North American Network Operators Group|
Date Prev | Date Next |
Date Index |
Thread Index |
Author Index |
RE: Net-24 top prefix generating bogus RFC-1918 queries
- From: McBurnett, Jim
- Date: Mon Jun 02 08:42:58 2003
I thought I understood that 1918 routes were leaking....
>From: Sean Donelan [mailto:email@example.com]
>Sent: Monday, June 02, 2003 12:26 AM
>Subject: RE: Net-24 top prefix generating bogus RFC-1918 queries
>On Sun, 1 Jun 2003, McBurnett, Jim wrote:
>> guys.. I have a thought...
>> I am a charter fiber customer..
>> AND they use lots of 1918 address for management even some
>> I have seen this on all the cable providers..
>> unlike Sprint/MCI/ATT they don't use 100% RW on all their equipment..
>> then they leak because the BGP is not filtering properly..
>A DNS lookup for a RFC1918 in-addr.arpa record is unrelated to BGP or
>If you want to generate an RFC1918 in-addr.arpa query to the AS112
>servers do the following
>Default Server: localhost
>> set querytype=any
> origin = prisoner.iana.org
> mail addr = hostmaster.root-servers.org
> serial = 2002040800
> refresh = 1800 (30M)
> retry = 900 (15M)
> expire = 604800 (1W)
> minimum ttl = 604800 (1W)
>Authoritative answers can be found from:
>10.in-addr.arpa nameserver = BLACKHOLE-1.iana.org
>10.in-addr.arpa nameserver = BLACKHOLE-2.iana.org
>BLACKHOLE-1.iana.org internet address = 126.96.36.199
>BLACKHOLE-2.iana.org internet address = 188.8.131.52
>Your query will then be included in John's statistics. You BGP filters
>will not stop it.