[H-GEN] RFC-1918 : Class C Networks.

Andrew Meaden ameaden at optusnet.com.au
Thu Sep 8 20:57:55 EDT 2005


>> > you look up fremantle.binke.com.au, you will see that it's IP address 
>> > is
>> > 192.168.4.3 - unreachable from most of the internet, but over our 
>> > VPN's,
>> > perfectly reachable.
>> So bogus answers ae being handed out to the 'net at large.  Better to
>> prevent anyone from getting knowledge about fremantle.binke.com.au
>> (apparently an internal host) if they don't need it.
> Not to mention that (a) you are giving away a fair amount of information
> about how your internal network is set up; and (b) an attacker could
> host a convenient wireless network assigning addresses in the
> 192.168.4.0/24 network and spoof fremantle by setting up dummy services.

As I said, the host isn't internal at all, it's in a colo facility far away. 
The VPN's that connect into the VPN server (physically located here) are 
from various parts of the internet, and we don't have control over the DNS 
from some of these networks. We could simply force these users to 
reconfigure their DNS I suppose, but most of these simply use the IP handed 
to them by their ISP when they connect to the internet. I know our setup 
pushes various routes to the VPN clients, I imagine it would have a facility 
to attach extra nameserver information to the virtual interfaces it uses for 
connectivity. Well worth a look in, in any case.

The actual network the machine lives on is not internal at all, it's a 
completely seperate subnet running between 3 hosts physically located in a 
colo facility. 2 of the machines are publicly accessible through another 
network they're connected to (and this one is connected to the live 
internet) in addition to their internal network connectivity. The machine is 
pretty much entirely dedicated to serving as a backup host for the other 2 
machines. It's not an internal host, it just isn't deserving of a real world 
IP :)

-- Andrew 






More information about the General mailing list