[Bug 95] New: inverse limit match doesn't work

bugzilla-daemon@netfilter.org bugzilla-daemon@netfilter.org
Fri, 30 May 2003 03:17:40 +0200


https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=95

           Summary: inverse limit match doesn't work
           Product: netfilter/iptables
           Version: linux-2.4.x
          Platform: i386
        OS/Version: Mandrake Linux
            Status: NEW
          Severity: normal
          Priority: P2
         Component: ip_tables (kernel)
        AssignedTo: laforge@netfilter.org
        ReportedBy: email@cs-ware.de
                CC: netfilter-buglog@lists.netfilter.org


The inverse limit match seems to be broken:

#iptables -A INPUT -m limit ! --limit 1/sec -j DROP
seems to be the same as
#iptables -A INPUT -m limit --limit 1/sec -j DROP

Both result in:
#iptables --list -n
Chain INPUT (policy ACCEPT)
target     prot opt source               destination
DROP       all  --  0.0.0.0/0            0.0.0.0/0          limit: avg 1/sec 
burst 5

But in the iptables Tutorial 1.1.19 by Oskar Andreasson (http://iptables-
tutorial.frozentux.net/chunkyhtml/matches.html#TABLE.LIMITMATCH) there is 
written:
"The limit match may also be inverted by adding a ! flag in front of the
limit match. It would then be expressed as -m ! limit. This means that all
packets will be matched after they have broken the limit."
And in the iptables man-page there is written:
"A rule using this extension will match until this limit is reached (unless 
the '!' flag is used)."

My configuration:
iptables/1.2.8, Kernel 2.4.20 with POM 20030107 and grsecurity-1.9.9h

Regards
Sven Strickroth



------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.