In <[EMAIL PROTECTED]> Russell King <[EMAIL PROTECTED]>
writes:
>NAT: 3 dropping untracked packet c065d3a0 1 192.168.0.1 -> 192.168.0.9
I see loads of these, in a firewall (state matching) and SNAT setup.
When I send mail, I see them quite regularly. It is quite annoying,
since they get dumped to the active text-mode console, in addition to
being logged.
Looking at the code a while back, quite a few of the netfilter
printk()'s did not have a log-level setting. Was this omitted
intentionally ? (Just checked 2.4.0-test9-pre4, it hasn't changed).
--
Henrik Storner | "Crackers thrive on code secrecy. Cockcroaches breed
<[EMAIL PROTECTED]> | in the dark. It's time to let the sunlight in."
|
| Eric S. Raymond, re. the Frontpage backdoor
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/