The DOS attack should be a real concern when using RFC 1918. A (distributed) smurf attack, or one of it's derivatives, can cause the icmp echo replies to be sent to that src. address. Since the attackers just use blocks and blocks of spoofed addresses, you could become the sourced address victim. Of course, ingress and egress rfc 1918 filtering will prevent this...it's just something else to think about... -jake In a message dated 11/16/2002 12:19:36 AM Eastern Standard Time, mike@rockynet.com writes:
haesu@towardex.com wrote:
You could also use RFC1918 numbers for your point-to-point /30 aggregation blocks with the customers.. But.. since that would have effect on customer's premise equipment, it would be better to give them globally unique space as well, who knows if your customer comes back and yells at you for not being able to get to his router's serial interface IP.
This practice was implemented here in the early days, before I came along. There have been almost no requests to change by clients, and very, very few who even noticed/cared enough to ask why.
But as more VPNs are deployed, I've seen this break some implementations. So for two reasons we've begun the (large) task of renumbering all the /30 ptp links either public or unnumbered:
1) Ensures all clients who decide to implement VPN don't run into frustration because of this practice. We want to encourage better security practices, and VPN can be an integral part of that.
2) The script kiddies won't mistakenly assume that we're not doing source address filtering. I'm sure that seeing a private address in traceroute probably makes you a more desirable target in certain circles.
There is only one case where I would recommend using a private address on a public link. We have a client periodically attacked, and in some cases the attackers have simultaneously attacked our own infrastructure. They now have only one path to them here, and every hop past the border is RFC1918.
Jahowering@aol.com wrote:
The DOS attack should be a real concern when using RFC 1918. A distributed) smurf attack, or one of it's derivatives, can cause the icmp echo replies to be sent to that src. address. Since the attackers just use blocks and blocks of spoofed addresses, you could become the sourced address victim. Of course, ingress and egress rfc 1918 filtering will prevent this...it's just something else to think about...
Well, those routes not being globally distributed mitigates that danger. The reverse argument could actually be made- I'm unlikely to see any DoS backscatter directed at the RFC1918 addresses, while the publics will always see it. I forgot one of the most important reasons we are migrating away from this practice. We do source address filtering via RPF verification at the edge, but it allows the /30 to leak because there is a valid route for it internally. Meaning that deliberately spoofed packets can still escape our network, and allowing just one per client is still too many. The better answer to our DoS victim, of course, is an ACL for every hop from the border at the border;that will be implemented as we complete the purge of RFC1918. Steve- the pain of renumbering is simply not worth it... take it from someone who's been there and don't use 'em. Backbone links might be easier to do than clients, but in the end you WILL end up renumbering when it breaks something a client needs. Save yourself the hassle and do it right from the start.
participants (2)
-
Jahowering@aol.com
-
Mike Lewinski