<feed xmlns='http://www.w3.org/2005/Atom'>
<title>conntrack-tools.git/src, branch conntrack-tools-1.0.0</title>
<subtitle>conntrack-tools i.e. conntrack and conntrackd (mirror of https://github.com/vyos/conntrack-tools.git)
</subtitle>
<id>https://git.amelek.net/vyos/conntrack-tools.git/atom?h=conntrack-tools-1.0.0</id>
<link rel='self' href='https://git.amelek.net/vyos/conntrack-tools.git/atom?h=conntrack-tools-1.0.0'/>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/conntrack-tools.git/'/>
<updated>2011-02-22T14:34:59+00:00</updated>
<entry>
<title>conntrack: display informative message if expectation table is flushed</title>
<updated>2011-02-22T14:34:59+00:00</updated>
<author>
<name>Pablo Neira Ayuso</name>
<email>pablo@netfilter.org</email>
</author>
<published>2011-02-22T14:34:59+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/conntrack-tools.git/commit/?id=88fd3dc90716e9d252cedcd668371743730acdcb'/>
<id>urn:sha1:88fd3dc90716e9d252cedcd668371743730acdcb</id>
<content type='text'>
With this patch, we display the following message after:

# conntrack -F expect
conntrack v0.9.15 (conntrack-tools): expectation table has been emptied.

To make it consistent with the message displayed with conntrack -F.

Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>conntrackd: remove use of deprecated nfct_maxsize()</title>
<updated>2011-02-18T11:15:52+00:00</updated>
<author>
<name>Pablo Neira Ayuso</name>
<email>pablo@netfilter.org</email>
</author>
<published>2011-02-18T11:15:52+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/conntrack-tools.git/commit/?id=4dd7a3c15830aa21548716798171e67cb14bca49'/>
<id>urn:sha1:4dd7a3c15830aa21548716798171e67cb14bca49</id>
<content type='text'>
This patch removes the use of nfct_maxsize() and several abusive
stack-based allocations.

Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>conntrack: allocate template objects in the heap</title>
<updated>2011-02-17T18:05:32+00:00</updated>
<author>
<name>Pablo Neira Ayuso</name>
<email>pablo@netfilter.org</email>
</author>
<published>2011-02-17T18:05:32+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/conntrack-tools.git/commit/?id=3bb13acbff0983960e06eb33e0daa98c3dab472c'/>
<id>urn:sha1:3bb13acbff0983960e06eb33e0daa98c3dab472c</id>
<content type='text'>
With this patch, we don't abuse the stack anymore, instead we allocate
the template objects that are used in the heap.

We stop using nfct_maxsize() which is now deprecated in
libnetfilter_conntrack.

Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>conntrackd: use nfct_copy() with override flag in cache_object_new()</title>
<updated>2011-02-17T17:29:26+00:00</updated>
<author>
<name>Pablo Neira Ayuso</name>
<email>pablo@netfilter.org</email>
</author>
<published>2011-02-17T17:29:26+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/conntrack-tools.git/commit/?id=6c4ec15505b9fe878ade0b3e7cdbc8f0a26861cd'/>
<id>urn:sha1:6c4ec15505b9fe878ade0b3e7cdbc8f0a26861cd</id>
<content type='text'>
Using memcpy() is not safe, it breaks secctx and it may break
more things in the future. Moreover, nfct_size*() functions will
be deprecated soon, they are evil since they open the window
to memcpy().

Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>conntrack: add -o ktimestamp option (it requires linux &gt;= 2.6.38)</title>
<updated>2011-02-17T15:46:05+00:00</updated>
<author>
<name>Pablo Neira Ayuso</name>
<email>pablo@netfilter.org</email>
</author>
<published>2011-02-17T15:46:05+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/conntrack-tools.git/commit/?id=2bbb1655e38646d9a9a6f839d6ca22e4e554d2f2'/>
<id>urn:sha1:2bbb1655e38646d9a9a6f839d6ca22e4e554d2f2</id>
<content type='text'>
This option requires Linux kernel &gt;= 2.6.38, you have to enable conntrack
timestamping with:

echo 1 &gt; /proc/sys/net/netfilter/nf_conntrack_timestamp

# conntrack -L -o ktimestamp
udp      17 59 src=192.168.1.128 dst=192.168.1.1 sport=52050 dport=53 src=192.168.1.1 dst=192.168.1.128 sport=53 dport=52050 [ASSURED] mark=0 delta-time=121 [start=Thu Feb 17 17:41:18 2011] use=1

# conntrack -L
conntrack v0.9.15 (conntrack-tools): 20 flow entries have been shown.
udp      17 31 src=192.168.1.128 dst=192.168.1.1 sport=52050 dport=53 src=192.168.1.1 dst=192.168.1.128 sport=53 dport=52050 [ASSURED] mark=0 delta-time=149 use=1

# conntrack -E -o ktimestamp
...
[DESTROY] udp      17 src=192.168.1.128 dst=192.168.1.1 sport=40162 dport=53 src=192.168.1.1 dst=192.168.1.128 sport=53 dport=40162 [ASSURED] delta-time=3 [start=Thu Feb 17 17:44:57 2011] [stop=Thu Feb 17 17:45:00 2011]

# conntrack -E
[DESTROY] udp      17 src=192.168.1.128 dst=77.226.252.14 sport=123 dport=123 src=77.226.252.14 dst=192.168.1.128 sport=123 dport=123 delta-time=8

Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>conntrackd: rise number of committed entries per step</title>
<updated>2011-02-16T16:33:54+00:00</updated>
<author>
<name>Pablo Neira Ayuso</name>
<email>pablo@netfilter.org</email>
</author>
<published>2011-02-16T16:28:41+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/conntrack-tools.git/commit/?id=016bfd317d0984331e53fa71d042af39d3049162'/>
<id>urn:sha1:016bfd317d0984331e53fa71d042af39d3049162</id>
<content type='text'>
This patch rises the number of committed entries per step from
64 to 8192. Experimental results in active-active setups here
show that we reduce the commit time with this value significantly.

This deserves some more study, it can be a good idea to remove
this commit per step completely. I leave this for the future.

Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>conntrackd: event iteration limiter is already reset in main select loop</title>
<updated>2011-02-16T13:25:18+00:00</updated>
<author>
<name>Pablo Neira Ayuso</name>
<email>pablo@netfilter.org</email>
</author>
<published>2011-02-16T13:25:18+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/conntrack-tools.git/commit/?id=dd24e2da2feaacc63e10a375e1909f035ea02543'/>
<id>urn:sha1:dd24e2da2feaacc63e10a375e1909f035ea02543</id>
<content type='text'>
This patch removes an unnecessary reset of the event iteration limiter
that is already done in the main select loop.

Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>cache: log if we received a commit request while already one in progress</title>
<updated>2011-02-15T00:51:11+00:00</updated>
<author>
<name>Pablo Neira Ayuso</name>
<email>pablo@netfilter.org</email>
</author>
<published>2011-02-15T00:51:11+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/conntrack-tools.git/commit/?id=c2acb11453fc75519862240298e106ac79274780'/>
<id>urn:sha1:c2acb11453fc75519862240298e106ac79274780</id>
<content type='text'>
This patch improves the case in which we receive a commit request
but we are already performing one. This behaviour is suspicious
since the HA manager should not trigger a double master transition.
Otherwise, something probably is not configured appropriately.

This improves 98756c2608f0879a2322919c7441973216565272
"cache: close commit request if we already have one in progress".

Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>cache: close commit request if we already have one in progress</title>
<updated>2011-02-13T21:38:01+00:00</updated>
<author>
<name>Pablo Neira Ayuso</name>
<email>pablo@netfilter.org</email>
</author>
<published>2011-02-13T21:38:01+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/conntrack-tools.git/commit/?id=98756c2608f0879a2322919c7441973216565272'/>
<id>urn:sha1:98756c2608f0879a2322919c7441973216565272</id>
<content type='text'>
We close a commit request if there's already one in progress. This
patch fixes a problem that may be triggered if two consecutive commit
requests are received.

Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>sync: don't override initial return value of local handler</title>
<updated>2011-02-13T20:52:56+00:00</updated>
<author>
<name>Pablo Neira Ayuso</name>
<email>pablo@netfilter.org</email>
</author>
<published>2011-02-13T20:40:20+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/conntrack-tools.git/commit/?id=9173be30c4716ce6c1a4c9b73a3657bb8fc3327a'/>
<id>urn:sha1:9173be30c4716ce6c1a4c9b73a3657bb8fc3327a</id>
<content type='text'>
Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
</feed>
