North American Network Operators Group Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical Re: Internet vulnerabilities
On Fri, 5 Jul 2002 05:22:29 -0700 "Barry Raveendran Greene" <[email protected]> wrote: > > > FYI - for those scratching their heads on "anycast" ..... > > I just pushed out a paper on anycast by Chris Metz. Good foundation > material. > > http://www.cisco.com/public/cons/isp/essentials/ip-anycast-cmetz-03.pdf > Thanks - and the AS112 project seems to use static BGP spoofing, where different locations announce the address via different paths : "As a way to distribute the load for RFC1918-related queries, we use IPv4 anycast addressing. The address block is 192.175.48.0/24 and its origin AS is 112. This address block is advertised from multiple points around the Internet, and these distributed servers coordinate their responses and back end statistical analyses." Marshall > > -----Original Message----- > > From: [email protected] [mailto:[email protected]]On Behalf Of > > Bill Woodcock > > Sent: Friday, July 05, 2002 4:56 AM > > To: Marshall Eubanks > > Cc: [email protected] > > Subject: Re: Internet vulnerabilities > > > > > > > > > But the only IPv4 anycast > > > that I know of does use MSDP : > > > > > http://www.ietf.org/internet-drafts/draft-ietf-mboned-anycast-rp-08.txt > > > Is there a different proposal ? What's the RFC / I-D name ? > > > > You seem to be confusing anycast with something complicated. It's not a > > protocol, it's a method of assigning and routing addresses. > > > > -Bill > > > > > > >
|