Is this a known problem? Does it affect normal operation?
# shorewall check
Checking using Shorewall 5.2.0.5...
Unescaped left brace in regex is deprecated here (and will be fatal in
Perl 5.32), passed through in regex; marked by <-- HERE in m/ ^(.*?)
\$({ <-- HERE )? (\d+|[a-zA-Z_]\w*) (?(2)}) (.
On Wed, Feb 06, 2019 at 11:22:54AM -0500, Alex wrote:
> Is this a known problem? Does it affect normal operation?
>
> # shorewall check
> Checking using Shorewall 5.2.0.5...
> Unescaped left brace in regex is deprecated here (and will be fatal in
> Perl 5.32), passed through in regex; marked by <-
Hi!
I read this article:
http://shorewall.org/Helpers.html
Currently I have some problems with an Asterisk installation and
broken SIP packets (because they are generated by bots).
While I try to debug this, I noticed that the SIP helper is active. As
far as I understand, I don't need it because
hi,
can u send the lsmod ouput?
On Wed, Feb 6, 2019 at 7:52 PM Kevin Olbrich wrote:
> Hi!
>
> I read this article:
> http://shorewall.org/Helpers.html
>
> Currently I have some problems with an Asterisk installation and
> broken SIP packets (because they are generated by bots).
> While I try
On 2/6/19 9:50 AM, Kevin Olbrich wrote:
> Hi!
>
> I read this article:
> http://shorewall.org/Helpers.html
>
> Currently I have some problems with an Asterisk installation and
> broken SIP packets (because they are generated by bots).
> While I try to debug this, I noticed that the SIP helper is
On 2/6/19 10:13 AM, Tom Eastep wrote:
> On 2/6/19 9:50 AM, Kevin Olbrich wrote:
>> Hi!
>>
>> I read this article:
>> http://shorewall.org/Helpers.html
>>
>> Currently I have some problems with an Asterisk installation and
>> broken SIP packets (because they are generated by bots).
>> While I try to
Hi Tom,
this system only hosts asterisk, nothing else.
It seems I don't need any helper, just normal conntrack for outgoing
connections (like HTTP for Debian APT).
Listing all helper in DONT_LOAD would work but I don't think I need any.
Can I just disable all helpers?
Kevin
Am Mi., 6. Feb. 2019
root@croute02:~# lsmod | grep nf_
nf_nat_ipv416384 1 iptable_nat
nf_reject_ipv4 16384 1 ipt_REJECT
nf_conntrack_ipv4 16384 51
nf_defrag_ipv4 16384 1 nf_conntrack_ipv4
nf_log_ipv416384 18
nf_nat_tftp16384 0
nf_nat_snmp_basic 20480
On 2/6/19 11:57 AM, Kevin Olbrich wrote:
> Hi Tom,
>
> this system only hosts asterisk, nothing else.
> It seems I don't need any helper, just normal conntrack for outgoing
> connections (like HTTP for Debian APT).
>
> Listing all helper in DONT_LOAD would work but I don't think I need any.
> Can
Am Mi., 6. Feb. 2019 um 21:06 Uhr schrieb Tom Eastep :
>
> On 2/6/19 11:57 AM, Kevin Olbrich wrote:
> > Hi Tom,
> >
> > this system only hosts asterisk, nothing else.
> > It seems I don't need any helper, just normal conntrack for outgoing
> > connections (like HTTP for Debian APT).
> >
> > Listing
A better way to ask my initial question is:
What is the best way to block all incoming traffic, even to open ports,
while allowing traffic from a limited range of addresses access to a
single port?
For example, say that I have port 22 open for ssh access. With the
default rule, if 92.63.194.
On 2/6/19 12:50 PM, Brent Gordon wrote:
> A better way to ask my initial question is:
> What is the best way to block all incoming traffic, even to open ports,
> while allowing traffic from a limited range of addresses access to a
> single port?
>
> For example, say that I have port 22 open for ss
On 2/6/19 12:20 PM, Kevin Olbrich wrote:
> Am Mi., 6. Feb. 2019 um 21:06 Uhr schrieb Tom Eastep :
>>
>> On 2/6/19 11:57 AM, Kevin Olbrich wrote:
>>> Hi Tom,
>>>
>>> this system only hosts asterisk, nothing else.
>>> It seems I don't need any helper, just normal conntrack for outgoing
>>> connection
13 matches
Mail list logo