<html>
<head>
<base href="https://bugzilla.netfilter.org/" />
</head>
<body>
<p>
<div>
<b><a class="bz_bug_link
bz_status_NEW "
title="NEW - Window Tracking not disabled"
href="https://bugzilla.netfilter.org/show_bug.cgi?id=1087#c10">Comment # 10</a>
on <a class="bz_bug_link
bz_status_NEW "
title="NEW - Window Tracking not disabled"
href="https://bugzilla.netfilter.org/show_bug.cgi?id=1087">bug 1087</a>
from <span class="vcard"><a class="email" href="mailto:mat999@gmail.com" title="Mathew <mat999@gmail.com>"> <span class="fn">Mathew</span></a>
</span></b>
<pre>(In reply to Arturo Borrero Gonzalez from <a href="show_bug.cgi?id=1087#c9">comment #9</a>)
<span class="quote">> One more question.
>
> In this line
> <a href="http://lxr.free-electrons.com/source/net/netfilter/nf_conntrack_proto_tcp">http://lxr.free-electrons.com/source/net/netfilter/nf_conntrack_proto_tcp</a>.
> c?v=4.1#L935
>
> the code calls tcp_options() which parses the TCP header to fill our
> conntrack entry (the 'seen' one).
>
> In that function we don't put IP_CT_TCP_FLAG_BE_LIBERAL into flags, so a
> later check if (seen.flags & IP_CT_TCP_FLAG_BE_LIBERAL) should always fail.
>
> It seems I'm missing something.</span >
I am fairly certain (from memory) that's all I did to fix the issue. I don't
have the patched kernel in front of me however. I'll double check when I am
on-site on Thursday.</pre>
</div>
</p>
<hr>
<span>You are receiving this mail because:</span>
<ul>
<li>You are watching all bug changes.</li>
</ul>
</body>
</html>