[168527] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: BCP38.info

daemon@ATHENA.MIT.EDU (Andrei Robachevsky)
Wed Jan 29 05:11:37 2014

Date: Wed, 29 Jan 2014 11:11:00 +0100
From: Andrei Robachevsky <robachevsky@isoc.org>
To: Jared Mauch <jared@puck.nether.net>, <nick@flhsi.com>
In-Reply-To: <D4515961-E456-454D-8461-4D7044CC47A7@puck.nether.net>
Cc: NANOG <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

Jared Mauch wrote on 1/28/14 10:11 PM:
> 192.168.0.1 has a rule that says send UDP/53 packets I process to 172.16.0.1.  Since i'm "outside" it's "NAT", the rule ends up taking the source IP, which isn't part of it's "NAT" set, and ends up copying my "source" IP into the packet, then forwards it to the DNS server.

This is really broken. Do you have any idea as to why such rule is
implemented? I also heard that some CPE implement exactly the same logic
if one spoof src IP inside their NAT. I think that the Spoofer project
discards tests from the inside NAT, but maybe they track such cases?

Andrei


home help back first fref pref prev next nref lref last post