krb5 address checks and loopback connections Nicolas.Williams at
Tue Jul 9 12:03:01 EDT 2002

IMO, hosts should never accept incoming packets with source or
destination loopback addresses. If a host does accept such
packets then I would consider that a bug in the OS.

And, IMO, the Linux behaviour of using loopback IPv6 addresses
when connecting to non-loopback-but-local addresses is not too

So go ahead, put this feature in and put in a note about the
OS being held responsible for loopback spoof avoidance - make
the feature a compile time option conditional on the host
being a Linux host, say, or write a configure test for the
behaviour in question :) if you find the possibility of an
OS lacking loopback spoof avoindace to be too scary.



Visit our website at

This message contains confidential information and is intended only 
for the individual named.  If you are not the named addressee you 
should not disseminate, distribute or copy this e-mail.  Please 
notify the sender immediately by e-mail if you have received this 
e-mail by mistake and delete this e-mail from your system.

E-mail transmission cannot be guaranteed to be secure or error-free 
as information could be intercepted, corrupted, lost, destroyed, 
arrive late or incomplete, or contain viruses.  The sender therefore 
does not accept liability for any errors or omissions in the contents 
of this message which arise as a result of e-mail transmission.  If 
verification is required please request a hard-copy version.  This 
message is provided for informational purposes and should not be 
construed as a solicitation or offer to buy or sell any securities or 
related financial instruments.

More information about the krbdev mailing list