[9656] in bugtraq
Re: traceroute as a flooder
daemon@ATHENA.MIT.EDU (Curt Sampson)
Fri Feb 19 13:01:28 1999
Date: Thu, 18 Feb 1999 15:09:15 -0800
Reply-To: Curt Sampson <cjs@CYNIC.NET>
From: Curt Sampson <cjs@CYNIC.NET>
X-To: "Stefan `Sec` Zehl" <sec@42.org>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To: <19990218231801.B24492@matrix.42.org>
On Thu, 18 Feb 1999, Stefan `Sec` Zehl wrote:
> While I agree with most other changes, I do not see why zou should
> forbid loopback if's for the source address.
Right. Another fellow mentioned this to me, too. It appears that
it would be better to allow addresses on the loopback interface,
but forbid 127.0.0.1. This is a bunch more code to add, though,
and I've not really thought out the implications of it. (For example,
could you use this to send stuff out to a network from an address
that's invalid for that particular network, such as 10.0.0.1 out
to an Internet link?)
I'd welcome a full analysis of this and further patches. I haven't
time to do this work myself, however.
cjs
--
Curt Sampson <cjs@cynic.net> 604 801 5335 De gustibus, aut bene aut nihil.
The most widely ported operating system in the world: http://www.netbsd.org