet
http://bugzilla.netfilter.org/show_bug.cgi?id=586
Summary: Problems changing the source address of a packet
Product: libnetfilter_queue
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: blocker
Priority: P1
Component: libnetfilter_queue
AssignedTo: laforge at netfilter.org
2011 Jun 13
2
[Bug 723] New: extensions/libxt_NFLOG.man definines invalid range for --nflog-group
http://bugzilla.netfilter.org/show_bug.cgi?id=723
Summary: extensions/libxt_NFLOG.man definines invalid range for -
-nflog-group
Product: iptables
Version: CVS (please indicate timestamp)
Platform: All
OS/Version: All
Status: NEW
Severity: trivial
Priority: P5
Component: iptables