f



Ip-Address 1.1.1.1

A traceroute to 213.176.224.4 showed following results:

# traceroute -In -m10 213.176.224.4
traceroute to 213.176.224.4 (213.176.224.4), 10 hops max, 38 byte packets
 1  212.152.136.1  103.658 ms  99.452 ms  109.767 ms
 2  212.152.151.2  99.646 ms  99.680 ms  99.821 ms
 3  62.218.1.93  99.689 ms  109.665 ms  99.751 ms
 4  212.152.192.182  99.762 ms  1359.690 ms  99.718 ms
 5  193.203.0.72  104.398 ms  105.014 ms  109.781 ms
 6  146.188.2.229  109.696 ms  109.733 ms  99.771 ms
 7  146.188.14.113  119.710 ms  199.720 ms  209.720 ms
 8  146.188.49.194  119.695 ms  129.663 ms  119.808 ms
 9  1.1.1.1  109.731 ms  129.672 ms  119.772 ms
10  * * *

1.1.1.1?

I thought that 1.0.0.0/8 is reserved by iana according to:
http://www.iana.org/assignments/ipv4-address-space

or do I understand something wrong here?

thx

Leopold

0
Leopold
2/7/2005 7:24:36 PM
comp.protocols.tcp-ip 4448 articles. 0 followers. Post Follow

5 Replies
1423 Views

Similar Articles

[PageSpeed] 32

In article <pan.2005.02.07.19.19.33.29091@utanet.at>,
Leopold Schweighofer  <leos@utanet.at> wrote:
:A traceroute to 213.176.224.4 showed following results:
: 8  146.188.49.194  119.695 ms  129.663 ms  119.808 ms
: 9  1.1.1.1  109.731 ms  129.672 ms  119.772 ms

:I thought that 1.0.0.0/8 is reserved by iana according to:
:http://www.iana.org/assignments/ipv4-address-space

:or do I understand something wrong here?

No you are correct. It appears what has happened is that 
UUNet/PIPEX have a NATing device attached to them
which has been set with an outside IP of 1.1.1.1.
That works fine for receiving traffic, and the device
might well work fine for passing on inside traffic
to the outside (it might have an public IP assigned for
that). What a lot of people implimenting NAT forget about
is the case where a packet is generated by the NAT device
itself -- a packet such as an ICMP Unreachable or
ICMP TTL Exceeded: such packets end up going out onto
the net with the private/reseved IP address unless
someone takes care at the next hop to map that private
IP into a public IP.
-- 
This signature intentionally left... Oh, darn!
0
roberson
2/7/2005 7:38:53 PM
Am Mon, 07 Feb 2005 19:38:53 +0000 schrieb Walter Roberson:

> What a lot of people implimenting NAT forget about
> is the case where a packet is generated by the NAT device
> itself -- a packet such as an ICMP Unreachable or
> ICMP TTL Exceeded: such packets end up going out onto
> the net with the private/reseved IP address unless
> someone takes care at the next hop to map that private
> IP into a public IP.

So I get some information from the nat-device which I
should not get, because of bad configuration.
An they don't use an private Ip-Address according
to rfc1918 as they should?

Thanks for your answer

Leopold


0
Leopold
2/7/2005 7:53:10 PM
In article <pan.2005.02.07.19.53.09.273926@utanet.at>,
Leopold Schweighofer  <leos@utanet.at> wrote:
:Am Mon, 07 Feb 2005 19:38:53 +0000 schrieb Walter Roberson:

:> What a lot of people implimenting NAT forget about
:> is the case where a packet is generated by the NAT device
:> itself -- a packet such as an ICMP Unreachable or
:> ICMP TTL Exceeded:

:So I get some information from the nat-device which I
:should not get, because of bad configuration.

Right.

:An they don't use an private Ip-Address according
:to rfc1918 as they should?

RFC1918 IPs are -better- because the those IP ranges are 
specifically designated as being private.

Within the confines of your own network, you can use -any- IP address
range that isn't functionally interpreted as having special meaning by
the hardware [e.g., 127.0.0.1 or 255.255.255.255 or 224.0.0.*
multicast]. The difficulty with using an IP such as 1.1.1.1 is that
at some point ARIN might allocate it to a -real- network, and
your network might need to talk to that real network at some point,
which would leave you with difficulties. Thus using a "reserved"
ARIN range is not a good long-term strategy... but you aren't going
to be slapped with a fine from the House Committee on Illicit Internet
Activities if you use a "reserved" IP internally and never let it
get outside your own network.

-- 
   Most Windows users will run any old attachment you send them, so if
   you want to implicate someone you can just send them a Trojan
   -- Adam Langley
0
roberson
2/7/2005 8:19:11 PM
Am Mon, 07 Feb 2005 20:19:11 +0000 schrieb Walter Roberson:



> Within the confines of your own network, you can use -any- IP address
> range that isn't functionally interpreted as having special meaning by
> the hardware [e.g., 127.0.0.1 or 255.255.255.255 or 224.0.0.*
> multicast]. The difficulty with using an IP such as 1.1.1.1 is that
> at some point ARIN might allocate it to a -real- network, and
> your network might need to talk to that real network at some point,
> which would leave you with difficulties. Thus using a "reserved"
> ARIN range is not a good long-term strategy... but you aren't going
> to be slapped with a fine from the House Committee on Illicit Internet
> Activities if you use a "reserved" IP internally and never let it
> get outside your own network.

Okay - I see!
In the firm I work they used the Range 192.48.0.0/24
- it worked, but it was not beautiful.
(they changed it to 192.168.0.0/16
and 10.10.10.0/24)

But back to Address 1.1.1.1 - is there any way to
get the Ip-Address this device uses for SNAT?

I think of the nat-device of somthing like a firewall
or load-balance-box, why should this device have an Ip of
1.1.1.1 on the outside?

thx for your answer

Leopold




0
Leopold
2/7/2005 8:38:18 PM
In article <pan.2005.02.07.20.38.16.995082@utanet.at>,
Leopold Schweighofer  <leos@utanet.at> wrote:
:But back to Address 1.1.1.1 - is there any way to
:get the Ip-Address this device uses for SNAT?

I don't recognize the abbreviation SNAT ? Simple Network Address
Translation? Source Network Address Translation? If it has a network
behind it, it could potentially have a whole set of public IPs,
some of which might bear absolutely no resemblence to the IP address
that was being traceroute'd.

:I think of the nat-device of somthing like a firewall
:or load-balance-box, why should this device have an Ip of
:1.1.1.1 on the outside?

Firewalls often have the requirement that the outside IP be in
a different subnet than the inside IP. If one wishes to uses public
IPs on the inside, then one has an addressing problem: the router
and the firewall have to communicate, but the only available public
IP range might be the one that is on the inside interface of the firewall
and thus not available for use on the outside. One can use tactics
such as subnetting the public IP range, but that doesn't always work
out very well. A degenerate case of this is the situation in which
there is only a single public IP and the firewall admin wants packets
addressed to that public IP to be passed to an inside device that
is using that public IP.

A work-around for this situation is to use a private IP range to
communicate between the router and the firewall, with the public IP
range being -routed- to the private IP by the router. And this is
perfectly acceptable in the general sense; there is no requirement
that the hops in a path cannot be routed over RFC1918 IPs: RFC1918
just requires that packets with those internal IP addresses are not
allowed to escape to the Internet.

Therefore, if one uses an RFC1918 "carrier" network between a publically
reachable device an a device further in that will be handling public IPs,
then one should configure the outer router to NAT the private IPs into
acceptable public IPs for any packet that can be generated at the
inner device itself, such as ICMP TTL-Exceeded. But many people
don't think of doing that hiding of the private IP one hop outwards:
they are concentrating so hard on people not getting into their internal
network that they forget that their security gateway might -itself-
generate traffic.
-- 
If a troll and a half can hook a reader and a half in a posting and a half, 
how many readers can six trolls hook in six postings?
0
roberson
2/7/2005 9:30:04 PM
Reply:

Similar Artilces:

1 - 1, 1 -1, 1-1, 1
Hi, I have a question regarding lexical analysis. I recently came across a bug in our lexical analyser in phc (www.phpcompiler.org), that I am unsure how to solve. This is the problem: our current definition for integer constant looks something like INT ([1-9][0-9]*)|0 In particular, note that it does not allow for an (optional) "+" or "-" at the start of the integer. This means that the strings "1 - 1", "1 -1" and "1-1" all generate the same sequence of three tokens INT(1), OP(-), INT(1), for which the syntax analyser generates the subtree BIN_OP(-, 1, 1). For the string "1 - -1", the lexer (unsurprisingly) generates INT(1), OP(-), OP(-), INT(1). The syntax analyser recognises this as BIN_OP(1, UNARY_OP(-, 1)). In other words, the second "-" is treated as a unary operator, rather than as part of the number. This works fine, with the sole exception of the number "-2147483648". The problem is, of course, overflow: -2147483648 is a valid negative number (assuming 32-bit numbers), but the integer 2147483648 is _not_ a valid positive number. Thus, the above method of dealing with "-" as a unary operator breaks down. The solution is to interpret the "-" as part of the number, and generate INT(-2147483648), rather than OP(-), INT(...). However, changing the definition of INT to INT [+-]?([1-9][0-9]*)|0 causes "1-1" to be recognised as INT(1), INT(-1), which is...

1.1.1.1 ?
hi my firewall logs dropped packets from an internal IP address trying to contact 1.1.1.1 through port 9999. Any ideas whether 1.1.1.1 is valid IP? and what is port 9999?? thanks mike wrote: > hi > > my firewall logs dropped packets from an internal IP address trying to > contact 1.1.1.1 through port 9999. Any ideas whether 1.1.1.1 is valid > IP? and what is port 9999?? > thanks These trojans *BlitzNet*, *Backdoor.Oracle*, *Backdoor.Spadeace* uses port 9999 -- S.S. "StarScripter" <Star@privacy.net> wrote in message news:<bv8ejj$p54t3$1@ID-185702.new...

plot 1, -1, 1, -1, -1
Hi, How to plot those numbers in a rectangle style? thanks x = linspace(-4*pi,4*pi,1000); y = sin(x); plot(x,sign(y)), axis([-12 12 -2 2]) PZ <patrick.zou@gmail.com> wrote in message <d64c545f-f2ac-4f87-af89-051bda896707@x6g2000vbg.googlegroups.com>... > Hi, > > How to plot those numbers in a rectangle style? > > thanks help stairs stairs([-1 1 -1 1 -1 1]) hth Jos ...

ERROR IN EXPRESSION; -1 - (-1) not 1
The expression isn't a = 1 - (1-), but: a = -1 - (1) der <der@noemail.com> scribbled the following: > The expression isn't a = 1 - (1-), but: a = -1 - (1) Ah, that's different, then. Then the answer is: The result will be -2. You have *no* guarantees about which of -1 or (1) is evaluated first, but as they don't have side effects, you don't have to care. -- /-- Joona Palaste (palaste@cc.helsinki.fi) ---------------------------\ | Kingpriest of "The Flying Lemon Tree" G++ FR FW+ M- #108 D+ ADA N+++| | http://www.helsinki.fi/~palaste W++ B OP+ | \----------------------------------------- Finland rules! ------------/ "To doo bee doo bee doo." - Frank Sinatra ...

Alignment of foo[1][1][1][1]
Suppose I have type 'foo' and: sizeof (foo) == 16 alignof (foo) == 2 Suppose I have type 'foo[1][1][1][1]' and: sizeof (foo[1][1][1][1]) == 16 Can: alignof (foo[1][1][1][1]) == 4 ? I'd like to think not, but is it prohibited? If I do: typedef foo bar[1][1][1][1]; bar * my_bar = malloc(sizeof *bar); foo * my_foo = (foo *) my_bar; certainly 'my_bar' points to an object whose alignment satisfies type 'foo'. But what about the other way around? typedef foo bar[1][1][1][1]; foo * my_foo = malloc(sizeof *foo); bar * my_ba...

CDSB 1.1.1
CDSB 1.1.1 is available. More tools can be installed on FreeBSD. For example, Calibre, HSPICE, SpiceExplorer, etc. Get more information from CDSB Wiki: http://code.google.com/p/cdsb/w/list Group: cdsbgroup@googlegroups.com ...

slimKEYS 1.1.1
slimKEYS is a universal hotkey manager with a plug-in system that lets you perform an infinite number of actions simply by pressing system- wide hotkeys. It already comes with multiple built-in plug-ins: slimLAUNCH lets you open applications, documents or folders, or search for password entries stored securely, or open your del.icio.us posts simply by typing a few letters of their name or by directly assigning them specific hotkeys. slimSIZE lets you resize or move windows to any monitor and location just by pressing a hotkey. slimSEARCH helps you search on popular search engine...

DeepForm 1.1.1
DeepForm allows an analyst to create a document (named Model) that specifies the structure and the contents of the XML document containing the corporate data. DeepForm does not requires any knowledge of the XML format by the user. The data model creation The application allows the user to compone his own model using a quick and easy interface. The analyst can create his own model by simply combining the "basic" elements of DeepForm: * fields (customizables); * tables; * sections. DeepForm allows to create new models by using parts of other models pre...

RedNotebook 1.1.1
RedNotebook 1.1.1 has been released. You can get the tarball, the Windows installer and links to distribution packages at http://rednotebook.sourceforge.net/downloads.html What is RedNotebook? -------------------- RedNotebook is a **graphical journal** and diary helping you keep track of notes and thoughts. It includes a calendar navigation, customizable templates, export functionality and word clouds. You can also format, tag and search your entries. RedNotebook is available in the repositories of most common Linux distributions and a Windows installer is available. ...

htmldata 1.1.1
Bug-fix release of htmldata, fixes error when parsing whitespace inside tags. Description of the htmldata module, from its PyPI site: http://cheeseshop.python.org/pypi/htmldata/ "Extract and modify HTML/CSS URLs, translate HTML documents <-> list data structures. The htmldata module allows one to translate HTML documents back and forth to list data structures. This allows for programmatic reading and writing of HTML documents, with much flexibility. Functions are also available for extracting and/or modifying all URLs present in the HTML or stylesheets of a docu...

3DLDF Release 1.1.5 and 1.1.5.1
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Release of 3DLDF 1.1.5. 3DLDF is a GNU package for three-dimensional drawing with MetaPost output. It is available from http://ftp.gnu.org/gnu/3dldf and other ftp servers. Please see the author's website, http://wwwuser.gwdg.de/~lfinsto1 and http://www.gnu.org/directory/graphics/3D/3DLDF.html for more information. In release 1.1.5, I've tied up some loose ends. I wanted to do this before starting on the input routine. * Added `const real step' argument to the version of Ellipse::intersection_points()...

1--1
I don't understand why this works as expected: select * from games order by 2 but this doesn't: select * from games order by 1--1 The "order by" is completely ignored. On Wednesday January 21 2015 11:44, in comp.databases.mysql, "Kiuhnm Mnhuik" <gandalf23@mail.com> wrote: > I don't understand why this works as expected: > select * > from games > order by 2 > but this doesn't: > select * > from games > order by 1--1 > The "order by" is completely ignored. No, it isn...

both 1 and not-1?
Okay, maybe I'm getting too tired for tonight, but ... how can add_to_array *possibly* die with a filter violation (which it does)? Certainly, is_filtered doesn't modify $visit -- or does it? sub add_to_array{ my $self = shift; my $visit = shift; if ( not $self->is_filtered($visit) ){ if ( $self->is_filtered($visit) ){die ("FILTER VIOLATION\n");} } } sub is_filtered{ my $self = shift; my $visit = shift; while ( my ($field, $pattern) = each %{ $self->{_excludepatterns} } ){ if ( $visit->{$field} =~ $pattern){ return 1;...

-1, +1
Hi, How can I generate a random number as -1 or +1 in a loop TIA Try, A=rand(5,5); A(A>0.5)=1; A(A<=0.5)=-1; This makes a matrix of random +1/-1 you can probably get what you need from this... Volvo wrote: > > > Hi, > > How can I generate a random number as > > -1 or +1 in a loop > > TIA > > > On Sun, 02 Nov 2003 14:03:30 -0500, Dan Ennis wrote: > Try, > > > A=rand(5,5); > A(A>0.5)=1; > A(A<=0.5)=-1; A shorter version would be A=sign(2*rand(5)-1); A(A==0)=1; % or however you want to assign it. Of cou...

i++, ++i, i+=1 and i = i+1;
Hello, let say we have; 1) i++; /* use i and increment by one */ 2) ++i; /* increment i by one and use it */ 3) i += 1; 4) i = i+1; result (for value of i) of all 4 will be same; could anyone tell differences among them from any perspectives? I heard we'd better use 2) over 1). And 1) is faster than 3) or 4). Thanks in advance, jim said: > Hello, > let say we have; > > 1) i++; /* use i and increment by one */ > 2) ++i; /* increment i by one and use it */ > 3) i += 1; > 4) i = i+1; > > result (for value of i) of all 4 will be same; could anyone...

Evaluation of 1/(1/a + 1/b + 1/r)
Folks, I am trying to write a program to evaluate the sum of two continued fractions, written in polynomials of T. I would like a short routine to evaluate 1/(1/a + 1/b + 1/r), just working with a, b, and r if they are not equal to zero. So, if a = 0, then evaluate 1/(1/b + 1/r) If a, b, = 0, then evaluate 1/r If all of a, b, r = 0, give me 0 as output. If (1/a + 1/b + 1/r) = 0, give me 0 as output. Assume that a, b, r are arbitrary polynomials in T. Can someone help? Thanks, Diana Clear[f]; f[a_,b_,r_]:=0/;a==b==r==0; f[a_,b_,r_]:=1/Total[ 1/Sele...

OO 1.1 and java 1.3.1
Am attempting to install OO 1.1, but with just Java 1.3.1, and the install documentation says that without at least 1.4.1, I cannot make use of full capabilties. I infer from this that I should be able to OO crippled. However, However, OO does not like it when I point to my 131 JRE. Comments? -- Sir: David I. Smith wrote: > Am attempting to install OO 1.1, but with just Java 1.3.1, and the > install documentation says that without at least 1.4.1, I cannot make > use of full capabilties. I infer from this that I should be able to > OO crippled. However, However, OO...

IMDbPY 4.1 and IMDbPYKit 1.1.1
IMDbPY 4.1 and IMDbPYKit 1.1.1 are available (tgz, deb, rpm, exe) from: http://imdbpy.sourceforge.net/ IMDbPY is a Python package useful to retrieve and manage the data of the IMDb movie database about movies, people, characters and companies. IMDbPYKit (mostly developed by H. Turgut Uyar) is a web interface to IMDbPY, able to serve its output both in HTML and XML. With this release, a DTD for the XML output was formalized and support for i18n was introduced. A lot of bugs were fixed. Platform-independent and written in pure Python (and few C lines), IMDbPY can retrieve data...

printing to more than 1 printer on 1 IP address
Hi there, We have a number of customers that log in to our systems over a telnet connection. The IP-address where they are coming from can be different each time. At the moment a customer logs in we read it's IP-address and change the OutputQ accordingly so that we print to their IP address. For some of these customers the IP address does not change. They stay on the same place. Now we can address a printer to the IP-address of the customer. Printing works fine. By the way, we haven't had any intruder the past 10 years, so don't bother the fact that we do not use SSL. Now w...

JDK 1.3.1/1.4/1.5
How can you display JDialog without the Close on the Top Right in any of these versions(JDK 1.3.1/1.4/1.5). The only thing it displays is the close button X and I don't want that? Thank you! vnssoftware wrote: > How can you display JDialog without the Close on the Top Right in any > of these versions(JDK 1.3.1/1.4/1.5). The only thing it displays is > the close button X and I don't want that? > > Thank you! Dialog.setUndecorated() since 1.4 -- Knute Johnson email s/nospam/knute/ Molon labe... ...

modify date from 1/1/0001 to 1/1/1900 ?
Hi, migrating some Lotus Notes 6.5 DBs I found lots of dates that are set to 1/1/0001 12:00:00 AM. The new system only supports dates starting from 1/1/1900 12:00:00 AM, so I need to change the year 0001 to 1900 for several fields. What is the easiest way to change a field from 1/1/0001 12:00:00 AM to 1/1/1900 12:00:00 AM for all the rows in a nsf? Is there a tool that can help me do this or do I need to learn some scripting? thanks David Ok, I found some tools that can help edit fields in a notes db, like NoteMan and ezScan. As Notes newbie I'm having difficulties...

modify date from 1/1/0001 to 1/1/1900 ?
Hi, migrating some Lotus Notes 6.5 DBs I found lots of dates that are set to 1/1/0001 12:00:00 AM. The new system only supports dates starting from 1/1/1900 12:00:00 AM, so I need to change the year 0001 to 1900 for several fields. What is the easiest way to change a field from 1/1/0001 12:00:00 AM to 1/1/1900 12:00:00 AM for all the rows in a nsf? Is there a tool that can help me do this or do I need to learn some scripting? thanks David Ok, I found some tools that can help edit fields in a notes db, like NoteMan and ezScan. As Notes newbie I'm having difficulties...

1.1, 1.2, 1.3 are all goners now
It seems, well, it doesn't seem but it is, well, it seems that the subject version of Workbenches won't be any more these, versions of Workbench, but versions of Amix. The Amiga's go for the Network. :-)) Have you seen that CDTV on amiga.jorg? That kind od schalametry for games, like some high tech heavily classic games will be played... Heyyyaaa!!! p.s. some piece of equipment, eh.. CD, floppy, installable HD, all, joysticks, joypads for CDTV, playing CDs and playing games. It's like you'll need a high class massive wood shelf for this, the CDs and for the - :( r...

Meaning of 1:1, 1:1 generalization, 1:n, 1:n non identifying, n:m
Hi All, I've been taking a look at DB Designer 4, and looking through the documentation (http://www.fabforce.net/dbdesigner4/doc/index.html) I am a little unclear on some of their nomenclature: '1:1' - Ok, one to one. Got it. '1:1 generalization' - Don't know this. Obviously different somehow from one to one, but how? '1:n' - One to many, I assume. '1:n non identifying' - Nonidentifying? What does this mean? 'n:m' - Many to many? Again, not sure. Can anyone help clarify? Thanks! -Josh Joshua Beall wrote: > I...

Web resources about - Ip-Address 1.1.1.1 - comp.protocols.tcp-ip

IP address - Wikipedia, the free encyclopedia
An Internet Protocol address ( IP address ) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer ...

World IPv6 Day: Solving the IP Address Chicken-and-Egg Challenge
We’re announcing today our participation in World IPv6 Day , along with Google, Yahoo!, Akamai, Limelight Networks, and the Internet Society. ...

IP address - News, Features, and Slideshows
Latest news, features, and slideshows on IP address from Computerworld

What to do if someone steals your IP address
Sam Cook's ISP informed him that he has been downloading illegal material. He has done no such thing. He asked me to help him solve this problem. ...

IP address - News, Features, and Slideshows
Latest news, features, and slideshows on IP address from TechWorld

ASIC accidentally blocked 250,000 websites due to 'basic' IP address misunderstanding
ASIC reveals access to 250,000 websites was blocked after its staff failed to understand IP addresses.

Cops nab fugitives in Cabo San Lucas by tracking Spotify IP address
Missing kids found, reunited with parents in Colorado.

China IP address link to South Korea cyber-attack
South Korean officials say unidentified hackers used a Chinese IP address to launch a massive cyber attack on banks and media firms on Wednesday. ...

Display your external IP address on the desktop with Mr.IP
Discovering your external IP address is generally very easy. Just visit a site like WhatIsMyIP and it'll give you the IP address, location, ISP, ...

Security flaw can expose your real IP address when using a VPN
Virtual private networks (VPNs) are supposed to help users protect their online privacy. VPN services obfuscate the user’s real IP address by ...

Resources last updated: 3/1/2016 11:03:21 PM