[67107] in North American Network Operators' Group
Re: Strange public traceroutes return private RFC1918 addresses
daemon@ATHENA.MIT.EDU (Matthew Crocker)
Mon Feb 2 18:37:48 2004
In-Reply-To: <1075764026.18931.535.camel@wks02.probe-networks.de>
From: Matthew Crocker <matthew@crocker.com>
Date: Mon, 2 Feb 2004 18:40:52 -0500
To: 'nanog@merit.edu' <nanog@merit.edu>
Errors-To: owner-nanog-outgoing@merit.edu
On Feb 2, 2004, at 6:20 PM, Jonas Frey (Probe Networks) wrote:
>
> This is quite often used. You cant (d)DoS the routers this way, nor try
> to do any harm to them as you cant reach them.
>
Sure you can, easy, attack a router 1 hop past your real target and
spoof your target as the source. The resulting ICMP responses will
hammer the target. If the Internet edge actually protected itself
against spoofing it would be harder but it is still very do-able now.