[33109] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: RFC1918 addresses to permit in for VPN?

daemon@ATHENA.MIT.EDU (Simon Lyall)
Fri Dec 29 15:05:17 2000

Date: Sat, 30 Dec 2000 09:02:38 +1300 (NZDT)
From: Simon Lyall <simon.lyall@ihug.co.nz>
To: <nanog@merit.edu>
In-Reply-To: <20001229134801.B275@noc.untraceable.net>
Message-ID: <Pine.LNX.4.30.0012300853170.639-100000@boggle.ihug.co.nz>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Errors-To: owner-nanog-outgoing@merit.edu


On Fri, 29 Dec 2000, Andrew Brown wrote:
> they might actually have reverse dns set up for those addresses, but
> i, of course, have no idea what server to ask about it.  :)

Perhaps IANA could set up reverses for those networks to discourage people
from using them? I would guess that a few reverses with names like
192-168-1-1.danger.stupid.idiot.network.admin in a traceroute would
quickly sort things out.

One of the companies we work with has 192.168 address for some of the
radius servers we have to talk to, we are directly connected to them so
it's not a big pain but it's just so ugly.

-- 
Simon Lyall.                |  Newsmaster  | Work: simon.lyall@ihug.co.nz
Senior Network/System Admin |              | Home: simon@darkmere.gen.nz
ihug, Auckland, NZ          | Asst Doorman | Web: http://www.darkmere.gen.nz



home help back first fref pref prev next nref lref last post