F5F Stay Refreshed Power Users Networks There are issues when ISPs fail to terminate RFC1918 addresses.

There are issues when ISPs fail to terminate RFC1918 addresses.

There are issues when ISPs fail to terminate RFC1918 addresses.

I
Ikerpb
Junior Member
8
09-21-2016, 12:54 AM
#1
I explored the network path using a traceroute to those IPs, but the packets kept arriving until it stopped responding. My concern is whether this reveals any weaknesses or exploits. RFC1918 private ranges like 192.168.x.x are generally safe from external attacks since they're reserved and not publicly routable.
I
Ikerpb
09-21-2016, 12:54 AM #1

I explored the network path using a traceroute to those IPs, but the packets kept arriving until it stopped responding. My concern is whether this reveals any weaknesses or exploits. RFC1918 private ranges like 192.168.x.x are generally safe from external attacks since they're reserved and not publicly routable.

C
Conor_Playz
Member
161
09-23-2016, 09:52 PM
#2
Observing the outcome reveals significant flaws in the implementation. A traceroute simply displays ICMP packets with TTL values rising at each hop. When TTL hits zero, the packet is discarded and the router responds with an expired TTL message. Interfaces may appear to support multiple IP addresses, but since responses are self-generated, they're incorrectly routed through interfaces using their main IP as the source. This isn't inherently problematic, but it reflects poor design for any interface exposed publicly. RFC1918 addresses are meant for private use and shouldn't be routable outside that scope. It's not about public exposure—it's about ensuring a consistent global primary IP is always used.
C
Conor_Playz
09-23-2016, 09:52 PM #2

Observing the outcome reveals significant flaws in the implementation. A traceroute simply displays ICMP packets with TTL values rising at each hop. When TTL hits zero, the packet is discarded and the router responds with an expired TTL message. Interfaces may appear to support multiple IP addresses, but since responses are self-generated, they're incorrectly routed through interfaces using their main IP as the source. This isn't inherently problematic, but it reflects poor design for any interface exposed publicly. RFC1918 addresses are meant for private use and shouldn't be routable outside that scope. It's not about public exposure—it's about ensuring a consistent global primary IP is always used.

A
Argile
Member
53
09-23-2016, 11:00 PM
#3
The router is discarding packets intentionally or due to a lack of destination information, which is why you're seeing them.
A
Argile
09-23-2016, 11:00 PM #3

The router is discarding packets intentionally or due to a lack of destination information, which is why you're seeing them.

N
Nynhow
Member
199
09-25-2016, 06:17 AM
#4
It's sending a packet because of TTL or Time To Live limits. This rule was designed to stop packets from circling endlessly. Each time a router forwards a packet, its count reduces by one. When it hits zero, it's marked as invalid and discarded, and a reply goes back to the sender.
N
Nynhow
09-25-2016, 06:17 AM #4

It's sending a packet because of TTL or Time To Live limits. This rule was designed to stop packets from circling endlessly. Each time a router forwards a packet, its count reduces by one. When it hits zero, it's marked as invalid and discarded, and a reply goes back to the sender.

A
AA_Esser
Member
181
09-29-2016, 12:25 PM
#5
This behavior is consistent across the same provider each time.
A
AA_Esser
09-29-2016, 12:25 PM #5

This behavior is consistent across the same provider each time.

D
DutchManiak
Member
161
09-29-2016, 01:59 PM
#6
This approach makes logical sense. Traceroute continues to add one hop at a time until it hits the target. Based on your setup, you might encounter 2–3 or even 6 different providers along the way. Ultimately, you'll hit a *timeout* indicating the destination isn't responding to ICMP packets.
D
DutchManiak
09-29-2016, 01:59 PM #6

This approach makes logical sense. Traceroute continues to add one hop at a time until it hits the target. Based on your setup, you might encounter 2–3 or even 6 different providers along the way. Ultimately, you'll hit a *timeout* indicating the destination isn't responding to ICMP packets.

M
Maliwan99
Senior Member
346
09-29-2016, 02:21 PM
#7
This approach aligns with expectations. I hadn't considered that final step when trying to connect to an upstream provider's router that isn't responding to ICMP.
M
Maliwan99
09-29-2016, 02:21 PM #7

This approach aligns with expectations. I hadn't considered that final step when trying to connect to an upstream provider's router that isn't responding to ICMP.

_
_Esperanza_
Junior Member
7
09-29-2016, 10:01 PM
#8
You recently tested with a different provider, and the traceroute finished within that same ISP as the previous day.
_
_Esperanza_
09-29-2016, 10:01 PM #8

You recently tested with a different provider, and the traceroute finished within that same ISP as the previous day.

T
57
09-30-2016, 09:37 PM
#9
It's likely you're verifying performance on the same network interface. I'm just trying to figure out your goal.
T
TheBrickMonkey
09-30-2016, 09:37 PM #9

It's likely you're verifying performance on the same network interface. I'm just trying to figure out your goal.

G
GT_Sven
Junior Member
2
10-02-2016, 10:09 AM
#10
They differ yet the one I checked today falls within the 192.168.X.X range. The ISP that tracked the routes was Cogent. I rechecked since I was tired and switched to a different provider.
G
GT_Sven
10-02-2016, 10:09 AM #10

They differ yet the one I checked today falls within the 192.168.X.X range. The ISP that tracked the routes was Cogent. I rechecked since I was tired and switched to a different provider.