Date: Wed, 25 Feb 2004 13:51:52 EST From: Andrea Venturoli <ml.ventu@flashnet.it> To: freebsd-net@freebsd.org Subject: Re: Bad loopback traffic not stopped by ipfw. Message-ID: <200402251251.i1PCppmZ031547@soth.ventu>
next in thread | raw e-mail | index | archive | help
** Reply to note from Iasen Kostov <tbyte@OTEL.net> Wed, 25 Feb 2004 14:37:25 +0200
>netstat -s -p ip
>..
>..
>..
> 3575124 datagrams with bad address in header
>
> Could it be this that drops "bad" packets before they enter the IPFW ?
Nice, it could be, but I'm not so expert as to tell for sure. Can someone with more insight confirm? And possibly
provide a pointer on why it is so, who blocks them, which are the criteria, ...?
In fact I think they ARE blocked, because otherwise I would see "Connection attempt ..." log entries.
Here it shows: 72641 datagrams with bad address in header
bye & Thanks
av.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200402251251.i1PCppmZ031547>
