>Someone suggested (I forget who, but tks all the same) that it might be a
>defrag problem so I went to look at the firewall logs and indeed there
>were ICMP defrag packets, but from RFC1918 addresses, so they were being
>blocked by the firewall.
>
>I have a strict firewall policy of blocking any packet with an RFC1918
>address, whether source or destination, or an inbound packet with a source
>address from the site assigned IP block, or an outbound packet to a
>destination address from the site assigned IP block.

Which is a good idea.

I am aware of an ISP who runs all of their router interfaces using 
point-point links (where you or I would just throw a /29 or /30 at it and 
be done with it) on RFC1918 address space.  They don't think this is a 
problem.  I do.  Same sorts of problem.

Most backbone providers block RFC1918 addresses at various points along the 
way.  Solution is to tell those people who have put in kludges to fix them.

>My question is: Should I stick with that strict policy, or am I safe in
>relaxing it for ICMP messages just to suit inconsiderate ISPs who refuse
>to comply with RFC1918?

IMHO no.  Other less-relaxing-than-you backbone providers will block this 
traffic anyway - so you allowing it will only fix the problem where the 
source of the private address space is close enough to you that there isn't 
a sink hole in the middle.

Seen this same problem before anyway.  Only solution is to "fix" it.  :-)

Cheers,

John



-- 
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://slug.org.au/lists/listinfo/slug

Reply via email to