[38255] in North American Network Operators' Group
Re: engineering --> ddos and flooding
daemon@ATHENA.MIT.EDU (Christopher A. Woodfield)
Fri Jun 1 16:36:25 2001
Date: Fri, 1 Jun 2001 16:34:40 -0400
To: Mark Mentovai <mark-list@mentovai.com>
Cc: Geoff Zinderdine <geoff.zinderdine@mts.mb.ca>,
lucifer@lightbearer.com, nanog@merit.edu
Message-ID: <20010601163440.E1148@semihuman.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <Pine.GSO.4.33.0106011500270.449-100000@oak.ggn.net>; from mark-list@mentovai.com on Fri, Jun 01, 2001 at 03:07:26PM -0400
From: "Christopher A. Woodfield" <rekoil@semihuman.com>
Errors-To: owner-nanog-outgoing@merit.edu
Easy...
ip route 127.254.254.254 255.255.255.255 null0
BGP sees this as a valid route, straight to the bit bucket.
-C
> Even if they don't, who's to say what's unreachable? If the NEXT_HOP is
> truly unreachable, in that there is no route to it, the BGP path won't be
> marked as valid and won't make it to the IP routing table (Loc-RIB.)
>
> I've long felt that IP should have come with a provision for an address that
> is never routed. It would be great if we could get something like 127.0.0.2
> for this very task.
>
> Mark
>
--
---------------------------
Christopher A. Woodfield rekoil@semihuman.com
PGP Public Key: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xB887618B