[25249] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Martian list of IP's to block???

daemon@ATHENA.MIT.EDU (bmanning@vacation.karoshi.com)
Fri Oct 1 11:48:11 1999

From: bmanning@vacation.karoshi.com
Message-Id: <199910011549.IAA02509@vacation.karoshi.com>
To: rfuller@3x.com
Date: Fri, 1 Oct 1999 08:49:23 -0700 (PDT)
Cc: jmbrown@ihighway.net (John M. Brown), nanog@merit.edu
In-Reply-To: <OF1A472F67.E919BB88-ON852567FD.0041BD2C@3x.com> from "rfuller@3x.com" at Oct 01, 1999 08:02:23 AM
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Errors-To: owner-nanog-outgoing@merit.edu


> I used the ones Cisco outlined in their document IOS Essentials every ISP
> Should Know.  Here is a copy of the list I use for out clients:
> 
>     deny   ip host 0.0.0.0 any log
>     deny   ip 127.0.0.0 0.255.255.255 any log
>     deny   ip 10.0.0.0 0.255.255.255 any log
>     deny   ip 172.16.0.0 0.15.255.255 any log
>     deny   ip 192.168.0.0 0.0.255.255 any log
>     deny   ip xxx.xxx.xxx.0 0.0.0.255 any log
>     deny   ip 224.0.0.0 31.255.255.255 any log
> 
> We are denyingy anyone that claims that their IP address is 0.0.0.0,
> Loopback addresses, all of the RFC 1918 addresses, address coming into us
> claiming they belong to our subnet, and multicast addresses.  It seems to
> work for us.  I also turn of ip directed broadcasts to minimize smurf/DoS
> attacks.  If you would like a copy of the document I used, let me know and
> I'll e-mail a copy to you.

	Its also useful to block 

	192.0.2.0/24  - the test network. so designated for documentation use
	169.254.0.0/16 - the link-local network.

	I'm not convinced that blocking native multicast is a good idea.
	
--bill


home help back first fref pref prev next nref lref last post