Date: Wed, 13 Feb 2002 17:58:51 +0200 From: Ruslan Ermilov <ru@FreeBSD.ORG> To: Garrett Wollman <wollman@khavrinen.lcs.mit.edu> Cc: current@FreeBSD.ORG Subject: Re: rdr 127.0.0.1 and blocking 127/8 in ip_output() Message-ID: <20020213175851.A22977@sunbay.com> In-Reply-To: <200202131550.g1DFoDh41696@khavrinen.lcs.mit.edu> References: <20020213110347.C46245@sunbay.com> <200202131550.g1DFoDh41696@khavrinen.lcs.mit.edu>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, Feb 13, 2002 at 10:50:13AM -0500, Garrett Wollman wrote: > <<On Wed, 13 Feb 2002 11:03:47 +0200, Ruslan Ermilov <ru@FreeBSD.ORG> said: > > > Please test with and without this patch. > > I continue to believe that this should be done by fixing the routing, > not by adding additional hacks to the already-bloated ip_output() > path. > BSD always had these "hacks" (rfc1122 requirements) in in_canforward(). RFC1122 requires the host to not send 127/8 addresses out of loopback, whether or not its routes are set up correctly. Cheers, -- Ruslan Ermilov Sysadmin and DBA, ru@sunbay.com Sunbay Software AG, ru@FreeBSD.org FreeBSD committer, +380.652.512.251 Simferopol, Ukraine http://www.FreeBSD.org The Power To Serve http://www.oracle.com Enabling The Information Age To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020213175851.A22977>