Let me make sure I have this right (fib)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Objective: to implement the send restrictions for BCP-38.

In FILTER/PREROUTING, FILTER/INPUT, and FILTER/FORWARD, the selectors "fib saddr type <x>" and "fib saddr oif <x>" lets me examine the characteristics of the packet's source address, such as BROADCAST, PROHIBITED, &c.

In FILTER/FORWARD, FILTER/OUTPUT, and FILTER/POSTROUTING, the selector "fib daddr type <x>" and "oif <x>" lets me examine the characteristics of the packet's destination address.

Now, for packets generated by a local process, how can I filter packets with spoofed source addresses? This is to block bad stuff if for some reason the firewall box is compromised. Earlier comments indicated that "fib saddr type <x>" and "fib saddr oif <x> are not allowed in the FILTER/OUTPUT and FILTER/POSTROUTING chains.

Help?



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux