Date: Wed, 25 Feb 2004 13:51:52 EST From: Andrea Venturoli <ml.ventu@flashnet.it> To: freebsd-net@freebsd.org Subject: Re: Bad loopback traffic not stopped by ipfw. Message-ID: <200402251251.i1PCppmZ031547@soth.ventu>
next in thread | raw e-mail | index | archive | help
** Reply to note from Iasen Kostov <tbyte@OTEL.net> Wed, 25 Feb 2004 14:37:25 +0200 >netstat -s -p ip >.. >.. >.. > 3575124 datagrams with bad address in header > > Could it be this that drops "bad" packets before they enter the IPFW ? Nice, it could be, but I'm not so expert as to tell for sure. Can someone with more insight confirm? And possibly provide a pointer on why it is so, who blocks them, which are the criteria, ...? In fact I think they ARE blocked, because otherwise I would see "Connection attempt ..." log entries. Here it shows: 72641 datagrams with bad address in header bye & Thanks av.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200402251251.i1PCppmZ031547>