Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 09 Aug 2024 22:00:09 +0000
From:      bugzilla-noreply@freebsd.org
To:        bugs@FreeBSD.org
Subject:   [Bug 280705] 0.0.0.0/32 is equivalent to 127.0.0.1/32, which may be considered a security flaw
Message-ID:  <bug-280705-227-FUQ9kwP9De@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-280705-227@https.bugs.freebsd.org/bugzilla/>
References:  <bug-280705-227@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D280705

--- Comment #2 from Eirik Oeverby <ltning-freebsd@anduin.net> ---
Some rudimentary testing - on my own retro hardware and on copy.sh/v86/ - it
seems that many OSes with IP stacks of BSD origin share this trait. Notable
exceptions are OpenBSD and Windows 2000, but macOS, NetBSD, Haiku and others
all do this. Even OS/2, at least versions 2.11 and 3.0 (both 16 and 32-bit
TCP/IP stacks).

I can't think of a good reason to keep this now, but I'll leave that decisi=
on
to people with more experience with obscure use cases. Perhaps hide it behi=
nd a
compile-time option, default off?

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-280705-227-FUQ9kwP9De>