Bad loopback traffic not stopped by ipfw.
Andrea Venturoli
ml.ventu at flashnet.it
Tue Feb 24 09:44:50 PST 2004
** Reply to note from Barney Wolff <barney at databus.com> Tue, 24 Feb 2004 12:30:23 -0500
>> IMHO opinion wrong packets are arriving
>> from the upstream router (for which it
>> would be useless to ask for a fix),
> Your first three rules, before anything else, should be:
> allow ip from any to any via lo0
> deny log logamount 1000 ip from any to 127.0.0.0/8
> deny log logamount 1000 ip from 127.0.0.0/8 to any
> then see what ipfw says.
> Your ruleset does not block packets from 127
> outbound.
I though it did! These are just not the first rules, but they should anyway.
In any case, I tried your suggestion: now ipfw -a l gives:
00030 2 416 allow ip from any to any via lo0
00031 0 0 deny log ip from any to 127.0.0.0/8
00032 0 0 deny log ip from 127.0.0.0/8 to any
And I've had snort reporting bas loopback traffic in the meanwhile.
So this is not a problem with my rules.
bye & Thanks
av.
More information about the freebsd-net
mailing list