Hi, This is a bugfix release. The list of the fixed bugs is - 'ipset -N' did not generate proper return code - 'limit' module parameter added to the kernel modules of the iphash, ipporthash, nethash and iptree type of sets so that the maximal number of elements can now be limited - zero valued entries (port 0 or IP address 0.0.0.0) were detected as members of the hash/tree kind of sets (reported by Andrew Kraslavsky) - list and save operations used the external identifier of the sets for the bindings instead of the internal one (reported by Amin Azez) If you use hash/iptree type of sets to dynamically protect your network via the SET target, I strongly suggest you to upgrade: in the previous releases there was no limit on the number of the possible elements in a hash/iptree type of set and thus an attacker could exhaust the available physical memory in the machine by triggering adding bogus, faked entries. Now there is a default of max 65535 elements in the hash/iptree type of sets: you can adjust it per settype by setting the 'limit' parameter of the appropriate kernel module, e.g: # modprobe ip_set_iphash limit=10000 You can download the new release from http://ipset.netfilter.org or from the netfilter svn tree. Best regards, Jozsef - E-mail : kadlec@xxxxxxxxxxxxxxxxx, kadlec@xxxxxxxxxxxxxxx PGP key : http://www.kfki.hu/~kadlec/pgp_public_key.txt Address : KFKI Research Institute for Particle and Nuclear Physics H-1525 Budapest 114, POB. 49, Hungary