Mailinglist Archive: opensuse-security (685 mails)

< Previous Next >
Re: [suse-security] host.deny and spoofing
  • From: John Andersen <jsa@xxxxxxxxxxxxxx>
  • Date: Mon, 4 Feb 2002 22:13:28 -0900
  • Message-id: <200202050713.g157DTr09836@xxxxxxxxxxxxxx>
On Monday 04 February 2002 05:37 am, Robert Davies wrote:
> > If some big german ISP route a spoofed packed from a webserver to
> > my home firewall, i REALLY think that they forwards ips like 127.x.x.x...
> > if you don't belive, i can give you rejects for 192.168.x.x, 10.x.x.x,
> > 127.x.x.x and so one ;-)
> >
> > so, DON'T belive that others will do things for you..
>
> I agree, so many ISPs use default routes, and I've seen routing loops
> caused by this in quite well known ones, after networks have been returned
> to them. There is also the nasty business of source routes in packets.

I'm counfused. How would one go about routing a packet to 127.0.0.1?
Would the router not get its own packet?

--
_________________________________
John Andersen / Juneau Alaska

< Previous Next >
Follow Ups