[69975] in North American Network Operators' Group
Re: Alternate and/or hidden infrastructure addresses (BGP/TCP RST/SYN vulnerability)
daemon@ATHENA.MIT.EDU (James)
Thu Apr 22 20:55:21 2004
Date: Thu, 22 Apr 2004 20:54:47 -0400
From: James <haesu@towardex.com>
To: "Stephen J. Wilcox" <steve@telecomplete.co.uk>
Cc: James <haesu@towardex.com>,
Lane Patterson <lpatterson@equinix.com>, nanog@merit.edu
In-Reply-To: <Pine.LNX.4.44.0404230112040.15106-100000@server2.tcw.telecomplete.net>
Errors-To: owner-nanog-outgoing@merit.edu
>
> no! these are so easy to find!!!!
>
> $ host 65.116.132.145
> 145.132.116.65.in-addr.arpa domain name pointer lo0.b1.box2.twdx.net.
of course.. i wasn't saying i am one of those who are employing 'hide the
loopbacks from public' practice :) heh
but yea good point though, if you were to 'hide' them, reverse dns hostnames
should be taken into consideration as well..
-J
--
James Jun TowardEX Technologies, Inc.
Technical Lead Network Design, Consulting, IT Outsourcing
james@towardex.com Boston-based Colocation & Bandwidth Services
cell: 1(978)-394-2867 web: http://www.towardex.com , noc: www.twdx.net