Date: Fri, 26 Jun 1998 14:02:44 -0700 (PDT) From: Archie Cobbs <archie@whistle.com> To: andrewr@slack.net (andrewr) Cc: fenner@parc.xerox.com, nate@almond.elite.net, nate@elite.net, julian@whistle.com, freebsd-bugs@FreeBSD.ORG, freebsd-net@FreeBSD.ORG, freebsd-hackers@FreeBSD.ORG Subject: Re: Apparent bug in sendto() with raw sockets Message-ID: <199806262102.OAA01182@bubba.whistle.com> In-Reply-To: <Pine.NEB.3.96.980626092922.1974A-100000@brooklyn.slack.net> from andrewr at "Jun 26, 98 09:38:33 am"
next in thread | previous in thread | raw e-mail | index | archive | help
andrewr writes: > Speaking of IP_HDRINCL, after reading raw_ip.c and noticing the protection > against spoofing (can't use IP_HDRINCL in certain situations), I started > thinking about actually comparing the user dsupplied ip->ip_src with the > actual IP address defined for the outgoing interface. While looking for a What's wrong with being able to spoof an IP address? If I have root access (required to open a raw socket), and I want to do so, the kernel shouldn't prevent me. There are legitimate reasons for wanting to send spoofed source IP addresses (eg, testing situations). -Archie ___________________________________________________________________________ Archie Cobbs * Whistle Communications, Inc. * http://www.whistle.com To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-net" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199806262102.OAA01182>