10.0.0

Bil Herd bil at zeus.jersey.net
Sat May 31 12:07:48 UTC 1997


<written about another example>
> Of course, RFC1918 addresses should not appear in the global
> routing table. This is a fine example of people not taking
> the responsibility to ensure [filter] that if they do use
> them, they do not leak.
> 

A couple of weeks ago we received a complaint from a customer of a 
customer.  They could get to some places but not others including us.  
This is the traceroute that the dialup customer generated trying to hit 
one of my customers.

1   121 ms   124 ms   112 ms  wchspawcsap01.bellatlantic.net[192.168.107.173]
2   114 ms   118 ms   161 ms  192.168.107.174
3   126 ms   123 ms   123 ms  206.125.197.69
4   304 ms   292 ms   261 ms  ATM5-0-9.dc01.IConNet.NET [204.245.127.157]
5   132 ms   135 ms   126 ms  mae-east.netaxs.net [192.41.177.87]
6   159 ms   136 ms   136 ms  philly-dc-gw-t3-h3-0.netaxs.net[206.161.90.2]
7   146 ms   136 ms   138 ms  207.106.127.6
8     *        *        *     Request timed out.
9     *        *        *     Request timed out.

A doublecheck of the forward DNS gave me:
Name: wchspawcsap01.bellatlantic.net
Address: 192.168.107.173
Aliases:

It would seem that they not only use the RFC1918 addresses but they have
forward DNS set up for it, and evidently reverse DNS is set up internally for
line one of the traceroute to resolve. Or maybe I am missing something. 

Bil






More information about the NANOG mailing list