Anyone could spoof the loopback address, but the reply to that request would
go directly to the machine receiving the SYN packet..
The most the spoofer can do is get your machine to reply to a whole lot of
loopback address, and possibly cause some sort of DOS.

The most sensible thing to do, to prevent that is stick the server on a DMZ
behind a firewall that's clever enough to drop packets to that server that
have the reply or source address as 127.1....


Thanks

Jude


----- Original Message ----- 
From: "Craig Minton" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Friday, July 25, 2003 3:44 PM
Subject: Trusting localhost?


> If you are creating an application that communicates using TCP, but only
>  want to take requests from the localhost, are there reasons why you
> would not want to check that the incoming request is from localhost and
> then trust it?  This is in a Windows environment.  Would IP spoofing
> work if the application was checking for the IP address 127.0.0.1?  If
> so, how likely is it that IP spoofing would work today, in a corporate
> environment?
>
> Thank you for any direction you can provide.
>
>
>
> _____________________________________________________________
> Fight the power!  BlazeMail.com
>
> --------------------------------------------------------------------------
-
> --------------------------------------------------------------------------
--
>
>
>



---------------------------------------------------------------------------
----------------------------------------------------------------------------

Reply via email to