Date: Thu, 30 Nov 2000 22:07:05 -0800 (PST) From: "Rodney W. Grimes" <freebsd@gndrsh.dnsmgr.net> To: billf@mu.org (Bill Fumerola) Cc: str@giganda.komkon.org (Igor Roshchin), freebsd-security@FreeBSD.ORG Subject: Re: Danger Ports Message-ID: <200012010607.WAA46736@gndrsh.dnsmgr.net> In-Reply-To: <20001130164905.E83422@elvis.mu.org> from Bill Fumerola at "Nov 30, 2000 04:49:05 pm"
next in thread | previous in thread | raw e-mail | index | archive | help
> On Thu, Nov 30, 2000 at 10:20:57AM -0800, Rodney W. Grimes wrote:
>
> > No they won't suffer, reserved networks are reserved, blocking them
> > at AS boundaries is a BCP, both source and desitnation address. It
> > does do some funny things to traceroute, but it doesn't effect normal
> > operations:
>
> I wouldn't go as far as BCP.
Well, RFC1918, aka BCP5 is pretty darn clear in section 3 paragraph 8:
Because private addresses have no global meaning, routing information
about private networks shall not be propagated on inter-enterprise
links, and packets with private source or destination addresses
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
should not be forwarded across such links. Routers in networks not
^^^^^^^^^^^^^^^^^^^^^^^
using private address space, especially those of Internet service
providers, are expected to be configured to reject (filter out)
routing information about private networks. If such a router receives
such information the rejection shall not be treated as a routing
protocol error.
The problem is that the other RFC/BCP's (2827, 3013 in particular) only
talk about ingress filtering on source address, totally ignoreing what
RFC1918 says about these addresses :-(
> See nanog archives.
Can you be more specific?
--
Rod Grimes - KD7CAX @ CN85sl - (RWG25) rgrimes@gndrsh.dnsmgr.net
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200012010607.WAA46736>
