Upon further reflection, I'd have to agree. It seems that the only
firewall rule you'd really need to protect your machine would be to
block packets coming into the Internet-connected(or possibly the LAN-connected interface) claiming to come from the loopback.


RD

Tom Gal wrote:

Nope, it comes from the IP you set. The thing is there's no access
from outside. For some reason it seems maybe that people are making
this more difficult than it needs to be?

T

On 4/22/05, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:


Michael

Is the "trick" that the kernel makes packets destined *for* 127.0.0.0/8
appear to have come *from* 127.0.0.0/8??  I guess you couldn't
have sending and receiving ports be the same then because
then an app would be sending something to *itself* right??  That
wouldn't make sense right?

Chris

On Fri, Apr 22, 2005 at 10:39:49AM -0700, Michael O'Keefe wrote:


[EMAIL PROTECTED] wrote:


I'm trying to understand what loopback interface is used for
and /how/ it is works.

Anyone got any examples of how an app uses loopback interface
effectively??

I vaguely know it acts like a remote node without
actually being one. I'd like the details.


Think of it as a network card, where the TX ethernet pair "loopback" and
connect to the RX ethernet pair. Then you can talk ethernet to yourself
(and if you can talk ethernet, you can talk IP, TCP, UDP and so on and so
forth)

Now instead of actually wasting a PCI slot and plugging in a real NIC and a
little RJ-45 adapter that does this wiring trick (which prolly would work
BTW), you have a fake device that does it all for you.

--
Michael O'Keefe                      |          [EMAIL PROTECTED]
Live on and Ride a 03 BMW F650GSDakar|          [EMAIL PROTECTED]      / |
I like less more or less less than   |Work:+1 858 845 3514        /  |
more. UNIX-live it,love it,fork() it |Fax :+1 858 845 2652       /_p_|
My views are MINE ALONE, blah, blah, |Home:+1 760 788 1296       \`O'|
blah, yackety yack - don't come back |Fax :+1 858                _/_\|_,

--
[email protected]
http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list



--
_______________________________________

Christian Seberino, Ph.D.
SPAWAR Systems Center San Diego
Code 2872
49258 Mills Street, Room 158
San Diego, CA 92152-5385
U.S.A.

Phone: (619) 553-9973
Fax  : (619) 553-6521
Email: [EMAIL PROTECTED]
_______________________________________
--
[email protected]
http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list





--
[email protected]
http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list

Reply via email to