Fact-checked by Grok 2 weeks ago

localhost

In computer networking, localhost is a standard that refers to the current or , used for communication where data is routed internally without traversing an external . It conventionally resolves to the IPv4 loopback range 127.0.0.0/8, with 127.0.0.1 as the most common specific , enabling applications to communicate with services running on the same machine as if they were on a remote . In , localhost maps to the loopback ::1/128, which serves the same internal routing purpose and is treated as having link-local scope on a virtual loopback interface. The term "localhost" and its associated domain ".localhost" are reserved as special-use names under standards to prevent conflicts in DNS resolution and ensure consistent addressing across systems. This reservation means that queries for localhost must resolve directly to addresses without requiring external DNS lookups, and authoritative DNS servers are prohibited from delegating or modifying these names for other purposes. Historically, the mechanism for IPv4 originated in early specifications, with the 127/8 network explicitly designated for internal looping to support testing, diagnostics, and on a single host. Localhost plays a critical role in , web serving, and system administration, allowing developers to test applications locally (e.g., via http://localhost) without exposing them to the . It is statically defined in most operating systems' host files or DNS resolvers, such as /etc/hosts on systems, ensuring reliable access even in offline environments.

Fundamentals

Definition

In computer networking, localhost is a that refers to the current device or , allowing applications on that device to communicate with services running on the same without transmitting data over an external network. This is a reserved specifically for purposes, enabling self-referential communication within the local system. The underlying mechanism supporting localhost is the interface, a interface where outgoing traffic destined for addresses is immediately redirected back into the local for processing, bypassing any physical transmission. This redirection ensures that sent to addresses, such as those in the 127.0.0.0/8 range for IPv4, loop back inside the host without appearing on any external . For instance, a sent to 127.0.0.1 is handled entirely internally by the host's software. Localhost serves as a convenient abstraction over the loopback mechanism, providing a human-readable name that resolves to loopback addresses, which allows applications to perform self-referential networking using a standard hostname rather than directly specifying IP addresses. While localhost is the hostname and loopback refers to the technical mechanism and associated addresses, the two are intrinsically linked, with localhost consistently mapping to loopback addresses as defined by protocol specifications.

Purpose and Uses

Localhost serves as a fundamental mechanism for local application testing, allowing software such as to communicate with themselves without relying on external infrastructure. For instance, developers can run a local and access it via a pointed to localhost, simulating client-server interactions entirely on the same . This is particularly valuable for database connections, where applications connect to a local database instance using localhost to perform queries and updates in isolation. Additionally, localhost facilitates (IPC) on the host, enabling different software components or services to exchange data internally without any dependency on physical transmission. The benefits of using localhost include isolation from external network issues, such as connectivity failures or latency, since all traffic remains confined to the host's internal interface. This internal routing also provides faster performance by bypassing the overhead of network hardware and protocols, resulting in near-instantaneous data transfer for local operations. Furthermore, it enhances security by preventing accidental exposure of local services to the broader , as loopback traffic cannot leave the host. In common scenarios, localhost is essential in development environments, such as running a local API server for backend testing before deployment. Self-diagnostic tools, like pinging localhost, verify the host's network stack functionality without external dependencies. It also supports operations in protocols like (e.g., local SMTP ) or file transfers, allowing systems to process these internally for maintenance or scripting purposes. A notable example is the use of localhost in tunneling services, where SSH connections to localhost create secure local proxies for forwarding traffic, such as exposing a development server through a dynamic forward without external . The name "localhost" typically resolves to the addresses 127.0.0.1 for IPv4 or ::1 for , ensuring consistent local access across systems.

Addressing

IPv4 Loopback

The IPv4 address range is reserved as 127.0.0.0/8, which includes all addresses from 127.0.0.0 to 127.255.255.255 and provides 16,777,216 possible addresses for internal use within a . Within this range, 127.0.0.1 serves as the conventional and default address for , widely adopted across operating systems and applications for self-referential communication. Packets destined for any address in the 127.0.0.0/8 range are processed entirely within the host and never transmitted over any physical or virtual network interface external to the device. The host's IP protocol stack intercepts such datagrams and loops them back internally, generating responses locally without involving higher-layer protocols beyond the necessary simulation of network delivery. This design ensures reliable self-testing and local service interaction, as addresses in this block must not appear as source or destination in any datagram leaving the host. The range operates independently of the host's primary subnet mask, with the entire /8 block treated as local regardless of the configured prefix. In the host's , a dedicated entry typically directs all 127.0.0.0/8 traffic to the interface (often denoted as ""), bypassing any or external gateway and ensuring immediate local resolution. This supports seamless in diverse environments without altering global policies. The "localhost" is conventionally resolved to 127.0.0.1 via standard system files or DNS.

IPv6 Loopback

In , the loopback address is designated as ::1, which expands to the full 128-bit form 0000:0000:0000:0000:0000:0000:0000:0001. This address serves as the singular reserved loopback identifier within the addressing architecture, as specified in RFC 4291, contrasting with the broader range available in IPv4. It enables a to direct packets to itself for internal processing, ensuring that such traffic remains confined to the local system without traversal of physical networks. The properties of ::1 emphasize its role in self-referential communication under protocols. Packets destined for this utilize standard headers and must not be assigned to any physical ; instead, they are handled via a virtual with link-local scope. Upon receipt, such packets are processed internally, while any attempt to forward them or use ::1 as a source for outbound traffic beyond the results in rejection, preventing unintended propagation. This design supports efficient testing and development of -enabled applications by redirecting traffic seamlessly within the host. In dual-stack environments that support both IPv4 and IPv6, the loopback address ::1 coexists with the IPv4 equivalent 127.0.0.1, allowing the hostname "localhost" to resolve to both addresses via DNS mechanisms. For instance, getaddrinfo() queries for "localhost" may return multiple addresses, including 127.0.0.1 and ::1, facilitating application compatibility during IPv4-to-IPv6 transitions without requiring protocol-specific modifications. This integration ensures that services bound to loopback can operate across both protocol stacks, promoting smooth interoperability in mixed-network systems.

Resolution and Configuration

Hostname Resolution

Hostname resolution for "localhost" is handled locally on most operating systems to map the name to addresses, avoiding external network queries as specified in standards for special-use domain names. This ensures reliable self-referential communication without dependency on . Primary mechanisms include static files, resolver libraries, and operating system defaults, prioritizing lookups to prevent unnecessary or insecure remote resolutions. In Unix-like systems such as Linux, the /etc/hosts file serves as the main local mapping table, typically containing entries like 127.0.0.1 localhost for IPv4 and ::1 localhost ip6-localhost ip6-loopback for IPv6 to support both address families. When an application queries "localhost" via functions like gethostbyname(3), the resolver first examines /etc/hosts through the Name Service Switch (NSS) configuration in /etc/nsswitch.conf, which by default orders "files" before "dns". If no entry is found in the file, the process proceeds to other NSS modules, but for "localhost", standards mandate against DNS queries, relying instead on built-in OS handling or failure. Resolver libraries like those in glibc implement this order to ensure efficiency and security. In Windows, hostname resolution for "localhost" similarly prioritizes the local hosts file at C:\Windows\System32\drivers\etc\hosts, which by default maps "localhost" to 127.0.0.1. The system's DNS resolver (via APIs like getaddrinfo) checks this file before querying DNS, and includes built-in handling for loopback names to resolve to 127.0.0.1 or ::1 without external dependencies, aligning with RFC 6761. In dual-stack environments supporting both IPv4 and IPv6, modern resolvers such as getaddrinfo(3) return a list of addresses for "localhost", including both 127.0.0.1 and ::1 when the address family hint is AF_UNSPEC, allowing applications to select based on protocol preference or happy eyeballs algorithms for concurrent connections. This behavior aligns with loopback interface defaults, where getaddrinfo explicitly provides INADDR_LOOPBACK and IN6ADDR_LOOPBACK_INIT for local bindings. Edge cases arise if /etc/hosts is absent, empty, or modified without a "localhost" entry; in such scenarios, may fail with errors like "unknown " in tools relying on NSS, forcing applications to use explicit addresses (e.g., 127.0.0.1) instead. Operating systems without the file might fallback to hardcoded defaults in the resolver for "localhost" to maintain compatibility, but this is not guaranteed across all implementations, potentially disrupting local services until the file is restored.

System Configuration

In Unix-like operating systems such as and macOS, the interface is typically named "lo" (or "lo0" on macOS) and is configured using command-line tools like ifconfig or the modern ip command from the iproute2 suite. For example, on , administrators can bring up the interface and assign the standard IPv4 address with ip addr add 127.0.0.1/8 dev lo followed by ip link set lo up, while additional addresses can be added using NetworkManager's nmcli tool, such as nmcli connection add type loopback ifname lo con-name example-loopback autoconnect yes. On macOS, similar configuration occurs via ifconfig lo0 127.0.0.1 up, with aliases for additional loopback addresses added using ifconfig lo0 alias 127.0.0.2 up. In Windows, the built-in interface, known as the Loopback Pseudo-Interface 1, is automatically managed by the TCP/IP stack and requires no manual setup for basic localhost functionality, though additional virtual loopback adapters can be installed via or hdwwiz.cpl for testing purposes. Configuration files play a key role in enabling localhost resolution and network management across these systems. The /etc/hosts file in systems maps hostnames like "localhost" to addresses (e.g., 127.0.0.1 localhost), providing static resolution that precedes DNS queries and is essential for local services. The /etc/resolv.conf file influences overall DNS behavior but is less directly involved in loopback setup, while tools like on use .network files (e.g., /etc/systemd/network/lo.network with [Match] Name=lo and [Network] Address=127.0.0.1/8) to declaratively configure the interface during boot. On Windows, the equivalent is the C:\Windows\System32\drivers\etc\hosts file, which similarly maps "localhost" to 127.0.0.1 by default. Enabling the interface is straightforward and often automatic, but manual intervention may be needed for . In distributions using traditional tools, ifup lo activates the interface based on /etc/network/interfaces entries like auto lo and iface lo inet [loopback](/page/Loopback). If the interface is absent—rare but possible due to misconfigurations or updates—users can check its status with ip [link](/page/Link) show lo and may need to reboot or examine system logs to restore it, then verify IP stack integrity via [ping](/page/Ping) 127.0.0.1. Disabling is uncommon but can be done temporarily with ip [link](/page/Link) set lo down, though this disrupts local services. On macOS and Windows, manual enabling is typically unnecessary as the interface initializes at boot. Cross-platform variations exist primarily in tooling and defaults, but the is enabled by default in to support essential local networking. Unix-like systems often auto-configure "lo" during early boot via init systems like , while Windows integrates it seamlessly into the network stack without user intervention.

Processing

Packet Flow

When an application sends a packet to the localhost IP address, the operating system's identifies it as a destination, redirecting the packet internally without involving any network interface card (NIC). This process ensures that communication remains confined to the local machine, enabling self-testing and inter-process networking without external transmission. The packet flow begins with socket creation, typically using an AF_INET or AF_INET6 socket for IPv4 or , respectively. Upon data transmission via system calls like sendmsg(), the (e.g., via tcp_sendmsg() or via udp_sendmsg()) constructs the necessary headers and enqueues the packet in the socket's write queue. In the , for example, at the IP layer, functions such as ip_queue_xmit() evaluate the destination—127.0.0.1 for IPv4 or ::1 for —and invoke local delivery mechanisms like ip_local_out() followed by ip_local_deliver(), placing the packet directly into the input processing queue; analogous internal routing mechanisms exist in other operating systems' kernels. The packet then ascends the stack through reception (e.g., tcp_v4_rcv() in ) to the recipient socket's receive queue, where it awaits reading via recvmsg(). Unlike external routing, packets undergo no physical transmission and bypass the entirely, remaining as in-kernel structures like sk_buff for efficient handling. The Time-to-Live (TTL) field for IPv4—or for IPv6—is not decremented, as the packet is not treated as traversing a ; this contrasts with forwarded traffic where decrement occurs before output. This in-memory processing results in minimal latency, often on the order of microseconds, far lower than network-bound transfers, making localhost ideal for high-performance local applications.

Interface Handling

The interface, commonly denoted as lo or lo0 in systems, serves as a virtual device that simulates the behavior of a physical interface card specifically for handling local traffic destined to the host itself. This interface is implemented entirely in software within the , without reliance on any , allowing applications to communicate with local services using protocols as if communicating over a physical link. In , the loopback device is defined in the kernel source file drivers/net/loopback.c, where it is registered as a pseudo-device using the net_device structure and custom operations like loopback_xmit for transmission handling. Packet processing for the loopback interface occurs entirely within the kernel, bypassing physical transmission. When an application sends data to a loopback address such as 127.0.0.1, the kernel's loopback_xmit function dequeues the packet, sets the appropriate protocol type using eth_type_trans, and immediately requeues it for reception via __netif_rx, simulating a round-trip without leaving the host's address space. This internal redirection supports standard features like MTU (Maximum Transmission Unit), which defaults to 65536 bytes to accommodate large local transfers without fragmentation, configurable during device setup in gen_lo_setup. Regarding ARP (Address Resolution Protocol), resolution is skipped for loopback traffic since no hardware address mapping is needed; the interface uses ARPHRD_LOOPBACK as its hardware type (0x0001), and packets are processed directly without invoking ARP queries or responses. Kernel modules involved in this handling, such as those in net/ipv4/dev.c, manage the device operations, ensuring efficient local delivery while incrementing packet statistics for transmitted and received frames. Monitoring and statistics for the interface are accessible through standard tools, providing insights into traffic volumes and aiding in scenarios like application loops or bottlenecks. The ip -s link show lo command displays basic metrics such as RX/TX packets, bytes, errors, and the interface's MTU. Similarly, ip -s -s link show lo provides more detailed statistics, while ss -s or cat /proc/net/snmp offers protocol-level details aggregated across interfaces, including contributions to , , and counters. These tools are particularly useful for verifying that communications, such as database or inter-process messaging, are correctly through the without unintended external exposure. In systems with multiple network interfaces, the interface takes precedence for addressed to localhost (127.0.0.0/8 or ::1/128 in ) due to its dedicated local route, which has the highest priority (metric 0) in the kernel's . This ensures that packets destined for addresses are handled internally via lo rather than being mistakenly routed to physical interfaces like eth0 or wlan0, even if those interfaces are configured with overlapping or additional ; the kernel's rules (RT_SCOPE_HOST for ) enforce this to prevent flux or misdelivery. As a result, localhost communications remain efficient and secure, avoiding the overhead of physical link layers in multi-interface environments.

History and Standards

Development History

The loopback mechanism, foundational to the localhost concept, emerged in the 1970s during ARPANET operations as a tool for internal testing and performance evaluation without requiring external network connections. This approach was influenced by early packet-switched networking needs, where loopback allowed protocols to simulate communication loops locally. By the early 1980s, the concept was integrated into Unix-like systems, particularly with the release of 4.2BSD in 1983, which introduced a software loopback interface (lo0) explicitly for debugging, protocol testing, and performance analysis on systems like the VAX. The 4.2BSD implementation marked a key step in embedding loopback into standard operating system networking stacks, evolving from ad-hoc ARPANET practices to structured software features. A pivotal milestone came in 1986 with RFC 990, which formally assigned the 127/8 IPv4 address block for purposes, building on earlier reservations in RFC 790 (1981) that had set aside 127 for future use without specifying its role. This standardization, authored by and Joyce Reynolds, solidified loopback's role in TCP/IP implementations, ensuring that datagrams addressed to 127.x.x.x would be looped back internally rather than routed externally. The evolution reflected broader TCP/IP maturation, where early experimental networks transitioned to reliable, interoperable protocols. In Unix environments, the hostname "localhost" became a de facto standard in the 1980s through entries in the /etc/hosts file, mapping it to 127.0.0.1 as a convenient alias for the loopback address. This practice originated from ARPANET's HOSTS.TXT file, maintained by SRI before DNS adoption in 1983, and was adopted in BSD distributions like 4.2BSD to simplify local resolution in networking software. By the late 1980s, "localhost" was ubiquitous in Unix /etc/hosts configurations, facilitating seamless local communication in distributed systems. Modern adaptations extended to with 2460 in 1998, defining ::1/128 as the loopback address to maintain compatibility with IPv4's internal model while addressing expanded address space needs. The concept has persisted in ized environments, where each or network namespace receives its own isolated loopback interface (e.g., ) for intra-container communication, supporting scalable without external dependencies. This continuity underscores loopback's enduring utility in virtualized and cloud-native architectures.

Relevant Standards

The standardization of localhost and loopback addresses is primarily governed by Internet Engineering Task Force (IETF) Request for Comments (RFCs), which define their allocation, usage, and requirements for host implementations. RFC 1122, published in 1989, outlines requirements for Internet hosts and explicitly mandates support for the IPv4 loopback address range, designating {127, } as the internal host loopback address that must not appear outside a host to ensure proper internal communication. Similarly, RFC 4291 from 2006 specifies the IPv6 addressing architecture, defining ::1/128 as the loopback address for IPv6 nodes, which a host uses to direct traffic to itself without traversing the network. Address reservations for are further clarified in subsequent RFCs to prevent conflicts and maintain network integrity. RFC 5735, issued in 2010, restates the assignment of the entire 127.0.0.0/8 block for IPv4 purposes, noting that datagrams sent to any address in this range loop back within the host, typically implemented via 127.0.0.1. This is reinforced by RFC 6890 from 2013, which establishes registries for special-purpose IP addresses and classifies 127.0.0.0/8 as a special-use block reserved exclusively for , instructing the (IANA) to manage such allocations without global routing. Regarding hostname resolution, localhost interacts with the (DNS) as defined in RFC 1035 (1987), which provides the foundational protocol for domain name implementation and resolution, treating localhost as a special case often mapped locally to addresses. More specifically, RFC 6761 (2013) designates "localhost" as a , prohibiting its delegation in the DNS and requiring it to resolve solely to the local host's interface for across protocols. Operating systems must comply with these RFCs to ensure seamless interoperability in TCP/IP networks. For instance, hosts are required to support traffic processing internally, reject external of addresses, and resolve "localhost" consistently to prevent misconfigurations that could disrupt local services or expose systems to unintended network exposure.

Advanced Topics

Special Cases

In multi-interface or multi-homed systems, operating systems like prioritize the interface () for traffic destined to localhost addresses (127.0.0.1 or ::1), ensuring it is handled internally by the kernel rather than routed through external network interfaces. This selection occurs before rules are applied, as loopback addresses are not considered "martian" packets by default, allowing local routing without involving physical adapters. For example, in , the parameter net.ipv4.conf.all.route_localnet can be enabled to permit 127/8 traffic on non-loopback interfaces if needed, but standard configurations keep localhost strictly local to avoid unintended external exposure. In ized environments, localhost resolution and behavior deviate from standard host systems due to isolated network namespaces. Within containers, localhost refers exclusively to the container's own interface, isolating it from the host's services unless [the --network](/page/The_Network) host mode is used, which shares the host's network stack and maps container localhost directly to the host's. Similarly, in virtual machines using Oracle , the guest's localhost points to its own by default; to access the host's localhost in mode, the guest must use the special address 10.0.2.2, while host-only networking requires the host's adapter IP (e.g., 192.168.56.1) for communication. These mappings ensure container or guest isolation but require explicit configuration, such as in NAT, to bridge localhost access between environments. Localhost functionality remains operational even when physical networks are disconnected or unavailable, as the interface operates entirely within the kernel's software stack without relying on adapters. This independence allows applications to communicate via 127.0.0.1 for testing, development, or internal services, unaffected by or Ethernet downtime; for instance, pinging localhost succeeds regardless of cable disconnection or interface state. Mobile devices or laptops in exemplify this, where localhost-based tools like local web servers continue to function seamlessly. Custom overrides in the /etc/hosts file can redirect localhost to non-loopback addresses, altering its resolution and potentially disrupting local communications. For example, mapping the hostname localhost to an external IP like 8.8.8.8 would route local traffic over the internet instead of internally, causing performance degradation and failure of loopback-dependent services such as database connections or API testing. Another risk involves mapping a hostname to localhost incorrectly, leading to resolution loops or conflicts with system services; Red Hat documentation advises verifying entries to prevent such misconfigurations, as overrides take precedence over DNS and can break applications expecting standard loopback behavior.

Security Implications

Localhost provides inherent isolation benefits by confining communication to the local machine, ensuring that traffic on the interface remains unexposed to external networks and thereby significantly reducing the against remote exploits. This design prevents unauthorized external to services bound exclusively to 127.0.0.1 or ::1, making it a safer alternative for testing and development environments compared to public-facing . Despite these advantages, localhost usage introduces risks of local , where a malicious process on the same system can exploit services bound to the loopback address to gain elevated privileges, as other local users or processes can still connect without network traversal. For instance, binding a sensitive to localhost does not protect against intra-system attacks, allowing an attacker with local to intercept or manipulate traffic via the interface. To mitigate these risks, implementing firewalls with specific rules for the interface, such as using to restrict access to localhost-bound ports, is a recommended that limits to authorized entities only. Additionally, in multi-user systems, sensitive services should avoid binding to localhost altogether, opting instead for Unix domain sockets or other mechanisms that enforce stricter access controls based on user permissions. In modern cloud and containerized environments, localhost tunneling vulnerabilities pose emerging threats, particularly through Server-Side Request Forgery (SSRF) attacks where applications redirect requests to localhost endpoints, potentially exposing metadata services or internal APIs to exploitation. For example, misconfigured containers might allow SSRF payloads to probe localhost resources, leading to unauthorized ; addressing this requires input validation and network policies that block such redirects.

References

  1. [1]
    RFC 2606 - Reserved Top Level DNS Names - IETF Datatracker
    The ".localhost" TLD has traditionally been statically defined in host DNS implementations as having an A record pointing to the loop back IP address and is ...
  2. [2]
    RFC 990: Assigned numbers
    Summary of each segment:
  3. [3]
    RFC 4291 - IP Version 6 Addressing Architecture - IETF Datatracker
    This specification defines the addressing architecture of the IP Version 6 protocol. It includes the basic formats for the various types of IPv6 addresses.
  4. [4]
    RFC 6761: Special-Use Domain Names
    ### Summary of Definitions and Rules for the "localhost" Special-Use Domain Name (RFC 6761)
  5. [5]
    RFC 1123 - Requirements for Internet Hosts - Application and Support
    This RFC is one of a pair that defines and discusses the requirements for Internet host software. This RFC covers the application and support protocols.
  6. [6]
    RFC 5735: Special Use IPv4 Addresses
    **Definition of 127/8 as Loopback:**
  7. [7]
    RFC 1122 - Requirements for Internet Hosts - Communication Layers
    This is one RFC of a pair that defines and discusses the requirements for Internet host software. This RFC covers the communications protocol layers.
  8. [8]
  9. [9]
    Getting Started with ASP.NET - Microsoft Learn
    Nov 3, 2022 · The name localhost refers to a local server, meaning that the page is served by a web server that's on your own computer. As noted, WebMatrix ...
  10. [10]
    6.2.4 Connecting to the MySQL Server Using Command Options
    This section describes use of command-line options to specify how to establish connections to the MySQL server, for clients such as mysql or mysqldump.
  11. [11]
    What is a Loopback Address? - GeeksforGeeks
    Jul 23, 2025 · A loopback interface is useful for conducting certain types of testing and resolving specific router issues. To confirm network connectivity, ...
  12. [12]
  13. [13]
    Connect to local web services from Android emulators and iOS ...
    Oct 7, 2024 · Learn how a .NET MAUI app running in the Android emulator or iOS simulator can consume a ASP.NET Core web service running locally.
  14. [14]
    Remote port tunnelling with SSH - Linux.com
    So you open an ssh console to your machine from your localhost, with the connection you ask remote to port forward its 3306 port to your local 3306. Now try to ...
  15. [15]
    IPv4 Special-Purpose Address Space
    Aug 19, 2009 · 10.0.0.0/8, Private-Use, [RFC1918] ; 100.64.0.0/10, Shared Address Space, [RFC6598] ; 127.0.0.0/8, Loopback, [RFC1122], Section 3.2.1.3 ; 169.254.
  16. [16]
    RFC 6761: Special-Use Domain Names
    This document describes what it means to say that a Domain Name (DNS name) is reserved for special use, when reserving such a name is appropriate, and the ...
  17. [17]
    hosts(5) - Linux manual page
    ### Summary: /etc/hosts for Hostname Resolution and Localhost
  18. [18]
    gethostbyname(3) - Linux manual page
    ### Process of Hostname Resolution Using gethostbyname
  19. [19]
    getaddrinfo(3) - Linux manual page
    ### Summary: How getaddrinfo Handles Localhost in Dual-Stack Environments
  20. [20]
    The Loopback Interface
    The loopback interface has been assigned a netmask of 255.0.0.0, since 127.0.0.1 is a class-A address.
  21. [21]
    What Is the Loopback (lo) Device? | Baeldung on Linux
    Mar 18, 2024 · The loopback interface uses an IP address like any other network interface. There's a reserved IPv4 address range 127.0.0.0/8 for loopback ...Missing: configuration | Show results with:configuration
  22. [22]
    Chapter 15. Configuring the loopback interface by using nmcli
    To assign an additional IP address to the interface, enter: nmcli connection modify example-loopback +ipv4. · To set a custom Maximum Transmission Unit (MTU), ...
  23. [23]
    How do you get loopback addresses other than 127.0.0.1 to work on ...
    Aug 7, 2012 · Here is the short answer: sudo ifconfig lo0 alias 127.0.0.* up. Each alias must be added individually ( sudo ifconfig lo0 alias 127.0.0.2 up ...Missing: documentation | Show results with:documentation
  24. [24]
    install the Microsoft Loopback Adapter - Windows Server
    Jan 15, 2025 · This article describes how to install the Microsoft Loopback Adapter in Microsoft Windows Server 2003. You can install the adapter by using a command prompt or ...
  25. [25]
    What is 127.0.0.1 and Loopback? - Pinggy
    Sep 12, 2025 · At the network layer, the IP stack recognizes this as a loopback address and immediately redirects the traffic internally through the loopback ...Missing: redirection | Show results with:redirection
  26. [26]
    What Is the /etc/hosts File in Linux? - Pure Storage Blog
    Jun 15, 2023 · The /etc/hosts file is a plain text file used in matching a fully qualified domain name (FQDN) with the server IP hosting a specific domain.
  27. [27]
    Understanding /etc/hosts file - Kernel Talks
    Dec 8, 2016 · etc/hosts is key file for name resolution in any Linux Unix system. Learn fields, formats, meaning of each field within /etc/hosts file.
  28. [28]
    SystemD Networkd - Freedesktop.org
    A plain ini-style text file that encodes network configuration for matching network interfaces, used by systemd-networkd(8).
  29. [29]
    Loopback interface missing - LinuxQuestions.org
    Sep 24, 2019 · The loopback interface appears automagically when IP support is loaded (or compiled into the kernel). One can certainly mess with the IP address assigned to ...How to configure multiple loopback interfaces (lo0, lo1, lo2...)Loopback interface won't come up at boot - LinuxQuestions.orgMore results from www.linuxquestions.org
  30. [30]
    Configuring networks - Ubuntu Server documentation
    To configure your system to use static address assignment, create a netplan ; The configuration can then be applied using the netplan ; The loopback interface is ...
  31. [31]
    systemd: who setup lo interface without ifupdown?
    Jan 31, 2017 · The loopback interface is set up in early boot (before eg any network servers are run). It seems there was no significant variation between distributions.Should localhost be managed by systemd-networkd?systemd - Cause a script to execute after networking has started?More results from unix.stackexchange.com
  32. [32]
    What Is a Loopback Address? When and How to Use It
    Aug 4, 2025 · Technically, IPv4 reserves the entire 127.0.0.0 to 127.255.255.255 range for loopback addresses, so you can use any address within that block.
  33. [33]
    [PDF] The Path of a Packet Through the Linux Kernel
    2) ip_local_deliver(): If we are the final receiver of the packet (localhost), the kernel does not forward the packet but passes it up the networking stack. 3) ...
  34. [34]
  35. [35]
  36. [36]
    Can IP packet with TTL=1 reach loopback interface of a switch?
    Nov 2, 2017 · Since the packet is not forwarded when it is passed on to the loopback interface, the TTL is not decremented and a TTL of 1 is sufficient.Do destination hosts decrement the TTL?What happens if the localhost does not interpret 127.0.0.1 as the ...More results from networkengineering.stackexchange.comMissing: localhost Linux
  37. [37]
  38. [38]
    devinet.c « ipv4 « net - kernel/git/torvalds/linux.git - Linux kernel source tree
    ### Summary: Loopback Address Handling and ARP in devinet.c
  39. [39]
    Interface statistics - The Linux Kernel documentation
    This document is a guide to Linux network interface statistics. There are three main sources of interface statistics in Linux.<|separator|>
  40. [40]
    IP Sysctl - The Linux Kernel documentation
    Optimize input packet processing down to one demux for certain kinds of local sockets. Currently we only do this for established TCP and connected UDP ...
  41. [41]
    [ih] History of 127/8 as localhost/loopback addresses?
    Jan 2, 2021 · Next message (by thread): [ih] History of 127/8 as localhost/loopback addresses? Messages sorted by: [ date ] [ thread ] [ subject ] [ author ] ...<|separator|>
  42. [42]
    [PDF] 4.2BSD Networking Implementation Notes - Revised July, 1983
    The “4.2BSD System Manual" provides a description of the user interface to the ... loopback" interface used for debugging and performance analysis). In ...
  43. [43]
    RFC 990: Assigned numbers
    This Network Working Group Request for Comments documents the currently assigned values from several series of numbers used in network protocol implementations.Missing: localhost | Show results with:localhost
  44. [44]
    Host.TXT (naming computers) - The History of Domain Names
    Before 1983 each computer on the network retrieved a file called HOSTS.TXT from a computer at SRI. The HOSTS.TXTfile mapped names to numerical addresses.
  45. [45]
    Network Administration: The Hosts File - Dummies
    The Windows 7 Hosts file ends with comments which show the host mapping commands used to map for the host name localhost, mapped to the IP address 127.0.0.1.
  46. [46]
    RFC 2460 - Internet Protocol, Version 6 (IPv6) Specification
    This document specifies version 6 of the Internet Protocol (IPv6), also sometimes referred to as IP Next Generation or IPng.Missing: loopback | Show results with:loopback
  47. [47]
    Container History and Linux Namespaces Part 1 - Hadean
    Sep 4, 2020 · When creating a new network namespace, Linux will insert a loopback interface…which is only useful for talking to yourself (try it by using –– ...
  48. [48]
    Networking | Docker Docs
    DNS requests will be forwarded from the container's network namespace so, for example, --dns=127.0.0.1 refers to the container's own loopback address. --dns ...Bridge network driver · Host network driver · Networking with standalone...
  49. [49]
    RFC 1035 - Domain names - implementation and specification
    This RFC describes the details of the domain system and protocol, and assumes that the reader is familiar with the concepts discussed in a companion RFC.
  50. [50]
  51. [51]
  52. [52]
    Loopback Address - What is it & How Does it Work? - Hostwinds
    Aug 14, 2024 · 127.0.0.1, commonly known as "localhost," is a loopback IP address that allows a local machine, such as a computer or server, to communicate with itself ...
  53. [53]
    Localhost pinging when there is no network card - Super User
    Mar 14, 2013 · Localhost is an internal IP address, which is handled directly by the kernel. No external network is involved (thus no network card).Accessing localhost (127.0.0.1) when off line - firefox - Super UserWin10 slow localhost access when network cable unpluggedMore results from superuser.com
  54. [54]
    17.9. Managing Hosts | Deployment Guide | Red Hat Enterprise Linux
    The Hosts tab allows you to add, edit, or remove hosts from the /etc/hosts file. This file contains IP addresses and their corresponding hostnames.Missing: official | Show results with:official
  55. [55]
    windows 10 - Can editing hosts file cause security risk? - Super User
    Apr 24, 2020 · In general, there isn't a risk in changing your hosts file. The real security risks come when you override something like, say, google.com or an online banking ...Why isn't /etc/hosts blocking domains after I add blocked sites via ...How can I set up /etc/hosts redirects only for any domain? - Super UserMore results from superuser.com