Re: Loopback security...

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tuesday 2008-04-22 22:16, Grant Taylor wrote:
>> However, ping 127.0.0.2 will fail of course, yes it is a special handling
>> inside linux (but not really on the topic of "secure"), code-wise it is just
>> like 240.0.0.0/8 which was not routed a few weeks ago until a patch changed
>> it.
>
> I had not considered any thing other than 127.0.0.1 as I don't use the other
> millions of addresses in the loopback network.
>
> Are you saying that what I'm calling a ""security feature is really a
> misconception and a side effect of other parts of the kernel?
>
> Further, can you give some back history on the 240/8 network or point me in a
> direction to do some reading?

Before the patch, trying to ping 240.1.2.3 also resulted in Invalid
argument or Network unreachable. Since there was an IETF draft
draft-fuller-240space-00.txt to enable use of 240... see commit
1e637c74b0f84eaca02b914c0b8c6f67276e9697.

If you look at the diff of 1e637 to its parent (i.e. "the patch" as
one could say :-)  you see ipv4_is_loopback in the context around it;
among it in a few files, this function causes "special handling".
hth.
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux