On Sun, 7 Apr 2002, Crist J. Clark wrote:

> On Sun, Apr 07, 2002 at 08:25:33PM -0500, Nick Rogness wrote:
> > 

[SNIP]
> > 
> > AFAIK, the route to get from 1 interface to the other is not
> > through the lo0.  I'm not sure if the kernel sends these packets
> > across lo0 (internally) or not.  But the routing table would
> > suggest not.
> 
> It sure looks like they do. I checked before suggesting this.
> 
>   $ ifconfig dc0
>   dc0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500
>           inet 192.168.64.60 netmask 0xffffff00 broadcast 192.168.64.255
>           inet6 fe80::2c0:f0ff:fe5a:6c0a%dc0 prefixlen 64 scopeid 0x1 
>           inet 192.168.64.61 netmask 0xffffffff broadcast 192.168.64.61
>           ether 00:c0:f0:5a:6c:0a 
>           media: Ethernet autoselect (10baseT/UTP)
>           status: active
>    $telnet -s 192.168.64.60 192.168.64.61
>    Trying 192.168.64.61...
>    telnet: connect to address 192.168.64.61: Connection refused
>    telnet: Unable to connect to remote host
> 
> And I was sniffing the loopback when I did this,
> 
>   # tcpdump -n -ilo0
>   tcpdump: listening on lo0

>   20:02:34.300094 192.168.64.60.1979 > 192.168.64.61.23: S
> 2453490862:2453490862(0) win 65535 <mss 16344,nop,wscale
> 1,nop,nop,timestamp 11409532 0> (DF) [tos 0x10]
>   20:02:34.300138 192.168.64.61.23 > 192.168.64.60.1979: R 0:0(0) ack
> 2453490863 win 0

> 
> I also put in some ipfw(8) 'count' rules like, 
> 
>   # ipfw add count ip from 192.168.64.60 to 192.168.64.61 out via lo0
> 
> And they were hit by these packets.


        WOW, that's interesting.  Thanks for the heads up.

Nick Rogness <[EMAIL PROTECTED]>
 - Don't mind me...I'm just sniffing your packets


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-net" in the body of the message

Reply via email to