On Tue, Aug 29, 2023 at 12:35:47PM +0200, Claudio Jeker wrote:
> On Tue, Aug 29, 2023 at 12:16:23PM +0200, Peter J. Philipp wrote:
> > On Tue, Aug 29, 2023 at 11:11:53AM +0200, Alexandr Nedvedicky wrote:
> > > Hello,
> > > 
> > > On Tue, Aug 29, 2023 at 09:48:21AM +0200, Peter J. Philipp wrote:
> > > > On Tue, Aug 29, 2023 at 09:45:24AM +1000, David Gwynne wrote:
> > > > > How are you injecting the crafted packet into the stack?
> > > > 
> > > > Via BPF.  It is a spoofing program that I made 23 years ago.  While 
> > > > that's
> 
> If you inject packets via BPF they skip the network stack and therfor do
> not pass pf. So pf(4) has no clue about that packet.
> This is why for dhcp no extra rules are required.
> 
> -- 
> :wq Claudio

Hi Claudio,

I know this, but this injection was on a host behind the firewall/gateway 1
hop.  The injection is on another stack.  And I did say this and the ttl's
on the tcpdump do indicated 64 ttl on the host where I'm injecting and 63
on the pppoe0 interface.  Sorry if I didn't communicate it better.

Best Regards,
-peter

-- 
Over thirty years experience on Unix-like Operating Systems starting with QNX.

Reply via email to