-1

I think IPv6 even has a short-hand for localhost as ::1. Are the security implications of using a different loopback address, or someone finding out your loopback address? I guess people are upset about the New York Times snooping their loopback address and I don't understand why NYT would do that, or why anyone would care.

GlenPeterson
  • 4,866
  • 5
  • 41
  • 49
  • This site is for programming questions, not pie-in-the-sky "why" questions. – Marc B Jul 16 '15 at 14:38
  • @MarcB Thank you - I appreciate it when someone explains their vote. Can you suggest a StackExchange site where this question would fit? Or a way to ask a similar, but appropriate question? – GlenPeterson Jul 16 '15 at 14:40
  • It might fit on the security site: http://security.stackexchange.com/ – Matthew Bakaitis Jul 16 '15 at 15:01
  • 3
    I'm voting to close this question as off-topic because it would be a better fit on the security site: http://security.stackexchange.com/ – Matthew Bakaitis Jul 16 '15 at 15:01

1 Answers1

0

I don't believe there is any security implications in changing the loopback address. As long as you stay in the standard reserved subnet (127.0.0.0/8). Any IP datagram with a source or destination address set to a loopback address must not appear outside of a computing system, or be routed by any routing device. Packets received on an interface with a loopback destination address must be dropped. Such packets are sometimes referred to as Martian packets. As far as security, the loopback has almost no effect on security unless routing tables/loopback interfaces are changed to a different ip address. Take a look at these two articles. https://security.stackexchange.com/questions/6395/can-the-loopback-interface-be-hijacked

https://serverfault.com/questions/300776/if-i-send-data-to-my-computer-using-its-public-hostname-does-it-actually-go-ove?newsletter=1&nlcode=9544%7Cbded

As far as the NY Times article, I read that the security engineer responsible for that code found that a massive number of machines were getting broken into to commit ad fraud. White Ops ran a study last year (http://whiteops.com/botfraud) and found 2/3 of fraud was coming from home users. The code is looking for various patterns in the bots themselves. Look at the comment of that article for more reference.

Community
  • 1
  • 1
bigC5012
  • 589
  • 1
  • 5
  • 19