[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Protecting against spoofing with IPTABLES



On 6/30/05, Simon <dev@networker.co.nz> wrote:

> iptables -F
> iptables -A INPUT -i lo -j ACCEPT
> iptables -N SPOOF
> iptables -A SPOOF -i eth1 -j SPOOF

I think that's wrong. You're appending a rule to the SPOOF table which
specifies that all packets from eth1 are to be jumped to the SPOOF
chain.. that's an infinite loop.

However in that fragment you don't specify any way of getting into the
SPOOF table so nothing will happen.

Default policy for INPUT,FORWARD and OUTPUT are ACCEPT, so the four
rules above result in nothing.

-- 
Jon Dowland
http://jon.dowland.name/



Reply to: