Why is RFC1918 space in public DNS evil?
Valdis.Kletnieks at vt.edu
Valdis.Kletnieks at vt.edu
Mon Sep 18 18:21:10 UTC 2006
On Mon, 18 Sep 2006 17:57:43 +0200, Peter Dambier said:
> It can make sense:
>
> I am sending my mails mostly from lumbamba.peter-dambier.de (192.168.48.226)
> my router is krzach.peter-dambier.de (192.168.48.2)
> my mailer is echnaton.peter-dambier.de (192.168.48.228)
>
> My traceroute looks ok although some of the hosts are RFC1918
> If somebody looks into my email headers they find information that makes
> sense although they could not ping the hosts.
>
> As long as you do not allow AXFR, nobody can see the information about
> RFC1918 hosts. So there is no risk.
Unless of course you're leaking it in Received: headers..
Or DNS requests across the public Internet (remember, we *started* with the
question of having this stuff on a public-facing DNS server..)..
Or all the other myriad ways this stuff tends to leak out. AXFR is the *least*
of your problems.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 226 bytes
Desc: not available
URL: <http://mailman.nanog.org/pipermail/nanog/attachments/20060918/b102d979/attachment.sig>
More information about the NANOG
mailing list