Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 12 Nov 2003 22:30:12 -0500
From:      Damian Gerow <dgerow@afflictions.org>
To:        current@freebsd.org
Subject:   Re: tcp hostcache and ip fastforward for review
Message-ID:  <20031112223012.2aec54be.dgerow@afflictions.org>
In-Reply-To: <mailman.1068677700.28876.fcurrent-l@lists.sentex.ca>
References:  <3FAE68FB.64D262FF@pipeline.ch> <mailman.1068677700.28876.fcurrent-l@lists.sentex.ca>

next in thread | previous in thread | raw e-mail | index | archive | help

I've been thinking about this all day...

Thus spake Jesper Skriver <jesper@freebsd.org> [23:53:26 11/12/03:
: > +	/*
: > +	 * Only unicast IP, not from loopback, no L2 or IP broadcast,
: > +	 * no multicast, no INADDR_ANY
: > +	 */
: > +	if ((m->m_pkthdr.rcvif->if_flags & IFF_LOOPBACK) ||
: > +	    (ntohl(ip->ip_src.s_addr) == (u_long)INADDR_BROADCAST) ||
: 
: #jesper
: You will never see packets with a multicast source address.

Do you mean:

Any packets with a multicast source address will be dropped by the kernel
before this point, or that no host will ever send a packet with a
multicast source address?

In the former, that's fine.  In the latter, how does one guarantee that
there isn't a malicious host out there sending spoofed multicast-source
packets?

  - Damian



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20031112223012.2aec54be.dgerow>