-----BEGIN PGP SIGNED MESSAGE-----

Juan Rodriguez Hervella wrote:

> On Saturday 11 October 2003 08:46, Leif Johansson wrote:
> > -----BEGIN PGP SIGNED MESSAGE-----
> > Hash: SHA1
> >
> > Iljitsch van Beijnum wrote:
> > <snip>
> >
> > | This is based on the assumption that leaking RFC 1918 routing
> > | information or packets with RFC 1918 source or 
> destination addresses is
> > | actually harmful in and of itself. This is a broken assumption. If
> >
> > Tell that to the root zone operators and brace for the reaction.
> >
> 
> Hello Leif,
> 
> Do you know what are the problems that *root zone operators* are 
> experiencing with RFC 1918 addresses ? It would be very interesting
> if you could explain (to me) some of these issues... I don't see why
> this kind of addresses could be a problem, as long as they
> don't use them....

You might want to read http://www.as112.net/

Quote: "Because most answers generated by the Internet's root name server system are 
negative, and many of those negative answers are in response to PTR queries for 
RFC1918 and other ambiguous addresses"

And that is only queries, you don't want to know how many RFC1918
sourced addresses they are dropping, can't send an icmp back now can you :)

Greets,
 Jeroen

-----BEGIN PGP SIGNATURE-----
Version: Unfix PGP for Outlook Alpha 13 Int.
Comment: Jeroen Massar / [EMAIL PROTECTED] / http://unfix.org/~jeroen/

iQA/AwUBP4qwRSmqKFIzPnwjEQIE0ACfcrujaQk7SyBxV2fzsTS7i2gDyZ4An0DE
W9rVGRsLWATtHaVMhbhlpLAz
=u790
-----END PGP SIGNATURE-----


--------------------------------------------------------------------
IETF IPv6 working group mailing list
[EMAIL PROTECTED]
Administrative Requests: https://www1.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to