Date: Thu, 04 Nov 2021 19:10:37 +0000 From: Jamie Landeg-Jones <jamie@catflap.org> To: jamie@catflap.org, freebsd-rwg@gndrsh.dnsmgr.net Cc: shuriku@shurik.kiev.ua, freebsd-net@FreeBSD.org Subject: Re: netmask for loopback interfaces Message-ID: <202111041910.1A4JAbY2016855@donotpassgo.dyslexicfish.net> In-Reply-To: <202111041430.1A4EUPOe029661@gndrsh.dnsmgr.net> References: <202111041430.1A4EUPOe029661@gndrsh.dnsmgr.net>
next in thread | previous in thread | raw e-mail | index | archive | help
"Rodney W. Grimes" <freebsd-rwg@gndrsh.dnsmgr.net> wrote:
> > Note, the default FreeBSD firewall rules already have:
> >
> > ${fwcmd} add 100 pass all from any to any via lo0
> > ${fwcmd} add 200 deny all from any to 127.0.0.0/8
> > ${fwcmd} add 300 deny ip from 127.0.0.0/8 to any
>
> Which no longer work correctly since the "to 127.0.0.0/8"
> packets SHALL go out what ever interface the route table
> tells them to (often the default route), AND NOT lo0.
>
> oot {1003}# route -n get 127.1.1.1
> route to: 127.1.1.1
> destination: 0.0.0.0
> mask: 0.0.0.0
> gateway: 192.168.32.8
> fib: 0
> interface: em0
Hi!
I'm not sure what you mean. The current default rules will stop
anything to 127.0.0.0/8 going anywhere other than via lo0 -
which preserves "current expected behaviour" - I was pointing
out that in reply to Oleksandr's comment:
| /8 mask on loopback prevetnts using of 127.x.x.x network anywhere
| outside of the localhost. This described in RFC 5735 [1] and 1122 [2]
His argument was that putting an /8 on the localhost address would
neatly stop 127/8 traffic going to the LAN - I was pointing out there
are other ways to do this, i.e. routing, and the firewall.
Of course, if FreeBSD relaxes to allow the use of 128/8 outside 128/16,
then these rules will need to be changed..
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202111041910.1A4JAbY2016855>
