[23766] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: address spoofing

daemon@ATHENA.MIT.EDU (Alex Bligh)
Thu Apr 22 18:48:59 1999

From: Alex Bligh <amb@gxn.net>
To: Randy Bush <randy@psg.com>
Cc: nanog@merit.edu
In-reply-to: Your message of "Thu, 22 Apr 1999 15:15:10 PDT."
             <m10aRkU-0008G4C@rip.psg.com> 
Date: Thu, 22 Apr 1999 23:47:29 +0200
Errors-To: owner-nanog-outgoing@merit.edu


> anyone have clues other than net slime and misconfigured nats?

Possibly users behind your filters are tracerouting through
somewhere which has PtP links configured in RFC1918 space,
and you are seeing ICMP TTL exceeded back from these addresses.
Some people allege configuring publicly visible PtPs to RFC1918
addresses is not bad practice. YMMV.

If you really want to know what they are, policy route them
to a spare ethernet port back to backed with a box running
tcpdump. But then you knew that already.

-- 
Alex Bligh
GX Networks (formerly Xara Networks)




home help back first fref pref prev next nref lref last post