Your Bugzilla bug list needs attention.

bugzilla-daemon at bugzilla.netfilter.org bugzilla-daemon at bugzilla.netfilter.org
Mon Nov 26 01:46:18 CET 2012


[This e-mail has been automatically generated.]

You have one or more bugs assigned to you in the Bugzilla bug tracking system (http://bugzilla.netfilter.org/) that require
attention.

All of these bugs are in the NEW or REOPENED state, and have not been
touched in 7 days or more.
You need to take a look at them, and decide on an initial action.

Generally, this means one of three things:

(1) You decide this bug is really quick to deal with (like, it's INVALID),
    and so you get rid of it immediately.
(2) You decide the bug doesn't belong to you, and you reassign it to
    someone else. (Hint: if you don't know who to reassign it to, make
    sure that the Component field seems reasonable, and then use the
    "Reset Assignee to default" option.)
(3) You decide the bug belongs to you, but you can't solve it this moment.
    Accept the bug by setting the status to ASSIGNED.

To get a list of all NEW/REOPENED bugs, you can use this URL (bookmark
it if you like!):
http://bugzilla.netfilter.org/buglist.cgi?bug_status=NEW&bug_status=REOPENED&assigned_to=netfilter-buglog@lists.netfilter.org

Or, you can use the general query page, at 
http://bugzilla.netfilter.org/query.cgi

Appended below are the individual URLs to get to all of your NEW bugs
that haven't been touched for 7 days or more.

You will get this message once a day until you've dealt with these bugs!

 Enhancement:  Allow rules to specify ICMP type ranges.
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=630
 In IPv6 route information doesn't get flushed out when deleting and creating a new interface
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=655
 netfilters clamp-mss-to-pmtu sets bad MSS when none was set before
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=662
 Postrouting + IPsec + IPv6
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=663
 connlimit doesn't work properly
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=676
 add PID and UID to netfilter-queue
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=678
 iptables-xml missing <match> in first <conditions> node
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=679
 Packets disappear after NAT on 2nd gateway
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=680
 Ruleset counter on -m recent match when recent table OVERFLOWED.
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=689
 Netfilter NAT engine conflicts with iproute2 routing cache purge
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=690
 SNAT is failing to maquerade some TCP RST packets
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=693
 Files with the same name in case-insensitive file systems
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=694
 Extra tcp options for REJECT --reject-with tcp-reset-both / tcp-reset-destination
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=696
 please add new options to iptables-restore to continue on error and suppress error output
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=699
 PPPoE masqeuraded connection reset when talking to Amazon S3
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=701
 A way to convert an iptables command to its iptables-save equivalent output
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=705
 Some accepted packets get lost
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=708
 nfq_nfnlh() and  nfq_fd()  should have const arguments
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=715
 double entry of nf_conntrack_max in /proc
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=722
 Errors in compiling nfqnl_test.c
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=743
 Range check for ulog-cprange is wrong
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=748
 IPv6 bridging bug
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=751
 ipq_read() will return an error (rc = -1) and the error message says "Received truncated message"
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=752
 change bugzilla account e-mail
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=755
 iptables: Memory allocation problem.
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=756
 Retry iptables command on transient failure
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=758
 "iptables -m recent" crashes a LXC host on lxc-stop
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=759
 nf_ct_sip dropping SIP messages larger then MTU
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=760
 dnat and snat not changing port numbers on sctp packets
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=763
 Doing -Z twice in parallel breaks counters
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=764
 Segmentation Fault using Hop Limit and ICMPV6-TYPE in same rule
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=766
 Fix a compiler warning [-Wunused-variable]
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=767
 Returns the position the entry was inserted
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=768
 iptables SNAT does not handle argument --persistent
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=769
 ipt_REJECT: multi-directional tcp-reset
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=770
 nf_conntrack_proto_tcp BUG??
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=771
 Rate Limiting
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=772
 -m owner ! --uid-owner False positive logging
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=775
 Suspect bug in __do_replace()
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=777
 NFQUEUE --queue-bypass accepts all packets when no userspace application is available
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=778
 Netfilter on bridge interface containing a defective NIC
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=779
 Memory utilization continuously increasing day by day
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=784
 Normalize iptables rules
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=790
 ulogd -d does not close all fds
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=793
 -f option used with iptables
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=794
 RELATED doesn't accommodate multicast UDP solicitation resulting in unicast reply
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=795
 ip6tables (iptables) "state" test fails to  correctly determine the state of packet streams; will not jump to ACCEPT on  ESTABLISHED,RELATED connections
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=796
 Match Order Matters When Using Hashlimit
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=797
 sk_buff.transport_header set incorrectly for NF_IP_PRE_ROUTING hook
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=800
 Bridge dropping Ipsec fragmented packets
    -> http://bugzilla.netfilter.org/show_bug.cgi?id=801



More information about the netfilter-buglog mailing list