Date: Sun, 14 May 2000 22:52:36 -0400 (EDT) From: "Mark W. Krentel" <krentel@dreamscape.com> To: freebsd-ipfw@freebsd.org Subject: rc.firewall rule 200 Message-ID: <200005150252.WAA07148@dreamscape.com>
next in thread | raw e-mail | index | archive | help
The rc.firewall script adds these rules: ${fwcmd} add 100 pass all from any to any via lo0 ${fwcmd} add 200 deny all from any to 127.0.0.0/8 The second rule blocks packets destined for network 127. But doesn't it make more sense to block packets *from* 127.0.0.0/8, that is, packets trying to spoof localhost? I'm wondering if the rule should actually be: ${fwcmd} add 200 deny all from 127.0.0.0/8 to any Also, how does rule 200 (original version) ever get invoked? The packet is not going over loopback because of rule 100. So, why would a machine forward a packet destined for network 127? --Mark To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ipfw" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200005150252.WAA07148>