Bernd Eckenfels [mailto:ecki@lina.inka.de] wrote: > On Mon, Dec 23, 2002 at 11:39:24PM +0100, Jeroen Massar wrote: > > Usually, as far as I know on any linux kernel sporting v6 one will > > see something similar to: > > > > 8<----------- > > 3ffe:4007:1:1::/64 dev eth0 proto kernel metric 256 expires > > 2591946sec mtu 1500 advmss 1440 > > fe80::/10 dev eth0 proto kernel metric 256 mtu 1500 advmss 1440 > > ff00::/8 dev eth0 proto kernel metric 256 mtu 1500 advmss 1440 > > default via fe80::230:7bff:fe19:f400 dev eth0 proto kernel > metric 1024 > > expires 1746sec mtu 1500 advmss 1440 > > unreachable default dev lo metric -1 error -101 > > ------------>8 > > yes hopefully it is enough to insert device routes on route > configuration, > who ever is doing that (kernel or boot scripts). But there is > a risk that somebody removes them :) > > On the other hand it is not realy a big issue. Just like the > ipv4 reserved networks ISPs need to block them, anyway. It's easier than that even, they should only allow packets with addresses sourced in their own prefixes. Hope we can force some of that in IPv6 world, though I don't quite believe it, certainly with the current network of tightly messed tunnels, especially in the 6bone space. Most isp's (tunnelbrokers) allow any source in the tunneled packets, causing free 'transit' and a very hard way to trace down abusive sources as packets flow over multiple routes accross the world. As seen in the IPv4 world, RPF and others is really not that common :( Greets, Jeroen - : send the line "unsubscribe linux-net" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html