Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 30 Jun 2000 10:39:32 +0100 (BST)
From:      Jan Grant <Jan.Grant@bristol.ac.uk>
To:        questions@freebsd.org
Subject:   Ingress filtering to loopback address: is there any way to do this  without a full firewall install?
Message-ID:  <Pine.GHP.4.21.0006301000430.12683-100000@mail.ilrt.bris.ac.uk>

next in thread | raw e-mail | index | archive | help
For a random service running on a random machine:

On machine A (192.168.0.1):
hostA:/> netstat -an | grep 5998
tcp4       0      0  127.0.0.1.5998         *.*          LISTEN

On machine B: (192.168.0.2):*
hostB:/> ifconfig lo down
hostB:/> route add -host 127.0.0.1 gw 192.168.0.1
hostB:/> telnet 127.0.0.1 5998
Trying 127.0.0.1...
Connected to localhost.
Escape character is '^]'.
RANDOMSERVICE welcomes you...

Is there a way to stop the delivery of non-localhost-originated packets
to services listening on a loopback address without building a firewall
into the kernel?

Cheers in advance,
jan 

* This machine was "another free unix-a-like" hence the interface name,
etc.

-- 
jan grant, ILRT, University of Bristol. http://www.ilrt.bris.ac.uk/
Tel +44(0)117 9287163 Fax +44 (0)117 9287112 RFC822 jan.grant@bris.ac.uk
If it's broken really badly - don't fix it either.



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.GHP.4.21.0006301000430.12683-100000>