I think IPv6 even has a short-hand for localhost as ::1. Are the security implications of using a different loopback address, or someone finding out your loopback address? I guess people are upset about the New York Times snooping their loopback address and I don't understand why NYT would do that, or why anyone would care.
What's the point of being able to change your loopback/localhost 127.0.0.1 address to something else?
835 Views Asked by GlenPeterson At
1
There are 1 best solutions below
Related Questions in LOCALHOST
- Create Arabic msi (or any other locale, that is not listed in visual studio) using visual studio
- Read Platform information from .msi
- Patch building with MsiMsp.exe -- can target MSI differ from original MSI?
- MSI creation: Terminate application before upgrading
- Setup project always clean installation
- Use Orca to remove assembly from installer
- MSI Installer: Adding a non default action to a file extension
- Migrating PowerBuilder Application Build Process to TeamCity
- Stop windows service before perform the uninstallation
- How to execute spesific method from MSI dialog
Related Questions in LOOPBACK-ADDRESS
- Create Arabic msi (or any other locale, that is not listed in visual studio) using visual studio
- Read Platform information from .msi
- Patch building with MsiMsp.exe -- can target MSI differ from original MSI?
- MSI creation: Terminate application before upgrading
- Setup project always clean installation
- Use Orca to remove assembly from installer
- MSI Installer: Adding a non default action to a file extension
- Migrating PowerBuilder Application Build Process to TeamCity
- Stop windows service before perform the uninstallation
- How to execute spesific method from MSI dialog
Trending Questions
- UIImageView Frame Doesn't Reflect Constraints
- Is it possible to use adb commands to click on a view by finding its ID?
- How to create a new web character symbol recognizable by html/javascript?
- Why isn't my CSS3 animation smooth in Google Chrome (but very smooth on other browsers)?
- Heap Gives Page Fault
- Connect ffmpeg to Visual Studio 2008
- Both Object- and ValueAnimator jumps when Duration is set above API LvL 24
- How to avoid default initialization of objects in std::vector?
- second argument of the command line arguments in a format other than char** argv or char* argv[]
- How to improve efficiency of algorithm which generates next lexicographic permutation?
- Navigating to the another actvity app getting crash in android
- How to read the particular message format in android and store in sqlite database?
- Resetting inventory status after order is cancelled
- Efficiently compute powers of X in SSE/AVX
- Insert into an external database using ajax and php : POST 500 (Internal Server Error)
Popular # Hahtags
Popular Questions
- How do I undo the most recent local commits in Git?
- How can I remove a specific item from an array in JavaScript?
- How do I delete a Git branch locally and remotely?
- Find all files containing a specific text (string) on Linux?
- How do I revert a Git repository to a previous commit?
- How do I create an HTML button that acts like a link?
- How do I check out a remote Git branch?
- How do I force "git pull" to overwrite local files?
- How do I list all files of a directory?
- How to check whether a string contains a substring in JavaScript?
- How do I redirect to another webpage?
- How can I iterate over rows in a Pandas DataFrame?
- How do I convert a String to an int in Java?
- Does Python have a string 'contains' substring method?
- How do I check if a string contains a specific word?
I don't believe there is any security implications in changing the loopback address. As long as you stay in the standard reserved subnet (127.0.0.0/8). Any IP datagram with a source or destination address set to a loopback address must not appear outside of a computing system, or be routed by any routing device. Packets received on an interface with a loopback destination address must be dropped. Such packets are sometimes referred to as Martian packets. As far as security, the loopback has almost no effect on security unless routing tables/loopback interfaces are changed to a different ip address. Take a look at these two articles. https://security.stackexchange.com/questions/6395/can-the-loopback-interface-be-hijacked
https://serverfault.com/questions/300776/if-i-send-data-to-my-computer-using-its-public-hostname-does-it-actually-go-ove?newsletter=1&nlcode=9544%7Cbded
As far as the NY Times article, I read that the security engineer responsible for that code found that a massive number of machines were getting broken into to commit ad fraud. White Ops ran a study last year (http://whiteops.com/botfraud) and found 2/3 of fraud was coming from home users. The code is looking for various patterns in the bots themselves. Look at the comment of that article for more reference.