[38255] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: engineering --> ddos and flooding

daemon@ATHENA.MIT.EDU (Christopher A. Woodfield)
Fri Jun 1 16:36:25 2001

Date: Fri, 1 Jun 2001 16:34:40 -0400
To: Mark Mentovai <mark-list@mentovai.com>
Cc: Geoff Zinderdine <geoff.zinderdine@mts.mb.ca>,
	lucifer@lightbearer.com, nanog@merit.edu
Message-ID: <20010601163440.E1148@semihuman.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <Pine.GSO.4.33.0106011500270.449-100000@oak.ggn.net>; from mark-list@mentovai.com on Fri, Jun 01, 2001 at 03:07:26PM -0400
From: "Christopher A. Woodfield" <rekoil@semihuman.com>
Errors-To: owner-nanog-outgoing@merit.edu


Easy...

ip route 127.254.254.254 255.255.255.255 null0

BGP sees this as a valid route, straight to the bit bucket.

-C

> Even if they don't, who's to say what's unreachable?  If the NEXT_HOP is
> truly unreachable, in that there is no route to it, the BGP path won't be
> marked as valid and won't make it to the IP routing table (Loc-RIB.)
> 
> I've long felt that IP should have come with a provision for an address that
> is never routed.  It would be great if we could get something like 127.0.0.2
> for this very task.
> 
> Mark
> 

-- 
---------------------------
Christopher A. Woodfield		rekoil@semihuman.com

PGP Public Key: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xB887618B

home help back first fref pref prev next nref lref last post