<html>
<head>
<base href="https://bugzilla.netfilter.org/" />
</head>
<body><table border="1" cellspacing="0" cellpadding="8">
<tr>
<th>Bug ID</th>
<td><a class="bz_bug_link
bz_status_NEW "
title="NEW - connlimit rule fires too often"
href="https://bugzilla.netfilter.org/show_bug.cgi?id=1207">1207</a>
</td>
</tr>
<tr>
<th>Summary</th>
<td>connlimit rule fires too often
</td>
</tr>
<tr>
<th>Product</th>
<td>netfilter/iptables
</td>
</tr>
<tr>
<th>Version</th>
<td>unspecified
</td>
</tr>
<tr>
<th>Hardware</th>
<td>x86_64
</td>
</tr>
<tr>
<th>OS</th>
<td>All
</td>
</tr>
<tr>
<th>Status</th>
<td>NEW
</td>
</tr>
<tr>
<th>Severity</th>
<td>enhancement
</td>
</tr>
<tr>
<th>Priority</th>
<td>P5
</td>
</tr>
<tr>
<th>Component</th>
<td>ip_tables (kernel)
</td>
</tr>
<tr>
<th>Assignee</th>
<td>netfilter-buglog@lists.netfilter.org
</td>
</tr>
<tr>
<th>Reporter</th>
<td>toralf.foerster@gmx.de
</td>
</tr></table>
<p>
<div>
<pre>I do use the following rule to get being informed if the amount of new outgoing
connections from my server at port $p is higher than a given threshold $n:
$IPT -A OUTPUT -p tcp --destination-port $p --syn --match connlimit
--connlimit-above $n --connlimit-mask 0 --connlimit-daddr --match limit --limit
1/second --limit-burst 1 -j LOG --log-prefix "limit $n at $p reached "
After few hours this rule fires too often (every few seconds). A restart of the
iptables init.d script solved the issue immediately and the rule fires again
just rarely as expected.</pre>
</div>
</p>
<hr>
<span>You are receiving this mail because:</span>
<ul>
<li>You are watching all bug changes.</li>
</ul>
</body>
</html>