Linux TCP/IP Netfilter
[Prev Page][Next Page]
- Re: nftables portmap map
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: nftables portmap map
- From: Antonio Ojea <antonio.ojea.garcia@xxxxxxxxx>
- Re: nftables portmap map
- From: Antonio Ojea <antonio.ojea.garcia@xxxxxxxxx>
- Re: nftables portmap map
- From: Florian Westphal <fw@xxxxxxxxx>
- nftables portmap map
- From: Antonio Ojea <antonio.ojea.garcia@xxxxxxxxx>
- Re: nft table flags documentation
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: nft table flags documentation
- From: Jan Kasprzak <kas@xxxxxxxxxx>
- Re: nft table flags documentation
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- nft table flags documentation
- From: Jan Kasprzak <kas@xxxxxxxxxx>
- [ANNOUNCE] ipset 7.23 released
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxx>
- Re: Regression 1.0.9..1.1.1 in glob inclusion behaviour
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Regression 1.0.9..1.1.1 in glob inclusion behaviour
- From: caskd <caskd@xxxxxxxxx>
- Re: Regression 1.0.9..1.1.1 in glob inclusion behaviour
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: conntrack-tools conntrack cli json output option?
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- conntrack-tools conntrack cli json output option?
- From: eldon-nfv@xxxxxxxxxxxx
- Re: Regression 1.0.9..1.1.1 in glob inclusion behaviour
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Regression 1.0.9..1.1.1 in glob inclusion behaviour
- From: caskd <caskd@xxxxxxxxx>
- Re: Most optimal method to dump UDP conntrack entries
- From: Antonio Ojea <antonio.ojea.garcia@xxxxxxxxx>
- an idea about flow tables
- From: ye4 yu3 <ye4yu3@xxxxxxxxxxx>
- Re: logging to a different place than kernel ring buffer
- From: Marco Moock <mm@xxxxxxxxxx>
- Re: [DNAT] Port forwarding with Port range
- From: Mokhtar BEN MESSAOUD <mbmessaoud@xxxxxxxxx>
- [DNAT] Port forwarding with Port range
- From: Mokhtar BEN MESSAOUD <mbmessaoud@xxxxxxxxx>
- Re: Adding set elements
- From: Thomas Köller <thomas@xxxxxxxxxxxxxxxxxx>
- Re: Adding set elements
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: set with limit
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: logging to a different place than kernel ring buffer
- From: Jordan Dohms <Jordan@xxxxxxxxxxxxxxxxxx>
- Re: logging to a different place than kernel ring buffer
- From: Sven-Haegar Koch <haegar@xxxxxxxxx>
- logging to a different place than kernel ring buffer
- From: Marco Moock <mm@xxxxxxxxxx>
- Re: set with limit
- From: Slavko <linux@xxxxxxxxxx>
- Re: set with limit
- From: Slavko <linux@xxxxxxxxxx>
- Re: set with limit
- From: Florian Westphal <fw@xxxxxxxxx>
- set with limit
- From: Slavko <linux@xxxxxxxxxx>
- Re: Adding set elements
- From: Thomas Köller <thomas@xxxxxxxxxxxxxxxxxx>
- Re: rule insertion
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: rule insertion
- From: Florian Westphal <fw@xxxxxxxxx>
- rule insertion
- From: Thomas Köller <thomas@xxxxxxxxxxxxxxxxxx>
- Re: Adding set elements
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Dropping of the end of a chain
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Most optimal method to dump UDP conntrack entries
- From: Antonio Ojea <antonio.ojea.garcia@xxxxxxxxx>
- Re: Dropping of the end of a chain
- Re: Dropping of the end of a chain
- From: Daniel Lakeland <dlakelan@xxxxxxxxxxxxxxxxxx>
- Re: Dropping of the end of a chain
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: Dropping of the end of a chain
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Dropping of the end of a chain
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: Dropping of the end of a chain
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: Dropping of the end of a chain
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: Dropping of the end of a chain
- From: Daniel Lakeland <dlakelan@xxxxxxxxxxxxxxxxxx>
- Dropping of the end of a chain
- From: Thomas Köller <thomas@xxxxxxxxxxxxxxxxxx>
- Adding set elements
- From: Thomas Köller <thomas@xxxxxxxxxxxxxxxxxx>
- Re: connection tracking state in rules
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: ipset vs. nftables set
- From: Slavko <linux@xxxxxxxxxx>
- Re: ipset vs. nftables set
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: connection tracking state in rules
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: ipset vs. nftables set
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: ipset vs. nftables set
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: ipset vs. nftables set
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: ipset vs. nftables set
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: connection tracking state in rules
- From: Thomas Köller <thomas@xxxxxxxxxxxxxxxxxx>
- Re: ipset vs. nftables set
- From: Slavko <linux@xxxxxxxxxx>
- iptables SYNPROXY small packet size transmission performance issue
- From: Vincent Li <vincent.mc.li@xxxxxxxxx>
- Re: connection tracking state in rules
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Most optimal method to dump UDP conntrack entries
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: ipset vs. nftables set
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: ipset vs. nftables set
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- connection tracking state in rules
- From: Thomas Köller <thomas@xxxxxxxxxxxxxxxxxx>
- Re: ipset vs. nftables set
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: Most optimal method to dump UDP conntrack entries
- From: Antonio Ojea <antonio.ojea.garcia@xxxxxxxxx>
- ipset vs. nftables set
- From: Thomas Koeller <thomas@xxxxxxxxxxxxxxxxxx>
- Re: Most optimal method to dump UDP conntrack entries
- From: Antonio Ojea <antonio.ojea.garcia@xxxxxxxxx>
- Re: Most optimal method to dump UDP conntrack entries
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Most optimal method to dump UDP conntrack entries
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: connection tracking and kernel dropping packets
- From: Matt Zagrabelny <mzagrabe@xxxxxxxxx>
- Re: Most optimal method to dump UDP conntrack entries
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: Most optimal method to dump UDP conntrack entries
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Most optimal method to dump UDP conntrack entries
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: Most optimal method to dump UDP conntrack entries
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Most optimal method to dump UDP conntrack entries
- From: Antonio Ojea <antonio.ojea.garcia@xxxxxxxxx>
- Re: Most optimal method to dump UDP conntrack entries
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: connection tracking and kernel dropping packets
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: connection tracking and kernel dropping packets
- From: Slavko <linux@xxxxxxxxxx>
- [ANNOUNCE] iptables 1.8.11 release
- From: Phil Sutter <phil@xxxxxxxxxxxxx>
- Re: connection tracking and kernel dropping packets
- From: Matt Zagrabelny <mzagrabe@xxxxxxxxx>
- Re: Countering some types of SSH spoofing with NFTables
- From: Lars Noodén <lars.nooden@xxxxxxx>
- Re: Countering some types of SSH spoofing with NFTables
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: Countering some types of SSH spoofing with NFTables
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Countering some types of SSH spoofing with NFTables
- From: Lars Noodén <lars.nooden@xxxxxxx>
- Re: Unusual packet forwarding task
- From: Logan B <mrbojangles3@xxxxxxxxx>
- Re: IPtables rate limiting question
- From: Reindl Harald <h.reindl@xxxxxxxxxxxxx>
- Re: IPtables rate limiting question
- From: Francisco Agostinho <f.agostinho123@xxxxxxxxx>
- Re: IPtables rate limiting question
- From: Francisco Agostinho <f.agostinho123@xxxxxxxxx>
- Re: connection tracking and kernel dropping packets
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: connection tracking and kernel dropping packets
- From: Matt Zagrabelny <mzagrabe@xxxxxxxxx>
- Re: connection tracking and kernel dropping packets
- From: Slavko <linux@xxxxxxxxxx>
- connection tracking and kernel dropping packets
- From: Matt Zagrabelny <mzagrabe@xxxxxxxxx>
- Re: IPtables rate limiting question
- From: Reindl Harald <h.reindl@xxxxxxxxxxxxx>
- Re: IPtables rate limiting question
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: IPtables rate limiting question
- From: Reindl Harald <h.reindl@xxxxxxxxxxxxx>
- Re: IPtables rate limiting question
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: IPtables rate limiting question
- From: Slavko <linux@xxxxxxxxxx>
- Re: IPtables rate limiting question
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- IPtables rate limiting question
- From: Francisco Agostinho <f.agostinho123@xxxxxxxxx>
- Re: Unusual packet forwarding task
- From: Rob Roschewsk <rob@xxxxxxxxx>
- Re: Unusual packet forwarding task
- From: Martin Tonusoo <martin@xxxxxxxxxx>
- Unusual packet forwarding task
- From: Rob Roschewsk <rob@xxxxxxxxx>
- Re: location of conntrack rules
- From: Matt Zagrabelny <mzagrabe@xxxxxxxxx>
- Re: location of conntrack rules
- From: Reindl Harald <h.reindl@xxxxxxxxxxxxx>
- Re: location of conntrack rules
- From: Reindl Harald <h.reindl@xxxxxxxxxxxxx>
- Re: location of conntrack rules
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- location of conntrack rules
- From: Matt Zagrabelny <mzagrabe@xxxxxxxxx>
- Re: Most optimal method to dump UDP conntrack entries
- From: Benny Lyne Amorsen <benny+usenet@xxxxxxxxxx>
- Re: Most optimal method to dump UDP conntrack entries
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: filesystem access to add/remove/view ip addresses
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: filesystem access to add/remove/view ip addresses
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: filesystem access to add/remove/view ip addresses
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- filesystem access to add/remove/view ip addresses
- From: Telbat Diordna <diordnatelbat2@xxxxxxxxx>
- Re: Most optimal method to dump UDP conntrack entries
- From: Antonio Ojea <antonio.ojea.garcia@xxxxxxxxx>
- Re: Most optimal method to dump UDP conntrack entries
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: Most optimal method to dump UDP conntrack entries
- From: Antonio Ojea <antonio.ojea.garcia@xxxxxxxxx>
- Re: Most optimal method to dump UDP conntrack entries
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: Most optimal method to dump UDP conntrack entries
- From: Antonio Ojea <antonio.ojea.garcia@xxxxxxxxx>
- Re: Most optimal method to dump UDP conntrack entries
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Most optimal method to dump UDP conntrack entries
- From: Florian Westphal <fw@xxxxxxxxx>
- Most optimal method to dump UDP conntrack entries
- From: Antonio Ojea <antonio.ojea.garcia@xxxxxxxxx>
- [UPDATE] Renewing Netfilter coreteam PGP keys
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: VPN nftables
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: VPN nftables
- From: Martin Brampton <martin@xxxxxxxxxxxxxxxxxxxxxxxx>
- Re: VPN nftables
- From: Reindl Harald <h.reindl@xxxxxxxxxxxxx>
- Re: VPN nftables
- From: Martin Brampton <martin@xxxxxxxxxxxxxxxxxxxxxxxx>
- Re: issues when trying to inspect payload > 250 bytes
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: issues when trying to inspect payload > 250 bytes
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: VPN nftables
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: VPN nftables
- From: Martin Brampton <martin@xxxxxxxxxxxxxxxxxxxxxxxx>
- Re: VPN nftables
- From: Daniel <tech@xxxxxxxxxx>
- VPN nftables
- From: Martin Brampton <martin@xxxxxxxxxxxxxxxxxxxxxxxx>
- issues when trying to inspect payload > 250 bytes
- From: Graham Bartlett <graham.ietf@xxxxxxxxx>
- Re: Problem with ipv6
- From: Daniel <tech@xxxxxxxxxx>
- Re: Problem with ipv6
- From: Carl Lei <me@xxxxxxxxxxxx>
- Re: Problem with ipv6
- From: Carl Lei <me@xxxxxxxxxxxx>
- Re: Problem with ipv6
- From: Daniel <tech@xxxxxxxxxx>
- Re: Problem with ipv6
- From: Slavko <linux@xxxxxxxxxx>
- Re: Problem with ipv6
- From: Martin Brampton <martin@xxxxxxxxxxxxxxxxxxxxxxxx>
- Re: Problem with ipv6
- From: "Kevin P. Fleming" <lists.netfilter@xxxxxxxxxxxxx>
- Re: Unsuccessful adding policy to a regular chain
- From: Kerin Millar <kfm@xxxxxxxxxxxxx>
- Problem with ipv6
- From: Martin Brampton <martin@xxxxxxxxxxxxxxxxxxxxxxxx>
- Re: Unsuccessful adding policy to a regular chain
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: Unsuccessful adding policy to a regular chain
- From: "Kevin P. Fleming" <lists.netfilter@xxxxxxxxxxxxx>
- Unsuccessful adding policy to a regular chain
- From: Robin Bussell <RobinB@xxxxxxxxxxxxxxx>
- Re: Allowing closed connections time to drain before logging packets
- From: "Brian J. Murrell" <brian@xxxxxxxxxxxxxxx>
- Re: Allowing closed connections time to drain before logging packets
- From: "Brian J. Murrell" <brian@xxxxxxxxxxxxxxx>
- [ANNOUNCE] nftables 1.1.1 release
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [ANNOUNCE] libnftnl 1.2.8 release
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- How to count bytes?
- From: "Ronan Pigott" <ronan@xxxxxx>
- Re: Allowing closed connections time to drain before logging packets
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Clarification on the functioning of "ct count"
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [no subject]
- [no subject]
- Clarification on the functioning of "ct count"
- From: Avinash Dige <avinash.dige@xxxxxxxxx>
- Clarification on the functioning of "ct count"
- From: Avinash Dige <avinash.dige@xxxxxxxxx>
- Re: Allowing closed connections time to drain before logging packets
- From: Slavko <linux@xxxxxxxxxx>
- Allowing closed connections time to drain before logging packets
- From: "Brian J. Murrell" <brian@xxxxxxxxxxxxxxx>
- unsubscribe
- From: michael.steinmann@xxxxxxxxxxx
- [ANNOUNCE] libnetfilter_conntrack 1.1.0 release
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Nomnclature - Roman
- From: Reindl Harald <h.reindl@xxxxxxxxxxxxx>
- Nomnclature - Roman
- From: Thomas Sadłowskí <thomas@xxxxxxxxx>
- Re: Wiki entry on Element timeouts in NFtables
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Wiki entry on Element timeouts in NFtables
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Wiki entry on Element timeouts in NFtables
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re_School Contacts List 2024
- From: Lily Green <lily.green@xxxxxxxxxxxxxxxxxxx>
- Re: Issue Setting meta broute
- From: Florian Westphal <fw@xxxxxxxxx>
- Issue Setting meta broute
- From: "Dustin Lieu" <whale_163@xxxxxxxxxxxx>
- Re: Wiki entry on Element timeouts in NFtables
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Wiki entry on Element timeouts in NFtables
- From: Lars Noodén <lars.nooden@xxxxxxx>
- Re: nftables are non-deterministic
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- nftables are non-deterministic
- From: "Artem S. Tashkinov" <aros@xxxxxxx>
- Re: Raw payload expressions are mangled
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Raw payload expressions are mangled
- From: Sunny73Cr <Sunny73Cr@xxxxxxxxxxxxxx>
- Re: Stateless NAT ICMP Payload Mismatch
- From: Echo Nar <echo@xxxxxxxxxxxxx>
- Re: Stateless NAT ICMP Payload Mismatch
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Stateless NAT ICMP Payload Mismatch
- From: Echo Nar <echo@xxxxxxxxxxxxx>
- RE: Understanding output from "nft list"
- From: "Atkins, Brian" <Brian.Atkins@xxxxxxxxxx>
- RE: Understanding output from "nft list"
- From: Slavko <linux@xxxxxxxxxx>
- RE: Understanding output from "nft list"
- From: Slavko <linux@xxxxxxxxxx>
- RE: Understanding output from "nft list"
- From: "Atkins, Brian" <Brian.Atkins@xxxxxxxxxx>
- RE: Understanding output from "nft list"
- From: Slavko <linux@xxxxxxxxxx>
- RE: Understanding output from "nft list"
- From: "Atkins, Brian" <Brian.Atkins@xxxxxxxxxx>
- RE: Understanding output from "nft list"
- From: Slavko <linux@xxxxxxxxxx>
- RE: Understanding output from "nft list"
- From: "Atkins, Brian" <Brian.Atkins@xxxxxxxxxx>
- Re: Understanding output from "nft list"
- From: Brian Sammon <bds@xxxxxxxxxxxxxxx>
- Re: Understanding output from "nft list"
- From: Eric <evil.function@xxxxxxxxx>
- Re: Understanding output from "nft list"
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Understanding output from "nft list"
- From: Brian Sammon <bds@xxxxxxxxxxxxxxx>
- nftables' ulogd2 group "#" usage -- variable substitution possible?
- From: pgnd <pgnd@xxxxxxxxxxxx>
- [ANNOUNCE] Security evaluation by ANSSI of nftables
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- RE: Output port redirect going to loopback?
- From: "Atkins, Brian" <Brian.Atkins@xxxxxxxxxx>
- Re: Output port redirect going to loopback?
- From: Florian Westphal <fw@xxxxxxxxx>
- Output port redirect going to loopback?
- From: "Atkins, Brian" <Brian.Atkins@xxxxxxxxxx>
- correct nft v1.1.0 usage for flowtable h/w offload? `flags offload` &/or `devices=`
- From: pgnd <pgnd@xxxxxxxxxxxx>
- Hardware Offloading Mellanox
- From: "Ritterhoff, Florian" <florian.ritterhoff@xxxxxx>
- Can't set meta priority for some packets in netdev family!
- From: Kevin Vigouroux <ke.vigouroux@xxxxxxxxxxx>
- Re: libnftables way of deleting a rule
- From: Florian Westphal <fw@xxxxxxxxx>
- libnftables way of deleting a rule
- From: Arne Zachlod <arne@xxxxxxxxxxxxxx>
- Re: Unknown option "--to-ports"
- From: Reindl Harald <h.reindl@xxxxxxxxxxxxx>
- How to set packet priority in the netdev table?
- From: Kevin Vigouroux <ke.vigouroux@xxxxxxxxxxx>
- Re: Unknown option "--to-ports"
- From: Tom Isaacson <thomas.isaacson@xxxxxxxxxxxxxxxxxxxxx>
- How do you set packet priority in the netdev table?
- From: Kevin Vigouroux <ke.vigouroux@xxxxxxxxxxx>
- Re: Unknown option "--to-ports"
- From: Reindl Harald <h.reindl@xxxxxxxxxxxxx>
- Re: Unknown option "--to-ports"
- From: Tom Isaacson <thomas.isaacson@xxxxxxxxxxxxxxxxxxxxx>
- Re: Unknown option "--to-ports"
- From: Florian Westphal <fw@xxxxxxxxx>
- Unknown option "--to-ports"
- From: Tom Isaacson <thomas.isaacson@xxxxxxxxxxxxxxxxxxxxx>
- [no subject]
- From: Tom Isaacson <thomas.isaacson@xxxxxxxxxxxxxxxxxxxxx>
- Re: Sets update
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Sets update
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: Sets update
- From: Slavko <linux@xxxxxxxxxx>
- Re: Sets update
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Sets update
- From: Slavko <linux@xxxxxxxxxx>
- Re: Sets update
- From: Slavko <linux@xxxxxxxxxx>
- Re: Sets update
- From: Slavko <linux@xxxxxxxxxx>
- Re: Sets update
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Sets update
- From: Slavko <linux@xxxxxxxxxx>
- Re: Sets update
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: Sets update
- From: Eric <evil.function@xxxxxxxxx>
- Re: Sets update
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: Sets update
- From: Slavko <linux@xxxxxxxxxx>
- Re: Sets update
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: Sets update
- From: Slavko <linux@xxxxxxxxxx>
- Re: Sets update
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: Sets update
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Sets update
- From: Slavko <linux@xxxxxxxxxx>
- Re: syntax issues when reducing rules through grouping ?
- From: Florian Westphal <fw@xxxxxxxxx>
- syntax issues when reducing rules through grouping ?
- From: pgnd <pgnd@xxxxxxxxxxxx>
- [ANNOUNCE] nftables 1.1.0 release
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [ANNOUNCE] libnftnl 1.2.7 release
- From: Phil Sutter <phil@xxxxxxxxxxxxx>
- Re: Regarding ulogd_output_SYSLOG.so
- From: Harald Welte <laforge@xxxxxxxxxxxx>
- Re: nftables rule optimization - evaluating efficiency
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: nftables rule optimization - evaluating efficiency
- From: "William N." <netfilter@xxxxxxxxxx>
- Transparent SNAT bridge with physdev module
- From: Matt Ayre <maayr3@xxxxxxxxx>
- Re: nftables rule optimization - evaluating efficiency
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: nftables rule optimization - evaluating efficiency
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: nftables rule optimization - evaluating efficiency
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: Understanding and debugging conntrack source code
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- Understanding and debugging conntrack source code
- From: Kevin Johnson <kevinamiel100@xxxxxxxxx>
- Does Nftables nft_fib check fib only in the main routing table?
- From: Stanislav Tretyakov <tsv1991@xxxxxxxxx>
- Re: nftables rule optimization - evaluating efficiency
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: nftables rule optimization - evaluating efficiency
- From: Reindl Harald <h.reindl@xxxxxxxxxxxxx>
- nftables rule optimization - evaluating efficiency
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: conntrackd: Trouble using multiple Accept addresses in kernel filter
- From: Yoann Congal <yoann.congal@xxxxxxxx>
- Re: nft not logging some layer 2 frames?
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: nft not logging some layer 2 frames?
- From: Teodor Milkov <tm@xxxxxx>
- Re: conntrackd: Trouble using multiple Accept addresses in kernel filter
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- conntrackd: Trouble using multiple Accept addresses in kernel filter
- From: Yoann Congal <yoann.congal@xxxxxxxx>
- subscribe
- Re: How to have a counter for vmap verdicts?
- From: "William N." <netfilter@xxxxxxxxxx>
- bidge not working. Missing rules?
- From: Paulo Ricardo Bruck <pauloric@xxxxxxxxxxxxxxxxxxxx>
- Re: How to have a counter for vmap verdicts?
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: How to have a counter for vmap verdicts?
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: How to have a counter for vmap verdicts?
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: How to have a counter for vmap verdicts?
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: Writing own match module for modern ebtables.
- From: Pawel Kraszewski <pawel@xxxxxxxxxxxxxx>
- How to have a counter for vmap verdicts?
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: Writing own match module for modern ebtables.
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Writing own match module for modern ebtables.
- From: Pawel Kraszewski <pawel@xxxxxxxxxxxxxx>
- Re: nft not logging some layer 2 frames?
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: nft not logging some layer 2 frames?
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: nft not logging some layer 2 frames?
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Problem with migration from iptables+ipset to nftables
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Problem with migration from iptables+ipset to nftables
- From: Aleksey Nikapli <excusemysmile@xxxxxxxxx>
- [ANNOUNCE] ipset 7.22 released
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxx>
- Re: nftables rule where IPv6 source and destination addr are the same?
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- nftables rule where IPv6 source and destination addr are the same?
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: Problems understanding nftables part 2
- From: Wolfgang <netfilter-user@xxxxxxxxxx>
- Re: Problems understanding nftables part 2
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: Problems understanding nftables part 2
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: Problems understanding nftables part 2
- From: Wolfgang <netfilter-user@xxxxxxxxxx>
- Re: Problems understanding nftables part 2
- From: "Kevin P. Fleming" <lists.netfilter@xxxxxxxxxxxxx>
- Re: Problems understanding nftables part 2
- From: Wolfgang <netfilter-user@xxxxxxxxxx>
- Fwd: ebtables rule rewriten to nft 'set host' does not work
- From: Oto BREZINA <otik@xxxxxxxxxx>
- Re: Problems understanding nftables part 2
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: Cant get "tcp dport 22 @ih,0,32 0x5353482d" to work/match
- From: Pascal Ernster <netfilter@xxxxxxxxxxxxxx>
- Re: ebtables rule rewriten to nft 'set host' does not work
- From: netfilter@xxxxxxxxxx
- Re: ebtables rule rewriten to nft 'set host' does not work
- From: Florian Westphal <fw@xxxxxxxxx>
- Fwd: ebtables rule rewriten to nft 'set host' does not work
- From: netfilter@xxxxxxxxxx
- Re: Cant get "tcp dport 22 @ih,0,32 0x5353482d" to work/match
- From: Valentijn Sessink <valentijn@xxxxxxxxxx>
- Re: Cant get "tcp dport 22 @ih,0,32 0x5353482d" to work/match
- From: Florian Westphal <fw@xxxxxxxxx>
- Cant get "tcp dport 22 @ih,0,32 0x5353482d" to work/match
- From: Pascal Ernster <netfilter@xxxxxxxxxxxxxx>
- Re: ebtables rule rewriten to nft 'set host' does not work
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: Problems understanding nftables part 2
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Problems understanding nftables part 2
- From: Wolfgang <netfilter-user@xxxxxxxxxx>
- ebtables rule rewriten to nft 'set host' does not work
- From: netfilter@xxxxxxxxxx
- Problems understanding nftables
- From: Wolfgang <netfilter-user@xxxxxxxxxx>
- Re: nft not logging some layer 2 frames?
- From: "William N." <netfilter@xxxxxxxxxx>
- [wiki] typo in Nftables families
- From: 谢致邦 (XIE Zhibang) <Yeking@xxxxxxxxx>
- Re: nft not logging some layer 2 frames?
- From: Teodor Milkov <tm@xxxxxx>
- Re: connection refused from DNATted host (libvirt guests!)
- From: Giovanni Biscuolo <giovanni@xxxxxxxxxxxx>
- Using NAT engine information to apply fwmark to packet
- From: "Tobias Jakobi (Compleo)" <tobias.jakobi.compleo@xxxxxxxxx>
- Re: nft not logging some layer 2 frames?
- From: "William N." <netfilter@xxxxxxxxxx>
- connection refused from DNATted host
- From: Giovanni Biscuolo <giovanni@xxxxxxxxxxxx>
- Re: nft not logging some layer 2 frames?
- From: Teodor Milkov <tm@xxxxxx>
- Re: nft not logging some layer 2 frames?
- From: "William N." <netfilter@xxxxxxxxxx>
- nft not logging some layer 2 frames?
- From: Teodor Milkov <tm@xxxxxx>
- Re: Clash Resolve Counter Increasing
- From: Tim Harman <tim@xxxxxxxxxxx>
- Clash Resolve Counter Increasing
- From: Tim Harman <tim@xxxxxxxxxxx>
- Nftables rules for kernel threads (cifsd)
- From: Mikhail Morfikov <mmorfikov@xxxxxxxxx>
- Re: Sets nesting/reference? Complex concatenations in vmaps?
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: Sets nesting/reference? Complex concatenations in vmaps?
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: Sets nesting/reference? Complex concatenations in vmaps?
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: Kernel panic in nf_nat_setup_info, with re injected packet from libnfml
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Kernel panic in nf_nat_setup_info, with re injected packet from libnfml
- From: shibu samuel <msshibu@xxxxxxxxx>
- Sets nesting/reference? Complex concatenations in vmaps?
- From: "William N." <netfilter@xxxxxxxxxx>
- Retrieve L2 header or MAR from packet
- From: La Rus <zator@xxxxxxxxx>
- Re: IPv4 NAT and lo, and iptables
- Re: IPv4 NAT and lo, and iptables
- From: Sven-Haegar Koch <haegar@xxxxxxxxx>
- IPv4 NAT and lo, and iptables
- HW Offloading Mellanox ConnectX-6DX
- From: "Ritterhoff, Florian" <florian.ritterhoff@xxxxxx>
- Re: [Thread split] nftables rule optimization - dropping invalid in ingress?
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: How to have a dynamic ingress device(s) list?
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: How to have a dynamic ingress device(s) list?
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- RE: Drop to Docker bridge
- From: "Alberto" <alberto@xxxxxxxxxxx>
- Re: How to have a dynamic ingress device(s) list?
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: How to have a dynamic ingress device(s) list?
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: How to have a dynamic ingress device(s) list?
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: How to have a dynamic ingress device(s) list?
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- How to have a dynamic ingress device(s) list?
- From: "William N." <netfilter@xxxxxxxxxx>
- NFT: Drop to Docker bridge
- From: "Alberto" <alberto@xxxxxxxxxxx>
- Re: DoS/DDoS protection for end nodes
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: DoS/DDoS protection for end nodes
- From: Quentin Deslandes <qde@xxxxxxxx>
- Re: DoS/DDoS protection for end nodes
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: DoS/DDoS protection for end nodes
- From: Quentin Deslandes <qde@xxxxxxxx>
- Re: [Thread split] nftables rule optimization - dropping invalid in ingress?
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: [Thread split] nftables rule optimization - dropping invalid in ingress?
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: DoS/DDoS protection for end nodes
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: [Thread split] nftables rule optimization - dropping invalid in ingress?
- From: Slavko <linux@xxxxxxxxxx>
- Re: [Thread split] nftables rule optimization - dropping invalid in ingress?
- From: Eric <evil.function@xxxxxxxxx>
- Re: DoS/DDoS protection for end nodes
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: Combining/compacting 2 rules into 1
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: [Thread split] nftables rule optimization - dropping invalid in ingress?
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: [Thread split] nftables rule optimization - dropping invalid in ingress?
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: Rewrite arp response with nft
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: Combining/compacting 2 rules into 1
- From: "William N." <netfilter@xxxxxxxxxx>
- [Thread split] nftables rule optimization - dropping invalid in ingress?
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: Combining/compacting 2 rules into 1
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: How to measure/profile ruleset performance?
- From: "William N." <netfilter@xxxxxxxxxx>
- Rewrite arp response with nft
- From: G H <uothrawn@xxxxxxxxx>
- Re: How to measure/profile ruleset performance?
- From: Serhii <lists@xxxxxxxxxxxx>
- Re: How to measure/profile ruleset performance?
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: How to measure/profile ruleset performance?
- From: Serhii <lists@xxxxxxxxxxxx>
- How to measure/profile ruleset performance?
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: Combining/compacting 2 rules into 1
- From: Serhii <lists@xxxxxxxxxxxx>
- Re: Combining/compacting 2 rules into 1
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: Combining/compacting 2 rules into 1
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: Combining/compacting 2 rules into 1
- From: Serhii <lists@xxxxxxxxxxxx>
- Re: Combining/compacting 2 rules into 1
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: DoS/DDoS protection for end nodes
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: DoS/DDoS protection for end nodes
- From: Serhii <lists@xxxxxxxxxxxx>
- Re: DoS/DDoS protection for end nodes
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: DoS/DDoS protection for end nodes
- From: Florian Kauer <florian.kauer@xxxxxxxxxxxxx>
- Re: DoS/DDoS protection for end nodes
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: DoS/DDoS protection for end nodes
- From: Joshua Moore <j@xxxxxx>
- Re: DoS/DDoS protection for end nodes
- From: Reindl Harald <h.reindl@xxxxxxxxxxxxx>
- Re: DoS/DDoS protection for end nodes
- From: Serg <lists@xxxxxxxxxxxx>
- DoS/DDoS protection for end nodes
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: Combining/compacting 2 rules into 1
- From: Slavko <linux@xxxxxxxxxx>
- Re: Combining/compacting 2 rules into 1
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: Combining/compacting 2 rules into 1
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: Combining/compacting 2 rules into 1
- From: Slavko <linux@xxxxxxxxxx>
- Re: Combining/compacting 2 rules into 1
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: Combining/compacting 2 rules into 1
- From: Slavko <linux@xxxxxxxxxx>
- Re: Combining/compacting 2 rules into 1
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: Combining/compacting 2 rules into 1
- From: Kerin Millar <kfm@xxxxxxxxxxxxx>
- Re: Combining/compacting 2 rules into 1
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: Combining/compacting 2 rules into 1
- From: Kerin Millar <kfm@xxxxxxxxxxxxx>
- Combining/compacting 2 rules into 1
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: NFQUEUE usage and interaction with later chain rules
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: NFQUEUE usage and interaction with later chain rules
- From: Athanasius <netfilter.org@xxxxxxxxx>
- NFQUEUE usage and interaction with later chain rules
- From: Athanasius <netfilter.org@xxxxxxxxx>
- Re: Using iptables and ipset to DROP a list of 2 million addresses
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxx>
- Re: connlimit from wiki.nftables.org not working
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: connlimit from wiki.nftables.org not working
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: connlimit from wiki.nftables.org not working
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: connlimit from wiki.nftables.org not working
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: connlimit from wiki.nftables.org not working
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: Using iptables and ipset to DROP a list of 2 million addresses
- From: Stephen Satchell <list@xxxxxxxxxxxx>
- Re: Using iptables and ipset to DROP a list of 2 million addresses
- From: Le Chevalier <mail@xxxxxxxxxxxxxx>
- Using iptables and ipset to DROP a list of 2 million addresses
- From: Mason Kaufer <mason.kaufer@xxxxxxxxxxxxxxxxxxxxxxx>
- Re: connlimit from wiki.nftables.org not working
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: Correct way of setting the TCP max segment sizes for IPv4 and IPv6?
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: Correct way of setting the TCP max segment sizes for IPv4 and IPv6?
- From: Slavko <linux@xxxxxxxxxx>
- connlimit from wiki.nftables.org not working
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: Correct way of setting the TCP max segment sizes for IPv4 and IPv6?
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: Correct way of setting the TCP max segment sizes for IPv4 and IPv6?
- From: Slavko <linux@xxxxxxxxxx>
- Re: Correct way of setting the TCP max segment sizes for IPv4 and IPv6?
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: Correct way of setting the TCP max segment sizes for IPv4 and IPv6?
- From: Slavko <linux@xxxxxxxxxx>
- Correct way of setting the TCP max segment sizes for IPv4 and IPv6?
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: nftables: How to match ICMPv6 subtype in a rule?
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: nftables: How to match ICMPv6 subtype in a rule?
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Docker NFT rules conflict
- From: Alberto <alberto@xxxxxxxxxxx>
- Re: nftables: How to match ICMPv6 subtype in a rule?
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: nftables: How to match ICMPv6 subtype in a rule?
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: nftables: How to match ICMPv6 subtype in a rule?
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: nftables: How to match ICMPv6 subtype in a rule?
- From: Kerin Millar <kfm@xxxxxxxxxxxxx>
- Re: nftables: How to match ICMPv6 subtype in a rule?
- From: "William N." <netfilter@xxxxxxxxxx>
- RE: Rocky Linux 9 with firewalld and nftables always tracks connections
- From: Blaine Elzey <Blaine.Elzey@xxxxxxxxxxxxx>
- Re: nftables: How to match ICMPv6 subtype in a rule?
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: Rocky Linux 9 with firewalld and nftables always tracks connections
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- RE: Rocky Linux 9 with firewalld and nftables always tracks connections
- From: Blaine Elzey <Blaine.Elzey@xxxxxxxxxxxxx>
- nftables: How to match ICMPv6 subtype in a rule?
- From: "William N." <netfilter@xxxxxxxxxx>
- Re: Rocky Linux 9 with firewalld and nftables always tracks connections
- From: Kerin Millar <kfm@xxxxxxxxxxxxx>
- Rocky Linux 9 with firewalld and nftables always tracks connections
- From: Blaine Elzey <Blaine.Elzey@xxxxxxxxxxxxx>
- Re: Mask as part of element in set
- From: Vlad Tsisyk <vlad@xxxxxxxxxx>
- Re: Mask as part of element in set
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Mask as part of element in set
- From: Vlad Tsisyk <vlad@xxxxxxxxxx>
- Re: IP not banned in interval set
- From: Daniel <tech@xxxxxxxxxx>
- Re: IP not banned in interval set
- From: Gordon Fisher <gordfisherman@xxxxxxxxx>
- Re: IP not banned in interval set
- From: List Support <list@xxxxxxxxxx>
- Re: IP not banned in interval set
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: IP not banned in interval set
- From: List Support <list@xxxxxxxxxx>
- IP not banned in interval set
- From: List Support <list@xxxxxxxxxx>
- Re: nft ends with error
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Cannot get the correct IP version from packet
- From: Alessandro Vesely <vesely@xxxxxxx>
- Re: Cannot get the correct IP version from packet
- From: Meiyong Yu <meiyong.yu@xxxxxxx>
- Re: Cannot get the correct IP version from packet
- From: Alessandro Vesely <vesely@xxxxxxx>
- Re: nft ends with error
- From: Kamil Jońca <kjonca@xxxxx>
- Cannot get the correct IP version from packet
- From: Alessandro Vesely <vesely@xxxxxxx>
- Re: SNI filtering
- From: Pierre-Philipp Braun <pbraun@xxxxxxxxxxxx>
- SNI filtering
- From: Tim Lewis <elatllat@xxxxxxxxx>
- Re: nftables rate limiting per multiple seconds
- From: Sreedhar M <sreemtech@xxxxxxxxx>
- Re: nftables rate limiting per multiple seconds
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: nftables rate limiting per multiple seconds
- From: Sreedhar M <sreemtech@xxxxxxxxx>
- Re: nftables rate limiting per multiple seconds
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: nftables rate limiting per multiple seconds
- From: Sreedhar M <sreemtech@xxxxxxxxx>
- Re: nftables rate limiting per multiple seconds
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: nftables rate limiting per multiple seconds
- From: Sreedhar M <sreemtech@xxxxxxxxx>
- Re: nftables rate limiting per multiple seconds
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: nftables rate limiting per multiple seconds
- From: Sreedhar M <sreemtech@xxxxxxxxx>
- Re: nftables rate limiting per multiple seconds
- From: Sreedhar M <sreemtech@xxxxxxxxx>
- Re: nftables rate limiting per multiple seconds
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: nftables rate limiting per multiple seconds
- From: Sreedhar M <sreemtech@xxxxxxxxx>
- Re: nftables rate limiting per multiple seconds
- From: Kerin Millar <kfm@xxxxxxxxxxxxx>
- nftables rate limiting per multiple seconds
- From: Sreedhar M <sreemtech@xxxxxxxxx>
- Re: nft socket module
- From: Sreedhar M <sreemtech@xxxxxxxxx>
- Re: nft socket module
- From: Florian Westphal <fw@xxxxxxxxx>
- nft socket module
- From: Sreedhar M <sreemtech@xxxxxxxxx>
- Re: snat with dynamic ip address
- From: Lars Noodén <lars.nooden@xxxxxxx>
- Re: snat with dynamic ip address
- From: seentr@xxxxxxxxxxxx
- snat with dynamic ip address
- From: Lars Noodén <lars.nooden@xxxxxxx>
- Fwd: Defined parameters
- From: Beewoolie <beewoolie@xxxxxxxxx>
- Fwd: Knocking example may not work?
- From: Marc Singer <elf@xxxxxxxxxxxxxx>
- Ulogd2 Mysql KO
- From: Yves Metivier <yves@xxxxxxxxxxx>
- Question: How to pass Docker container traffic through iptables tproxy?
- From: Morteza Behboodian <xeptore@xxxxxxxxx>
- Nftables conntrack state matching JSON syntax
- From: Mikołaj Pisula <mik.pisula@xxxxxxxxx>
- nftables HOWto Wiki Question
- From: David Hayward <a1863.netfilter@xxxxxxxxxxxxxxxx>
- nftables and RFC 7084 section-4.3 L-14
- From: Martin Tonusoo <martin@xxxxxxxxxx>
- [ANNOUNCE] ipset 7.21 released
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxx>
- Re: Are there nft set limits?
- From: "Xavier B." <somenxavier@xxxxxxxxxx>
- Re: Are there nft set limits?
- From: "Xavier B." <somenxavier@xxxxxxxxxx>
- Re: Are there nft set limits?
- From: Anton <anton.khazan@xxxxxxxxx>
- Re: Are there nft set limits?
- From: Florian Westphal <fw@xxxxxxxxx>
- Are there nft set limits?
- From: "Xavier B." <somenxavier@xxxxxxxxxx>
- Re: What happens if the machine runs out of memory while adding new nftables sets atomically?
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: What happens if the machine runs out of memory while adding new nftables sets atomically?
- From: Anton <anton.khazan@xxxxxxxxx>
- Re: What happens if the machine runs out of memory while adding new nftables sets atomically?
- From: Anton <anton.khazan@xxxxxxxxx>
- Re: What happens if the machine runs out of memory while adding new nftables sets atomically?
- From: Florian Westphal <fw@xxxxxxxxx>
- What happens if the machine runs out of memory while adding new nftables sets atomically?
- From: Anton <anton.khazan@xxxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: Eric <evil.function@xxxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: Eric <evil.function@xxxxxxxxx>
- Re: Analyzing firewall rules programmatically
- From: Timo Lindfors <timo.lindfors@xxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: Eric <evil.function@xxxxxxxxx>
- Re: Analyzing firewall rules programmatically
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: Slavko <linux@xxxxxxxxxx>
- Re: Analyzing firewall rules programmatically
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: Analyzing firewall rules programmatically
- From: Timo Lindfors <timo.lindfors@xxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: Eric <evil.function@xxxxxxxxx>
- Re: Is there an efficient way to delete multiple elements from a set?
- From: Anton <anton.khazan@xxxxxxxxx>
- Re: Analyzing firewall rules programmatically
- From: Kerin Millar <kfm@xxxxxxxxxxxxx>
- Re: [nftables] Multiple reject withs in a single rule
- From: Kerin Millar <kfm@xxxxxxxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: Kerin Millar <kfm@xxxxxxxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: Slavko <linux@xxxxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: Is there an efficient way to delete multiple elements from a set?
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: Marc Haber <mh+netfilter@xxxxxxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: Marc Haber <mh+netfilter@xxxxxxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: Marc Haber <mh+netfilter@xxxxxxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: Slavko <linux@xxxxxxxxxx>
- Re: Is there an efficient way to delete multiple elements from a set?
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- Re: Is there an efficient way to delete multiple elements from a set?
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Is there an efficient way to delete multiple elements from a set?
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: Slavko <linux@xxxxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: "Kevin P. Fleming" <lists.netfilter@xxxxxxxxxxxxx>
- Re: Is there an efficient way to delete multiple elements from a set?
- From: Anton <anton.khazan@xxxxxxxxx>
- Re: Is there an efficient way to delete multiple elements from a set?
- From: Kerin Millar <kfm@xxxxxxxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Is there an efficient way to delete multiple elements from a set?
- From: Anton <anton.khazan@xxxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: Kerin Millar <kfm@xxxxxxxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: Slavko <linux@xxxxxxxxxx>
- [ANNOUNCE] ipset 7.20 released
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: Is there an efficient way to delete multiple elements from a set?
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: Daniel <tech@xxxxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: Marc Haber <mh+netfilter@xxxxxxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: "Kim B. Heino" <b@xxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: Marc Haber <mh+netfilter@xxxxxxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: Marc Haber <mh+netfilter@xxxxxxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: Marc Haber <mh+netfilter@xxxxxxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: Marc Haber <mh+netfilter@xxxxxxxxxxxx>
- Re: Is there an efficient way to delete multiple elements from a set?
- From: Anton <anton.khazan@xxxxxxxxx>
- Re: Is there an efficient way to delete multiple elements from a set?
- From: Reindl Harald <h.reindl@xxxxxxxxxxxxx>
- Is there an efficient way to delete multiple elements from a set?
- From: Anton <anton.khazan@xxxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: Kerin Millar <kfm@xxxxxxxxxxxxx>
- Analyzing firewall rules programmatically
- From: Timo Lindfors <timo.lindfors@xxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: Slavko <linux@xxxxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: Slavko <linux@xxxxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: "Kim B. Heino" <b@xxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: Marc Haber <mh+netfilter@xxxxxxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: Daniel <tech@xxxxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: Daniel <tech@xxxxxxxxxx>
- Re: Combine ipv4 and ipv6 in a set
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Combine ipv4 and ipv6 in a set
- From: Daniel <tech@xxxxxxxxxx>
- Re: Debugging libmnl client
- From: Slavko <linux@xxxxxxxxxx>
- Re: Debugging libmnl client
- From: Alessandro Vesely <vesely@xxxxxxx>
- Re: Debugging libmnl client
- From: Jeremy Sowden <jeremy@xxxxxxxxxx>
- Debugging libmnl client
- From: Alessandro Vesely <vesely@xxxxxxx>
- About adding a nft rule to limit opensearch connections
- From: jadhav vishwanath <jvishwanath66@xxxxxxxxx>
- Re: Question about the man page
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: GUI Frontend for iptables and nftables Linux firewalls
- From: Josef Vybíhal <josef@xxxxxxxxxx>
- How to match only one packet and no other subsequent new packets?
- From: tabloid_scavenger345@xxxxxxxxx
- Neighbour events for V6 deprecated addresses
- From: Aparna Annapragada <aparnaannapragada@xxxxxxxxx>
- Kprobe for nf_nat is broken in Latest Debian 6.1.66-1
- From: P K <pkopensrc@xxxxxxxxx>
- Re: Vim Syntax Highlighting
- From: Aurel Wisse <aurelwisse@xxxxxxxxxxxx>
- Re: Vim Syntax Highlighting
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Vim Syntax Highlighting
- From: Aurel Wisse <aurelwisse@xxxxxxxxxxxx>
- Re: Netfilter, IPVLAN, L3S and NAT64
- From: Rob Ert <ertr3960@xxxxxxxxx>
- Re: Netfilter, IPVLAN, L3S and NAT64
- From: Joshua Moore <j@xxxxxx>
- Fwd: Netfilter, IPVLAN, L3S and NAT64
- From: Rob Ert <ertr3960@xxxxxxxxx>
- Re: Netfilter, IPVLAN, L3S and NAT64
- From: Joshua Moore <j@xxxxxx>
- Netfilter, IPVLAN, L3S and NAT64
- From: Rob Ert <ertr3960@xxxxxxxxx>
- Question about the man page
- From: Aurel Wisse <nf@xxxxxxxxx>
- Re: Unit dependency of network-pre.target in nftables.service
- From: "Kevin P. Fleming" <lists.netfilter@xxxxxxxxxxxxx>
- Re: Unit dependency of network-pre.target in nftables.service
- From: You Yu Lu <zxc70208@xxxxxxxxx>
- Re: Undelivered Mail Returned to Sender
- From: "Kerin Millar" <kfm@xxxxxxxxxxxxx>
- Re: Undelivered Mail Returned to Sender
- From: Zounp <zounp@xxxxxxxxxxxxx>
- Re: Unit dependency of network-pre.target in nftables.service
- From: "Kevin P. Fleming" <lists.netfilter@xxxxxxxxxxxxx>
- Re: nftables problem consultation
- From: "Kevin P. Fleming" <lists.netfilter@xxxxxxxxxxxxx>
- Re: 回复: nftables problem consultation
- From: Eric <evil.function@xxxxxxxxx>
- 回复: nftables problem consultation
- From: ye4 yu3 <ye4yu3@xxxxxxxxxxx>
- tcpdump output changes after restarting nftable
- From: You Yu Lu <zxc70208@xxxxxxxxx>
- Re: nftables problem consultation
- From: Eric <evil.function@xxxxxxxxx>
- nftables problem consultation
- From: ye4 yu3 <ye4yu3@xxxxxxxxxxx>
- Re: Unit dependency of network-pre.target in nftables.service
- From: You Yu Lu <zxc70208@xxxxxxxxx>
- [no subject]
- From: You Yu Lu <zxc70208@xxxxxxxxx>
- Re: Unit dependency of network-pre.target in nftables.service
- From: Reindl Harald <h.reindl@xxxxxxxxxxxxx>
- Re: Unit dependency of network-pre.target in nftables.service
- From: Reindl Harald <h.reindl@xxxxxxxxxxxxx>
- Re: Unit dependency of network-pre.target in nftables.service
- From: Serg <seentr@xxxxxxxxxxxx>
- Re: Unit dependency of network-pre.target in nftables.service
- From: Reindl Harald <h.reindl@xxxxxxxxxxxxx>
- Re: Unit dependency of network-pre.target in nftables.service
- From: "Kevin P. Fleming" <lists.netfilter@xxxxxxxxxxxxx>
- Re: Unit dependency of network-pre.target in nftables.service
- From: Serg <seentr@xxxxxxxxxxxx>
- Re: Unit dependency of network-pre.target in nftables.service
- From: Reindl Harald <h.reindl@xxxxxxxxxxxxx>
- Re: Unit dependency of network-pre.target in nftables.service
- From: "Kevin P. Fleming" <lists.netfilter@xxxxxxxxxxxxx>
- Unit dependency of network-pre.target in nftables.service
- From: You Yu Lu <zxc70208@xxxxxxxxx>
- Re: ipset hash:net,iface - can not add more than 64 interfaces
- From: Марк Коренберг <socketpair@xxxxxxxxx>
- Re: ipset hash:net,iface - can not add more than 64 interfaces
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxx>
- Re: ipset hash:net,iface - can not add more than 64 interfaces
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxx>
- Re: ipset hash:net,iface - can not add more than 64 interfaces
- From: Марк Коренберг <socketpair@xxxxxxxxx>
- Re: ipset hash:net,iface - can not add more than 64 interfaces
- From: Марк Коренберг <socketpair@xxxxxxxxx>
- Re: ipset hash:net,iface - can not add more than 64 interfaces
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxx>
- ipset hash:net,iface - can not add more than 64 interfaces
- From: Марк Коренберг <socketpair@xxxxxxxxx>
- Re: [nftables] Multiple reject withs in a single rule
- From: Reindl Harald <h.reindl@xxxxxxxxxxxxx>
- [nftables] Multiple reject withs in a single rule
- From: Edward Dickson <edickson@xxxxxxxxxxxxxxxxxx>
- Re: nft ends with error
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- PSA: this list has moved to new vger infra (no action required)
- From: Konstantin Ryabitsev <konstantin@xxxxxxxxxxxxxxxxxxx>
- Re: nft ends with error
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- nft ends with error
- From: Kamil Jońca <kjonca@xxxxx>
- Re: Getting error "Error: missing hook and priority in flowtable declaration" in nftables 1.0.9
- From: Martin Gignac <martin.gignac@xxxxxxxxx>
- Re: Getting error "Error: missing hook and priority in flowtable declaration" in nftables 1.0.9
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Getting error "Error: missing hook and priority in flowtable declaration" in nftables 1.0.9
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: nft tproxy failed to redirect on one system
- From: Carl Lei <xecycle@xxxxxxxxx>
- Re: Performing NAT 1:1 without connection tracking
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Performing NAT 1:1 without connection tracking
- From: Blažej Krajňák <krajnak@xxxxxxxxxx>
- Fwd: nfqueue at postrouting hook does not work
- From: Nayan Gadre <beejoy.nayan@xxxxxxxxx>
- nfqueue at postrouting hook does not work
- From: Nayan Gadre <beejoy.nayan@xxxxxxxxx>
- Getting error "Error: missing hook and priority in flowtable declaration" in nftables 1.0.9
- From: Martin Gignac <martin.gignac@xxxxxxxxx>
- Getting error "Error: missing hook and priority in flowtable declaration" in nftables 1.0.9
- From: Martin Gignac <martin.gignac@xxxxxxxxx>
- Re: Optimize fails on a large ruleset
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Optimize fails on a large ruleset
- From: A L <mail@xxxxxxxxxxxxxx>
- Re: Optimize fails on a large ruleset
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Optimize fails on a large ruleset
- From: sixene@xxxxxxxxxxxx
- Optimize fails on a large ruleset
- From: Sixene <notsixene@xxxxxxxxx>
- [ANNOUNCE] Coreteam updates: Eric Leblond and Arturo Borrero enter emeritus status
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: meta time/hour questions
- From: Brian Davidson <davidson.brian@xxxxxxxxx>
- Re: meta time/hour questions
- From: Kerin Millar <kfm@xxxxxxxxxxxxx>
- meta time/hour questions
- From: Brian Davidson <davidson.brian@xxxxxxxxx>
- Re: Problems getting started with dnat and port forwarding
- From: Kerin Millar <kfm@xxxxxxxxxxxxx>
- Problems getting started with dnat and port forwarding
- From: Rubén Méndez Hernández <rmendezh@xxxxxxxxxxxxxxxx>
- Re: Redirect doesn't do the job as dnat does
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: Redirect doesn't do the job as dnat does
- From: Tech <tech@xxxxxxxxxx>
- Re: Redirect doesn't do the job as dnat does
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: nftables expressions and operators
- From: "Aurel Wisse" <nf@xxxxxxxxx>
- Re: nftables expressions and operators
- From: Eric <evil.function@xxxxxxxxx>
- Re: nftables expressions and operators
- From: "Aurel Wisse" <nf@xxxxxxxxx>
- Re: nftables expressions and operators
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- nftables expressions and operators
- From: "Aurel Wisse" <nf@xxxxxxxxx>
- Re: ip6 dscp fails map lookup
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: ip6 dscp fails map lookup
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: ip6 dscp fails map lookup
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: ip6 dscp fails map lookup
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Redirect doesn't do the job as dnat does
- From: Tech <tech@xxxxxxxxxx>
- Re: Redirect doesn't do the job as dnat does
- From: Florian Westphal <fw@xxxxxxxxx>
- Redirect doesn't do the job as dnat does
- From: Tech <tech@xxxxxxxxxx>
- Re: ip6 dscp fails map lookup
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: ip6 dscp fails map lookup
- From: Florian Westphal <fw@xxxxxxxxx>
- ip6 dscp fails map lookup
- From: Brian Davidson <davidson.brian@xxxxxxxxx>
- Re: Help with debugging combination of tproxy and policy based routing
- From: niconorsk <niconorsk@xxxxxxxxx>
- Re: meta time rules display after 00:00 UTC
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: map problem with port range
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Help with debugging combination of tproxy and policy based routing
- From: niconorsk <niconorsk@xxxxxxxxx>
- Re: map problem with port range
- From: Daniel <tech@xxxxxxxxxx>
- Re: map problem with port range
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: nftables / DHCP / NAT
- From: Volodymyr Litovka <doka@xxxxxxxxx>
- Help with debugging combination of tproxy and policy based routing
- From: niconorsk <niconorsk@xxxxxxxxx>
- meta time rules display after 00:00 UTC
- From: Brian Davidson <davidson.brian@xxxxxxxxx>
- map problem with port range
- From: Daniel <tech@xxxxxxxxxx>
- Re: nftables / DHCP / NAT
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: nftables / DHCP / NAT
- From: Volodymyr Litovka <doka@xxxxxxxxx>
- Re: arptables-nft and comments in nft output
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: nftables / DHCP / NAT
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: nftables / DHCP / NAT
- From: Volodymyr Litovka <doka@xxxxxxxxx>
- Re: nftables / DHCP / NAT
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: arptables-nft and comments in nft output
- From: Florian Westphal <fw@xxxxxxxxx>
- arptables-nft and comments in nft output
- From: Valentijn Sessink <valentijn@xxxxxxxxxx>
- nftables / DHCP / NAT
- From: Volodymyr Litovka <doka@xxxxxxxxx>
- Wiki Offline
- From: Bradley Hook <bradley@xxxxxxxxxx>
- Re: Flowtables ignore timeout settings in recent kernels
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Masquerading clients while trying to send traffic over ipsec tunnel
- From: readme@xxxxxxxxxxxxxxx
- Re: Flowtables ignore timeout settings in recent kernels
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: nf_nat_icmp_reply_translation dropped icmp redirect packet
- From: sun miller <sunminlei@xxxxxxxxx>
- [ANNOUNCE] nftables 1.0.9 release
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: nf_nat_icmp_reply_translation dropped icmp redirect packet
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: nf_nat_icmp_reply_translation dropped icmp redirect packet
- From: sun miller <sunminlei@xxxxxxxxx>
- [PATCH nf-next,RFC 2/2] netfilter: nf_tables: set element timeout update support
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf-next,RFC 1/2] netfilter: nf_tables: add timeout extension to elements to prepare for updates
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nftables/nft] nft equivalent of "ipset test"
- From: Phil Sutter <phil@xxxxxx>
- Re: [nftables/nft] nft equivalent of "ipset test"
- From: "U.Mutlu" <um@xxxxxxxxxxx>
- Re: commit to kernel fails since Debian 12 (bookworm)
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nftables/nft] nft equivalent of "ipset test"
- From: Kerin Millar <kfm@xxxxxxxxxxxxx>
- Re: [nftables/nft] nft equivalent of "ipset test"
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: commit to kernel fails since Debian 12 (bookworm)
- From: Markus Wigge <wigge@xxxxxxxxxxxxx>
- Re: [nftables/nft] nft equivalent of "ipset test"
- From: "U.Mutlu" <um@xxxxxxxxxxx>
- Re: [nftables/nft] nft equivalent of "ipset test"
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nftables/nft] nft equivalent of "ipset test"
- From: "U.Mutlu" <um@xxxxxxxxxxx>
- Re: [nftables/nft] nft equivalent of "ipset test"
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nftables/nft] nft equivalent of "ipset test"
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nftables/nft] nft equivalent of "ipset test"
- From: "U.Mutlu" <um@xxxxxxxxxxx>
- Re: [nftables/nft] nft equivalent of "ipset test"
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [nftables/nft] nft equivalent of "ipset test"
- From: "U.Mutlu" <um@xxxxxxxxxxx>
- Re: [nftables/nft] nft equivalent of "ipset test"
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: nf_nat_icmp_reply_translation dropped icmp redirect packet
- From: Florian Westphal <fw@xxxxxxxxx>
- [nftables/nft] nft equivalent of "ipset test"
- From: "U.Mutlu" <um@xxxxxxxxxxx>
- nf_nat_icmp_reply_translation dropped icmp redirect packet
- From: sun miller <sunminlei@xxxxxxxxx>
- Getting packet timestamps
- From: Alessandro Vesely <vesely@xxxxxxx>
- Re: [iptables/ipset] Bug? -m set --match-set myset src --packets-gt 2 -j ...
- From: "U.Mutlu" <um@xxxxxxxxxxx>
- Re: [iptables/ipset] Bug? -m set --match-set myset src --packets-gt 2 -j ...
- From: "U.Mutlu" <um@xxxxxxxxxxx>
- Re: commit to kernel fails since Debian 12 (bookworm)
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
[Index of Archives]
[LARTC]
[Berkeley Packet Filter]
[Bugtraq]
[Yosemite News]
[Samba]