Date: Fri, 09 Aug 2024 22:00:09 +0000 From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 280705] 0.0.0.0/32 is equivalent to 127.0.0.1/32, which may be considered a security flaw Message-ID: <bug-280705-227-FUQ9kwP9De@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-280705-227@https.bugs.freebsd.org/bugzilla/> References: <bug-280705-227@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D280705 --- Comment #2 from Eirik Oeverby <ltning-freebsd@anduin.net> --- Some rudimentary testing - on my own retro hardware and on copy.sh/v86/ - it seems that many OSes with IP stacks of BSD origin share this trait. Notable exceptions are OpenBSD and Windows 2000, but macOS, NetBSD, Haiku and others all do this. Even OS/2, at least versions 2.11 and 3.0 (both 16 and 32-bit TCP/IP stacks). I can't think of a good reason to keep this now, but I'll leave that decisi= on to people with more experience with obscure use cases. Perhaps hide it behi= nd a compile-time option, default off? --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-280705-227-FUQ9kwP9De>