SEARCH
NEW RPMS
DIRECTORIES
ABOUT
FAQ
VARIOUS
BLOG

 
 
Changelog for conntrack-tools-1.4.8-lp154.3.2.x86_64.rpm :

* Tue Jun 18 2024 Jan Engelhardt - Remove rc
* symlinks
* Fri Sep 29 2023 Jan Engelhardt - Update to release 1.4.8
* Fix spurious EOPNOSUPP and ENOBUFS errors with -U/--update command.
* Fix spurious ENOENT -D/--delete.
* Thu Oct 06 2022 Jan Engelhardt - Update to release 1.4.7
* Changes to the \"conntrack\" program:
* \"clash_resolve\" and \"chaintoolong\" stats counters
* Defaults to the `unspec` family if the `-f` flag is absent, so as to improve support for dual-stack setups.
* Support filtering events by IP address family.
* Support flushing per IP address family.
* Added the `save` output format representing data in conntrack parameters, and support for loading such files back.
* Remove the `-o userspace` flag and always tag user space triggered events.
* Introduce the `-A` flags, a variant of `-I` which does not fail if the entry exists already.
* Mon Aug 30 2021 Johannes Segitz - Added hardening to systemd service(s). Modified:
* conntrackd.service
* Wed Apr 01 2020 Jan Engelhardt - Update to release 1.4.6
* conntrackd: fix UDP IPv6 destination address not being usable
* conntrack: Allow protocol number zero
* conntrackd: cthelper: Add new SLP helper- Drop conntrackd-Use-strdup-in-lexer.patch, conntrackd-use-strncpy-to-unix-path.patch, conntrackd-cthelper-Add-new-SLP-helper.patch, conntrackd-use-correct-max-unix-path-length.patch (merged)- Drop require on systemd, since it can run in a namespace without.
* Tue Jul 23 2019 Michal Kubeček - conntrackd-cthelper-Add-new-SLP-helper.patch: userspace conntrack helper for SLP (Service Location Protocol) to replace SUSE specific kernel helper (rejected by upstream) from openSUSE / SLE kernel packages (FATE#324143 bsc#1127886)- run autoreconf before build (patch above touches Makefile.am)- add commented out conntrack helper config example to default conntrackd.conf- drop deprecated (and ignored) options Nice and UNIX/Backlog from default conntrackd.conf
* Mon Jul 15 2019 Michal Kubeček - Fix 1.4.5 parser issues (bsc#1141480): conntrackd-use-strncpy-to-unix-path.patch conntrackd-Use-strdup-in-lexer.patch conntrackd-use-correct-max-unix-path-length.patch
* Tue May 01 2018 jengelhAATTinai.de- Update to new upstream release 1.4.5
* new synproxy support
* improved logging support (both stdout/stderr and log files)
* new mDNS ct helper
* deprecate unix backlog configuration
* drop old/obsolete/deprecated conntrackd.conf config options
* improved support for UPnP in the SSDP ct helper
* add stronger TCP flags support
* conntrack CLI tool: new support for IPv6 NAT
* nfct CLI tool: some improvements to the build (-z lazy)
* Fri Mar 16 2018 jengelhAATTinai.de- Add tirpc for openSUSE 15 and onwards.
* Tue Jan 16 2018 jengelhAATTinai.de- submission from larsAATTlinux-schulserver.de, partially applied- split out new subpackage \"conntrackd\" for the eponymous daemon (has systemd dependencies)- add systemd service, logrotate config, sample sysconfig, and sample config file.
* Mon Aug 22 2016 jengelhAATTinai.de- Update to new upstream release 1.4.4
* conntrackd: add systemd support
* conntrack: support delete by label
* conntrack: add support for netmask filtering
* conntrack: add support for CIDR notation
* conntrack: Add missing tables \"dying\" and \"unconfirmed\" to usage output.
* Wed Sep 09 2015 jengelhAATTinai.de- Update to new upstream release 1.4.3
* conntrack: fix expectation entry creation
* expect: Fix wrong memset usage
* cthelper: don\'t pass up a 0 length queue
* conntrackd: allow strings with underscore from flex scanner
* conntrack: fix setting labels in updates
* Thu Jan 08 2015 jengelhAATTinai.de- Update to new git snapshot 1.4.2.g26
* Chromecast/SSDP support, SSDP userspace helper
* TFTP userspace helper support
* Support for attaching expectations via nfqueue
* Fix directory lookup for helper plugins
* Fixes a possible crash if conntrackd sees DCCP, SCTP and ICMPv6 traffic and the corresponding kernel modules that track this traffic are not available. [bnc#942419, CVE-2015-6496]
 
ICM