Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 13 Feb 2002 17:58:51 +0200
From:      Ruslan Ermilov <ru@FreeBSD.ORG>
To:        Garrett Wollman <wollman@khavrinen.lcs.mit.edu>
Cc:        current@FreeBSD.ORG
Subject:   Re: rdr 127.0.0.1 and blocking 127/8 in ip_output()
Message-ID:  <20020213175851.A22977@sunbay.com>
In-Reply-To: <200202131550.g1DFoDh41696@khavrinen.lcs.mit.edu>
References:  <20020213110347.C46245@sunbay.com> <200202131550.g1DFoDh41696@khavrinen.lcs.mit.edu>

next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, Feb 13, 2002 at 10:50:13AM -0500, Garrett Wollman wrote:
> <<On Wed, 13 Feb 2002 11:03:47 +0200, Ruslan Ermilov <ru@FreeBSD.ORG> said:
> 
> > Please test with and without this patch.
> 
> I continue to believe that this should be done by fixing the routing,
> not by adding additional hacks to the already-bloated ip_output()
> path.
> 
BSD always had these "hacks" (rfc1122 requirements) in in_canforward().
RFC1122 requires the host to not send 127/8 addresses out of loopback,
whether or not its routes are set up correctly.


Cheers,
-- 
Ruslan Ermilov		Sysadmin and DBA,
ru@sunbay.com		Sunbay Software AG,
ru@FreeBSD.org		FreeBSD committer,
+380.652.512.251	Simferopol, Ukraine

http://www.FreeBSD.org	The Power To Serve
http://www.oracle.com	Enabling The Information Age

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-current" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020213175851.A22977>