[69975] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Alternate and/or hidden infrastructure addresses (BGP/TCP RST/SYN vulnerability)

daemon@ATHENA.MIT.EDU (James)
Thu Apr 22 20:55:21 2004

Date: Thu, 22 Apr 2004 20:54:47 -0400
From: James <haesu@towardex.com>
To: "Stephen J. Wilcox" <steve@telecomplete.co.uk>
Cc: James <haesu@towardex.com>,
	Lane Patterson <lpatterson@equinix.com>, nanog@merit.edu
In-Reply-To: <Pine.LNX.4.44.0404230112040.15106-100000@server2.tcw.telecomplete.net>
Errors-To: owner-nanog-outgoing@merit.edu


> 
> no! these are so easy to find!!!!
>
> $ host 65.116.132.145
> 145.132.116.65.in-addr.arpa domain name pointer lo0.b1.box2.twdx.net.

of course..  i wasn't saying i am one of those who are employing 'hide the
loopbacks from public' practice :) heh

but yea good point though, if you were to 'hide' them, reverse dns hostnames
should be taken into consideration as well.. 

-J



-- 
James Jun                                            TowardEX Technologies, Inc.
Technical Lead                        Network Design, Consulting, IT Outsourcing
james@towardex.com                  Boston-based Colocation & Bandwidth Services
cell: 1(978)-394-2867           web: http://www.towardex.com , noc: www.twdx.net

home help back first fref pref prev next nref lref last post