In article <[EMAIL PROTECTED]>,
Mike Jagdis  <[EMAIL PROTECTED]> wrote:
>In net/ipv4/route.c: ip_route_output_slow() we have the following:
>
>       if (LOOPBACK(key.src) && !(dev_out->flags&IFF_LOOPBACK)) {
>               printk(KERN_DEBUG ... );
>               return -EINVAL;
>       }
>
>i.e. if the source address starts with 127 and the destination
>interface does not have the loopback flag we ignore the route
>that got us here and dump the packet.
>
>  Now I can see why this might have been considered a good idea.
>A remote host would not be able to reply to a 127 sourced address.

Argh, they broke this too?

I used to use 127.0.1.0 as a virtual subnet via IP transparent proxy.
You would connect to 127.0.1.0 and your connection request would be
turned into a transparent proxy request in user space and forwarded
somewhere (in this case over an ssh port forwarding tunnel).

Linux 2.0 had some really cool features in its network stack.  Almost all
of them are gone now.  :-(

-- 
Zygo Blaxell, Linux Engineer, Corel Corporation, [EMAIL PROTECTED] (work),
[EMAIL PROTECTED] (play).  It's my opinion, I tell you! Mine! All MINE!
Size of 'diff -Nurw [...] winehq corel' as of Thu Feb 18 20:14:00 EST 1999
Lines/files:  In 5201 / 28, Out 30657 / 391, Both 35527 / 395
-
To unsubscribe from this list: send the line "unsubscribe linux-net" in
the body of a message to [EMAIL PROTECTED]

Reply via email to