What stops someone from configuring their network with IP addresses they do not own?












13















Here's the scenario. I was picturing a university that bought a range of IP addresses. I think they'd still be inside a ISP (right?), but they'd have freedom to configure stuff the way they wanted.



What stops them from attributing their routers and hosts already in use IP addresses?



And what would happen if indeed someone do this?










share|improve this question









New contributor




Tiago Oliveira is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
















  • 3





    Universities were the original ISPs. The Internet was a collaborative academic/government experiment. In fact, the public Internet is simply a bunch of ISPs peering with other ISPs of their own choosing. The government, looking for a way to keep communications going in the event of a disaster (e.g. nuclear war, among other things), funded the universities and the telco (at the time AT&T, not the one you know today, which was the only real telco) to devise a method to maintain communications when a path was destroyed, and it resulted in packet switching and the Internet.

    – Ron Maupin
    17 hours ago











  • In the UK, for example, JISC oversees network allocations for universities.

    – OrangeDog
    12 hours ago
















13















Here's the scenario. I was picturing a university that bought a range of IP addresses. I think they'd still be inside a ISP (right?), but they'd have freedom to configure stuff the way they wanted.



What stops them from attributing their routers and hosts already in use IP addresses?



And what would happen if indeed someone do this?










share|improve this question









New contributor




Tiago Oliveira is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
















  • 3





    Universities were the original ISPs. The Internet was a collaborative academic/government experiment. In fact, the public Internet is simply a bunch of ISPs peering with other ISPs of their own choosing. The government, looking for a way to keep communications going in the event of a disaster (e.g. nuclear war, among other things), funded the universities and the telco (at the time AT&T, not the one you know today, which was the only real telco) to devise a method to maintain communications when a path was destroyed, and it resulted in packet switching and the Internet.

    – Ron Maupin
    17 hours ago











  • In the UK, for example, JISC oversees network allocations for universities.

    – OrangeDog
    12 hours ago














13












13








13


1






Here's the scenario. I was picturing a university that bought a range of IP addresses. I think they'd still be inside a ISP (right?), but they'd have freedom to configure stuff the way they wanted.



What stops them from attributing their routers and hosts already in use IP addresses?



And what would happen if indeed someone do this?










share|improve this question









New contributor




Tiago Oliveira is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.












Here's the scenario. I was picturing a university that bought a range of IP addresses. I think they'd still be inside a ISP (right?), but they'd have freedom to configure stuff the way they wanted.



What stops them from attributing their routers and hosts already in use IP addresses?



And what would happen if indeed someone do this?







router ip network internet ip-address






share|improve this question









New contributor




Tiago Oliveira is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.











share|improve this question









New contributor




Tiago Oliveira is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.









share|improve this question




share|improve this question








edited yesterday







Tiago Oliveira













New contributor




Tiago Oliveira is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.









asked yesterday









Tiago OliveiraTiago Oliveira

12927




12927




New contributor




Tiago Oliveira is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.





New contributor





Tiago Oliveira is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.






Tiago Oliveira is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.








  • 3





    Universities were the original ISPs. The Internet was a collaborative academic/government experiment. In fact, the public Internet is simply a bunch of ISPs peering with other ISPs of their own choosing. The government, looking for a way to keep communications going in the event of a disaster (e.g. nuclear war, among other things), funded the universities and the telco (at the time AT&T, not the one you know today, which was the only real telco) to devise a method to maintain communications when a path was destroyed, and it resulted in packet switching and the Internet.

    – Ron Maupin
    17 hours ago











  • In the UK, for example, JISC oversees network allocations for universities.

    – OrangeDog
    12 hours ago














  • 3





    Universities were the original ISPs. The Internet was a collaborative academic/government experiment. In fact, the public Internet is simply a bunch of ISPs peering with other ISPs of their own choosing. The government, looking for a way to keep communications going in the event of a disaster (e.g. nuclear war, among other things), funded the universities and the telco (at the time AT&T, not the one you know today, which was the only real telco) to devise a method to maintain communications when a path was destroyed, and it resulted in packet switching and the Internet.

    – Ron Maupin
    17 hours ago











  • In the UK, for example, JISC oversees network allocations for universities.

    – OrangeDog
    12 hours ago








3




3





Universities were the original ISPs. The Internet was a collaborative academic/government experiment. In fact, the public Internet is simply a bunch of ISPs peering with other ISPs of their own choosing. The government, looking for a way to keep communications going in the event of a disaster (e.g. nuclear war, among other things), funded the universities and the telco (at the time AT&T, not the one you know today, which was the only real telco) to devise a method to maintain communications when a path was destroyed, and it resulted in packet switching and the Internet.

– Ron Maupin
17 hours ago





Universities were the original ISPs. The Internet was a collaborative academic/government experiment. In fact, the public Internet is simply a bunch of ISPs peering with other ISPs of their own choosing. The government, looking for a way to keep communications going in the event of a disaster (e.g. nuclear war, among other things), funded the universities and the telco (at the time AT&T, not the one you know today, which was the only real telco) to devise a method to maintain communications when a path was destroyed, and it resulted in packet switching and the Internet.

– Ron Maupin
17 hours ago













In the UK, for example, JISC oversees network allocations for universities.

– OrangeDog
12 hours ago





In the UK, for example, JISC oversees network allocations for universities.

– OrangeDog
12 hours ago










5 Answers
5






active

oldest

votes


















19














Most likely if they're a big university they are their own ISP, using BGP to connect their network to the internet via a number of upstream networks.



Nothing stops them from using IP addresses they should not be using, and it would work in their local network. However, it won't work on the internet. Their upstream networks providing them connectivity should have filters in place which would only allow the university to advertise IP addresses assigned to them. If the direct upstreams wouldn't filter them, the upstreams' upstreams will. And if IP addresses which are in use by another network would be used by the university, that other network would become unreachable from the university network.



In addition, there are a number of project (for example RIPE RIS and BGPmon) which monitor routing tables and alert on any "illegal" IP advertisement (BGP Hijacks and routing anomalies).






share|improve this answer



















  • 7





    Sadly even today should have still doesn't mean have

    – Josef
    11 hours ago






  • 3





    @Josef To be fair, BGP was built in a time of "implicit trust" -- every internet node owner knew every other internet node owner, so they knew who owned what and there were social consequences for hijacking. BGP was never really designed to be "secure", it was just designed to work.

    – 202_accepted
    9 hours ago






  • 1





    ISPs have generally gotten better at filtering BGP, because there have been some well-publicized major outages due to someone (intentionally or accidentally) advertising a bogus route.

    – Barmar
    6 hours ago











  • I would add that they would probably get balckholed by their neighbors.

    – PEdroArthur
    4 hours ago



















7














Nothing will stop them using the addresses on their own machines.



What happens if they try to advertise them to the Internet depends on how sloppy their providers are. If their providers are following best practices then there will be filters in place and the advertisements won't get beyond the hijacker's borders.



OTOH if their providers and their providers providers are sloppy then a bogus announcement can go much further resulting in significant disruption to the legitimate owners of the IP space.



Such happenings will almost certainly get noticed and there will likely be some heated discussions and some extra filtering added.






share|improve this answer































    3















    What stops them from attributing their routers and hosts already in use IP addresses?




    Nothing. Over the years, I have seen both organizations of all sizes, both public and private, do this including a world wide recognized "brand" company. In fact, I have seen this more often in business settings than university settings (largely due to the fact that more universities were involved in the Internet earlier and helped define the standards and best practices used today).




    And what would happen if indeed someone do this?




    Today, likely nothing other than the organization not being able to reach portions of the Internet that they overlap. In the past, this type of thing has caused serious issues, including "breaking the Internet" for some or many users (in one case, a single ISP accidentally propagated a default route to the Internet overloading their own network as much of the Internet traffic tried to route through them).



    Past incidents like the ones you propose became learning opportunities and resulted in best practices that include protections from this type of misconfiguration. Most often today, providers implement BCP38/RFC2827 to filter traffic to connected organizations to only the IP address they should be advertising.



    Some providers still also implement bogon filtering which when properly maintained helps to prevent traffic from IP space that no valid traffic should be coming from (i.e. private address ranges, unassigned IP space, etc). While the IPv4 bogon list is much smaller today that in the past (i.e. most IPv4 addresses are now assigned), the IPv6 bogon list can be still be quite useful, especially on large providers to limit the scope of IP squatting (i.e. using unassigned IP space).






    share|improve this answer































      2














      Suppose I have two machines.
      I assign the address 1.2.3.4 to one and 1.2.3.5 to the other.
      I don't own these addresses.



      As long as I don't try to the Internet, these two machine can talk to each other without any problems.



      Now I connect to the Internet. The other answers talk about filters blocking things, but let us ignore that for a moment.



      My machine 1.2.3.4 tries to connect to some legitimate address, like 12.34.56.78. Assume that this address exists and is controlled by its proper owner.



      So, my machine sends a packet:



      From 1.2.3.4, To: 12.34.56.78, Content: Want to be friends? (Translated into human)



      The routers look at the To: part and correctly delivers it to 12.34.56.78. This machine suspects nothing and complies an answer



      From: 12.34.56.78, To: 1.2.3.4, Content: Sure, let's be friends!



      Now comes to problem. This answer will never be delivered to you. Instead it will be delivered to the real 1.2.3.4, who will become very confused.



      So, if you use a wrong address, you can talk to the Internet, but the Internet will never answer you.






      share|improve this answer








      New contributor




      Stig Hemmer is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.
















      • 2





        "the Internet will never answer you" if you advertise the bogus addresses over BGP and noone blocks your announcements then large parts of the internet may very well answer you, at least until someone realises what is going on.

        – Peter Green
        10 hours ago






      • 1





        Any decent ISP will implement BCP38 so your attempt to "talk to the internet" will end in their anti-spoofing filter.

        – Teun Vink
        9 hours ago



















      0














      It would internally black out large swatches of the Internet



      Sure. Let's say they do the common thing of using private IP addresses internally to their network, such as 10.x.x.x... You know the drill, network address translation at the edge of their network, just like your home network.



      Except they decided 10.x.x.x is too restrictive for them, and they start assigning public IP addresses internally. It will work, at first. But then problems will start popping up.



      It's a matter of time before somebody uses 172.217.15.68 for a lab machine. It's one of the IP addresses DNS resolves for www.google.com. Now, sometimes, when someone inside the university tries to do a search on Google, their web browser goes to that lab machine instead. Because the internal routers would have no ability to conceive that there are two 172.217.15.68's, one internal and one external; they would simply route your packets to the internal one.



      IP blocks assigned internally cannot be routed externally



      But it's worse than that. They assigned a whole netblock, so all of 172.217.x.x/16 will route to that lab. You probably wouldn't clobber every Google IP, but a lot of searches would fail. For smaller outfits like Craigslist where all their addresses are in the same netblock, if the university assigned that netblock internally, the entire site would be blocked cold.



      This won't affect anyone outside the university's internal network. External providers will not accept the university's reassignment of Google's IP space. The only traffic routed to the university will be the public IP addresses that the university owns.



      Just use IPv6 instead



      If you sign up for Comcast, they give you a /64 of your very own. If you ask nicely, I've heard they'll just hand you a /48. But let's say you only get a /64, and then, do exactly the plot of RevOlution and create self-replicating nanites that eat electricity, in the same quantity as discussed on the show. Do you have enough IPv6 addresses for every nanite to have its own?



      Yes. And enough spares to do this on 2 million parallel earths.



      So if you're really worried about running out of IP addresses, that is the way to go.






      share|improve this answer










      New contributor




      Harper is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.




















        Your Answer








        StackExchange.ready(function() {
        var channelOptions = {
        tags: "".split(" "),
        id: "496"
        };
        initTagRenderer("".split(" "), "".split(" "), channelOptions);

        StackExchange.using("externalEditor", function() {
        // Have to fire editor after snippets, if snippets enabled
        if (StackExchange.settings.snippets.snippetsEnabled) {
        StackExchange.using("snippets", function() {
        createEditor();
        });
        }
        else {
        createEditor();
        }
        });

        function createEditor() {
        StackExchange.prepareEditor({
        heartbeatType: 'answer',
        autoActivateHeartbeat: false,
        convertImagesToLinks: false,
        noModals: true,
        showLowRepImageUploadWarning: true,
        reputationToPostImages: null,
        bindNavPrevention: true,
        postfix: "",
        imageUploader: {
        brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
        contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
        allowUrls: true
        },
        noCode: true, onDemand: true,
        discardSelector: ".discard-answer"
        ,immediatelyShowMarkdownHelp:true
        });


        }
        });






        Tiago Oliveira is a new contributor. Be nice, and check out our Code of Conduct.










        draft saved

        draft discarded


















        StackExchange.ready(
        function () {
        StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fnetworkengineering.stackexchange.com%2fquestions%2f56208%2fwhat-stops-someone-from-configuring-their-network-with-ip-addresses-they-do-not%23new-answer', 'question_page');
        }
        );

        Post as a guest















        Required, but never shown

























        5 Answers
        5






        active

        oldest

        votes








        5 Answers
        5






        active

        oldest

        votes









        active

        oldest

        votes






        active

        oldest

        votes









        19














        Most likely if they're a big university they are their own ISP, using BGP to connect their network to the internet via a number of upstream networks.



        Nothing stops them from using IP addresses they should not be using, and it would work in their local network. However, it won't work on the internet. Their upstream networks providing them connectivity should have filters in place which would only allow the university to advertise IP addresses assigned to them. If the direct upstreams wouldn't filter them, the upstreams' upstreams will. And if IP addresses which are in use by another network would be used by the university, that other network would become unreachable from the university network.



        In addition, there are a number of project (for example RIPE RIS and BGPmon) which monitor routing tables and alert on any "illegal" IP advertisement (BGP Hijacks and routing anomalies).






        share|improve this answer



















        • 7





          Sadly even today should have still doesn't mean have

          – Josef
          11 hours ago






        • 3





          @Josef To be fair, BGP was built in a time of "implicit trust" -- every internet node owner knew every other internet node owner, so they knew who owned what and there were social consequences for hijacking. BGP was never really designed to be "secure", it was just designed to work.

          – 202_accepted
          9 hours ago






        • 1





          ISPs have generally gotten better at filtering BGP, because there have been some well-publicized major outages due to someone (intentionally or accidentally) advertising a bogus route.

          – Barmar
          6 hours ago











        • I would add that they would probably get balckholed by their neighbors.

          – PEdroArthur
          4 hours ago
















        19














        Most likely if they're a big university they are their own ISP, using BGP to connect their network to the internet via a number of upstream networks.



        Nothing stops them from using IP addresses they should not be using, and it would work in their local network. However, it won't work on the internet. Their upstream networks providing them connectivity should have filters in place which would only allow the university to advertise IP addresses assigned to them. If the direct upstreams wouldn't filter them, the upstreams' upstreams will. And if IP addresses which are in use by another network would be used by the university, that other network would become unreachable from the university network.



        In addition, there are a number of project (for example RIPE RIS and BGPmon) which monitor routing tables and alert on any "illegal" IP advertisement (BGP Hijacks and routing anomalies).






        share|improve this answer



















        • 7





          Sadly even today should have still doesn't mean have

          – Josef
          11 hours ago






        • 3





          @Josef To be fair, BGP was built in a time of "implicit trust" -- every internet node owner knew every other internet node owner, so they knew who owned what and there were social consequences for hijacking. BGP was never really designed to be "secure", it was just designed to work.

          – 202_accepted
          9 hours ago






        • 1





          ISPs have generally gotten better at filtering BGP, because there have been some well-publicized major outages due to someone (intentionally or accidentally) advertising a bogus route.

          – Barmar
          6 hours ago











        • I would add that they would probably get balckholed by their neighbors.

          – PEdroArthur
          4 hours ago














        19












        19








        19







        Most likely if they're a big university they are their own ISP, using BGP to connect their network to the internet via a number of upstream networks.



        Nothing stops them from using IP addresses they should not be using, and it would work in their local network. However, it won't work on the internet. Their upstream networks providing them connectivity should have filters in place which would only allow the university to advertise IP addresses assigned to them. If the direct upstreams wouldn't filter them, the upstreams' upstreams will. And if IP addresses which are in use by another network would be used by the university, that other network would become unreachable from the university network.



        In addition, there are a number of project (for example RIPE RIS and BGPmon) which monitor routing tables and alert on any "illegal" IP advertisement (BGP Hijacks and routing anomalies).






        share|improve this answer













        Most likely if they're a big university they are their own ISP, using BGP to connect their network to the internet via a number of upstream networks.



        Nothing stops them from using IP addresses they should not be using, and it would work in their local network. However, it won't work on the internet. Their upstream networks providing them connectivity should have filters in place which would only allow the university to advertise IP addresses assigned to them. If the direct upstreams wouldn't filter them, the upstreams' upstreams will. And if IP addresses which are in use by another network would be used by the university, that other network would become unreachable from the university network.



        In addition, there are a number of project (for example RIPE RIS and BGPmon) which monitor routing tables and alert on any "illegal" IP advertisement (BGP Hijacks and routing anomalies).







        share|improve this answer












        share|improve this answer



        share|improve this answer










        answered yesterday









        Teun VinkTeun Vink

        11.1k52752




        11.1k52752








        • 7





          Sadly even today should have still doesn't mean have

          – Josef
          11 hours ago






        • 3





          @Josef To be fair, BGP was built in a time of "implicit trust" -- every internet node owner knew every other internet node owner, so they knew who owned what and there were social consequences for hijacking. BGP was never really designed to be "secure", it was just designed to work.

          – 202_accepted
          9 hours ago






        • 1





          ISPs have generally gotten better at filtering BGP, because there have been some well-publicized major outages due to someone (intentionally or accidentally) advertising a bogus route.

          – Barmar
          6 hours ago











        • I would add that they would probably get balckholed by their neighbors.

          – PEdroArthur
          4 hours ago














        • 7





          Sadly even today should have still doesn't mean have

          – Josef
          11 hours ago






        • 3





          @Josef To be fair, BGP was built in a time of "implicit trust" -- every internet node owner knew every other internet node owner, so they knew who owned what and there were social consequences for hijacking. BGP was never really designed to be "secure", it was just designed to work.

          – 202_accepted
          9 hours ago






        • 1





          ISPs have generally gotten better at filtering BGP, because there have been some well-publicized major outages due to someone (intentionally or accidentally) advertising a bogus route.

          – Barmar
          6 hours ago











        • I would add that they would probably get balckholed by their neighbors.

          – PEdroArthur
          4 hours ago








        7




        7





        Sadly even today should have still doesn't mean have

        – Josef
        11 hours ago





        Sadly even today should have still doesn't mean have

        – Josef
        11 hours ago




        3




        3





        @Josef To be fair, BGP was built in a time of "implicit trust" -- every internet node owner knew every other internet node owner, so they knew who owned what and there were social consequences for hijacking. BGP was never really designed to be "secure", it was just designed to work.

        – 202_accepted
        9 hours ago





        @Josef To be fair, BGP was built in a time of "implicit trust" -- every internet node owner knew every other internet node owner, so they knew who owned what and there were social consequences for hijacking. BGP was never really designed to be "secure", it was just designed to work.

        – 202_accepted
        9 hours ago




        1




        1





        ISPs have generally gotten better at filtering BGP, because there have been some well-publicized major outages due to someone (intentionally or accidentally) advertising a bogus route.

        – Barmar
        6 hours ago





        ISPs have generally gotten better at filtering BGP, because there have been some well-publicized major outages due to someone (intentionally or accidentally) advertising a bogus route.

        – Barmar
        6 hours ago













        I would add that they would probably get balckholed by their neighbors.

        – PEdroArthur
        4 hours ago





        I would add that they would probably get balckholed by their neighbors.

        – PEdroArthur
        4 hours ago











        7














        Nothing will stop them using the addresses on their own machines.



        What happens if they try to advertise them to the Internet depends on how sloppy their providers are. If their providers are following best practices then there will be filters in place and the advertisements won't get beyond the hijacker's borders.



        OTOH if their providers and their providers providers are sloppy then a bogus announcement can go much further resulting in significant disruption to the legitimate owners of the IP space.



        Such happenings will almost certainly get noticed and there will likely be some heated discussions and some extra filtering added.






        share|improve this answer




























          7














          Nothing will stop them using the addresses on their own machines.



          What happens if they try to advertise them to the Internet depends on how sloppy their providers are. If their providers are following best practices then there will be filters in place and the advertisements won't get beyond the hijacker's borders.



          OTOH if their providers and their providers providers are sloppy then a bogus announcement can go much further resulting in significant disruption to the legitimate owners of the IP space.



          Such happenings will almost certainly get noticed and there will likely be some heated discussions and some extra filtering added.






          share|improve this answer


























            7












            7








            7







            Nothing will stop them using the addresses on their own machines.



            What happens if they try to advertise them to the Internet depends on how sloppy their providers are. If their providers are following best practices then there will be filters in place and the advertisements won't get beyond the hijacker's borders.



            OTOH if their providers and their providers providers are sloppy then a bogus announcement can go much further resulting in significant disruption to the legitimate owners of the IP space.



            Such happenings will almost certainly get noticed and there will likely be some heated discussions and some extra filtering added.






            share|improve this answer













            Nothing will stop them using the addresses on their own machines.



            What happens if they try to advertise them to the Internet depends on how sloppy their providers are. If their providers are following best practices then there will be filters in place and the advertisements won't get beyond the hijacker's borders.



            OTOH if their providers and their providers providers are sloppy then a bogus announcement can go much further resulting in significant disruption to the legitimate owners of the IP space.



            Such happenings will almost certainly get noticed and there will likely be some heated discussions and some extra filtering added.







            share|improve this answer












            share|improve this answer



            share|improve this answer










            answered 21 hours ago









            Peter GreenPeter Green

            7,57121226




            7,57121226























                3















                What stops them from attributing their routers and hosts already in use IP addresses?




                Nothing. Over the years, I have seen both organizations of all sizes, both public and private, do this including a world wide recognized "brand" company. In fact, I have seen this more often in business settings than university settings (largely due to the fact that more universities were involved in the Internet earlier and helped define the standards and best practices used today).




                And what would happen if indeed someone do this?




                Today, likely nothing other than the organization not being able to reach portions of the Internet that they overlap. In the past, this type of thing has caused serious issues, including "breaking the Internet" for some or many users (in one case, a single ISP accidentally propagated a default route to the Internet overloading their own network as much of the Internet traffic tried to route through them).



                Past incidents like the ones you propose became learning opportunities and resulted in best practices that include protections from this type of misconfiguration. Most often today, providers implement BCP38/RFC2827 to filter traffic to connected organizations to only the IP address they should be advertising.



                Some providers still also implement bogon filtering which when properly maintained helps to prevent traffic from IP space that no valid traffic should be coming from (i.e. private address ranges, unassigned IP space, etc). While the IPv4 bogon list is much smaller today that in the past (i.e. most IPv4 addresses are now assigned), the IPv6 bogon list can be still be quite useful, especially on large providers to limit the scope of IP squatting (i.e. using unassigned IP space).






                share|improve this answer




























                  3















                  What stops them from attributing their routers and hosts already in use IP addresses?




                  Nothing. Over the years, I have seen both organizations of all sizes, both public and private, do this including a world wide recognized "brand" company. In fact, I have seen this more often in business settings than university settings (largely due to the fact that more universities were involved in the Internet earlier and helped define the standards and best practices used today).




                  And what would happen if indeed someone do this?




                  Today, likely nothing other than the organization not being able to reach portions of the Internet that they overlap. In the past, this type of thing has caused serious issues, including "breaking the Internet" for some or many users (in one case, a single ISP accidentally propagated a default route to the Internet overloading their own network as much of the Internet traffic tried to route through them).



                  Past incidents like the ones you propose became learning opportunities and resulted in best practices that include protections from this type of misconfiguration. Most often today, providers implement BCP38/RFC2827 to filter traffic to connected organizations to only the IP address they should be advertising.



                  Some providers still also implement bogon filtering which when properly maintained helps to prevent traffic from IP space that no valid traffic should be coming from (i.e. private address ranges, unassigned IP space, etc). While the IPv4 bogon list is much smaller today that in the past (i.e. most IPv4 addresses are now assigned), the IPv6 bogon list can be still be quite useful, especially on large providers to limit the scope of IP squatting (i.e. using unassigned IP space).






                  share|improve this answer


























                    3












                    3








                    3








                    What stops them from attributing their routers and hosts already in use IP addresses?




                    Nothing. Over the years, I have seen both organizations of all sizes, both public and private, do this including a world wide recognized "brand" company. In fact, I have seen this more often in business settings than university settings (largely due to the fact that more universities were involved in the Internet earlier and helped define the standards and best practices used today).




                    And what would happen if indeed someone do this?




                    Today, likely nothing other than the organization not being able to reach portions of the Internet that they overlap. In the past, this type of thing has caused serious issues, including "breaking the Internet" for some or many users (in one case, a single ISP accidentally propagated a default route to the Internet overloading their own network as much of the Internet traffic tried to route through them).



                    Past incidents like the ones you propose became learning opportunities and resulted in best practices that include protections from this type of misconfiguration. Most often today, providers implement BCP38/RFC2827 to filter traffic to connected organizations to only the IP address they should be advertising.



                    Some providers still also implement bogon filtering which when properly maintained helps to prevent traffic from IP space that no valid traffic should be coming from (i.e. private address ranges, unassigned IP space, etc). While the IPv4 bogon list is much smaller today that in the past (i.e. most IPv4 addresses are now assigned), the IPv6 bogon list can be still be quite useful, especially on large providers to limit the scope of IP squatting (i.e. using unassigned IP space).






                    share|improve this answer














                    What stops them from attributing their routers and hosts already in use IP addresses?




                    Nothing. Over the years, I have seen both organizations of all sizes, both public and private, do this including a world wide recognized "brand" company. In fact, I have seen this more often in business settings than university settings (largely due to the fact that more universities were involved in the Internet earlier and helped define the standards and best practices used today).




                    And what would happen if indeed someone do this?




                    Today, likely nothing other than the organization not being able to reach portions of the Internet that they overlap. In the past, this type of thing has caused serious issues, including "breaking the Internet" for some or many users (in one case, a single ISP accidentally propagated a default route to the Internet overloading their own network as much of the Internet traffic tried to route through them).



                    Past incidents like the ones you propose became learning opportunities and resulted in best practices that include protections from this type of misconfiguration. Most often today, providers implement BCP38/RFC2827 to filter traffic to connected organizations to only the IP address they should be advertising.



                    Some providers still also implement bogon filtering which when properly maintained helps to prevent traffic from IP space that no valid traffic should be coming from (i.e. private address ranges, unassigned IP space, etc). While the IPv4 bogon list is much smaller today that in the past (i.e. most IPv4 addresses are now assigned), the IPv6 bogon list can be still be quite useful, especially on large providers to limit the scope of IP squatting (i.e. using unassigned IP space).







                    share|improve this answer












                    share|improve this answer



                    share|improve this answer










                    answered 9 hours ago









                    YLearnYLearn

                    21.9k545101




                    21.9k545101























                        2














                        Suppose I have two machines.
                        I assign the address 1.2.3.4 to one and 1.2.3.5 to the other.
                        I don't own these addresses.



                        As long as I don't try to the Internet, these two machine can talk to each other without any problems.



                        Now I connect to the Internet. The other answers talk about filters blocking things, but let us ignore that for a moment.



                        My machine 1.2.3.4 tries to connect to some legitimate address, like 12.34.56.78. Assume that this address exists and is controlled by its proper owner.



                        So, my machine sends a packet:



                        From 1.2.3.4, To: 12.34.56.78, Content: Want to be friends? (Translated into human)



                        The routers look at the To: part and correctly delivers it to 12.34.56.78. This machine suspects nothing and complies an answer



                        From: 12.34.56.78, To: 1.2.3.4, Content: Sure, let's be friends!



                        Now comes to problem. This answer will never be delivered to you. Instead it will be delivered to the real 1.2.3.4, who will become very confused.



                        So, if you use a wrong address, you can talk to the Internet, but the Internet will never answer you.






                        share|improve this answer








                        New contributor




                        Stig Hemmer is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                        Check out our Code of Conduct.
















                        • 2





                          "the Internet will never answer you" if you advertise the bogus addresses over BGP and noone blocks your announcements then large parts of the internet may very well answer you, at least until someone realises what is going on.

                          – Peter Green
                          10 hours ago






                        • 1





                          Any decent ISP will implement BCP38 so your attempt to "talk to the internet" will end in their anti-spoofing filter.

                          – Teun Vink
                          9 hours ago
















                        2














                        Suppose I have two machines.
                        I assign the address 1.2.3.4 to one and 1.2.3.5 to the other.
                        I don't own these addresses.



                        As long as I don't try to the Internet, these two machine can talk to each other without any problems.



                        Now I connect to the Internet. The other answers talk about filters blocking things, but let us ignore that for a moment.



                        My machine 1.2.3.4 tries to connect to some legitimate address, like 12.34.56.78. Assume that this address exists and is controlled by its proper owner.



                        So, my machine sends a packet:



                        From 1.2.3.4, To: 12.34.56.78, Content: Want to be friends? (Translated into human)



                        The routers look at the To: part and correctly delivers it to 12.34.56.78. This machine suspects nothing and complies an answer



                        From: 12.34.56.78, To: 1.2.3.4, Content: Sure, let's be friends!



                        Now comes to problem. This answer will never be delivered to you. Instead it will be delivered to the real 1.2.3.4, who will become very confused.



                        So, if you use a wrong address, you can talk to the Internet, but the Internet will never answer you.






                        share|improve this answer








                        New contributor




                        Stig Hemmer is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                        Check out our Code of Conduct.
















                        • 2





                          "the Internet will never answer you" if you advertise the bogus addresses over BGP and noone blocks your announcements then large parts of the internet may very well answer you, at least until someone realises what is going on.

                          – Peter Green
                          10 hours ago






                        • 1





                          Any decent ISP will implement BCP38 so your attempt to "talk to the internet" will end in their anti-spoofing filter.

                          – Teun Vink
                          9 hours ago














                        2












                        2








                        2







                        Suppose I have two machines.
                        I assign the address 1.2.3.4 to one and 1.2.3.5 to the other.
                        I don't own these addresses.



                        As long as I don't try to the Internet, these two machine can talk to each other without any problems.



                        Now I connect to the Internet. The other answers talk about filters blocking things, but let us ignore that for a moment.



                        My machine 1.2.3.4 tries to connect to some legitimate address, like 12.34.56.78. Assume that this address exists and is controlled by its proper owner.



                        So, my machine sends a packet:



                        From 1.2.3.4, To: 12.34.56.78, Content: Want to be friends? (Translated into human)



                        The routers look at the To: part and correctly delivers it to 12.34.56.78. This machine suspects nothing and complies an answer



                        From: 12.34.56.78, To: 1.2.3.4, Content: Sure, let's be friends!



                        Now comes to problem. This answer will never be delivered to you. Instead it will be delivered to the real 1.2.3.4, who will become very confused.



                        So, if you use a wrong address, you can talk to the Internet, but the Internet will never answer you.






                        share|improve this answer








                        New contributor




                        Stig Hemmer is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                        Check out our Code of Conduct.










                        Suppose I have two machines.
                        I assign the address 1.2.3.4 to one and 1.2.3.5 to the other.
                        I don't own these addresses.



                        As long as I don't try to the Internet, these two machine can talk to each other without any problems.



                        Now I connect to the Internet. The other answers talk about filters blocking things, but let us ignore that for a moment.



                        My machine 1.2.3.4 tries to connect to some legitimate address, like 12.34.56.78. Assume that this address exists and is controlled by its proper owner.



                        So, my machine sends a packet:



                        From 1.2.3.4, To: 12.34.56.78, Content: Want to be friends? (Translated into human)



                        The routers look at the To: part and correctly delivers it to 12.34.56.78. This machine suspects nothing and complies an answer



                        From: 12.34.56.78, To: 1.2.3.4, Content: Sure, let's be friends!



                        Now comes to problem. This answer will never be delivered to you. Instead it will be delivered to the real 1.2.3.4, who will become very confused.



                        So, if you use a wrong address, you can talk to the Internet, but the Internet will never answer you.







                        share|improve this answer








                        New contributor




                        Stig Hemmer is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                        Check out our Code of Conduct.









                        share|improve this answer



                        share|improve this answer






                        New contributor




                        Stig Hemmer is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                        Check out our Code of Conduct.









                        answered 12 hours ago









                        Stig HemmerStig Hemmer

                        1213




                        1213




                        New contributor




                        Stig Hemmer is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                        Check out our Code of Conduct.





                        New contributor





                        Stig Hemmer is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                        Check out our Code of Conduct.






                        Stig Hemmer is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                        Check out our Code of Conduct.








                        • 2





                          "the Internet will never answer you" if you advertise the bogus addresses over BGP and noone blocks your announcements then large parts of the internet may very well answer you, at least until someone realises what is going on.

                          – Peter Green
                          10 hours ago






                        • 1





                          Any decent ISP will implement BCP38 so your attempt to "talk to the internet" will end in their anti-spoofing filter.

                          – Teun Vink
                          9 hours ago














                        • 2





                          "the Internet will never answer you" if you advertise the bogus addresses over BGP and noone blocks your announcements then large parts of the internet may very well answer you, at least until someone realises what is going on.

                          – Peter Green
                          10 hours ago






                        • 1





                          Any decent ISP will implement BCP38 so your attempt to "talk to the internet" will end in their anti-spoofing filter.

                          – Teun Vink
                          9 hours ago








                        2




                        2





                        "the Internet will never answer you" if you advertise the bogus addresses over BGP and noone blocks your announcements then large parts of the internet may very well answer you, at least until someone realises what is going on.

                        – Peter Green
                        10 hours ago





                        "the Internet will never answer you" if you advertise the bogus addresses over BGP and noone blocks your announcements then large parts of the internet may very well answer you, at least until someone realises what is going on.

                        – Peter Green
                        10 hours ago




                        1




                        1





                        Any decent ISP will implement BCP38 so your attempt to "talk to the internet" will end in their anti-spoofing filter.

                        – Teun Vink
                        9 hours ago





                        Any decent ISP will implement BCP38 so your attempt to "talk to the internet" will end in their anti-spoofing filter.

                        – Teun Vink
                        9 hours ago











                        0














                        It would internally black out large swatches of the Internet



                        Sure. Let's say they do the common thing of using private IP addresses internally to their network, such as 10.x.x.x... You know the drill, network address translation at the edge of their network, just like your home network.



                        Except they decided 10.x.x.x is too restrictive for them, and they start assigning public IP addresses internally. It will work, at first. But then problems will start popping up.



                        It's a matter of time before somebody uses 172.217.15.68 for a lab machine. It's one of the IP addresses DNS resolves for www.google.com. Now, sometimes, when someone inside the university tries to do a search on Google, their web browser goes to that lab machine instead. Because the internal routers would have no ability to conceive that there are two 172.217.15.68's, one internal and one external; they would simply route your packets to the internal one.



                        IP blocks assigned internally cannot be routed externally



                        But it's worse than that. They assigned a whole netblock, so all of 172.217.x.x/16 will route to that lab. You probably wouldn't clobber every Google IP, but a lot of searches would fail. For smaller outfits like Craigslist where all their addresses are in the same netblock, if the university assigned that netblock internally, the entire site would be blocked cold.



                        This won't affect anyone outside the university's internal network. External providers will not accept the university's reassignment of Google's IP space. The only traffic routed to the university will be the public IP addresses that the university owns.



                        Just use IPv6 instead



                        If you sign up for Comcast, they give you a /64 of your very own. If you ask nicely, I've heard they'll just hand you a /48. But let's say you only get a /64, and then, do exactly the plot of RevOlution and create self-replicating nanites that eat electricity, in the same quantity as discussed on the show. Do you have enough IPv6 addresses for every nanite to have its own?



                        Yes. And enough spares to do this on 2 million parallel earths.



                        So if you're really worried about running out of IP addresses, that is the way to go.






                        share|improve this answer










                        New contributor




                        Harper is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                        Check out our Code of Conduct.

























                          0














                          It would internally black out large swatches of the Internet



                          Sure. Let's say they do the common thing of using private IP addresses internally to their network, such as 10.x.x.x... You know the drill, network address translation at the edge of their network, just like your home network.



                          Except they decided 10.x.x.x is too restrictive for them, and they start assigning public IP addresses internally. It will work, at first. But then problems will start popping up.



                          It's a matter of time before somebody uses 172.217.15.68 for a lab machine. It's one of the IP addresses DNS resolves for www.google.com. Now, sometimes, when someone inside the university tries to do a search on Google, their web browser goes to that lab machine instead. Because the internal routers would have no ability to conceive that there are two 172.217.15.68's, one internal and one external; they would simply route your packets to the internal one.



                          IP blocks assigned internally cannot be routed externally



                          But it's worse than that. They assigned a whole netblock, so all of 172.217.x.x/16 will route to that lab. You probably wouldn't clobber every Google IP, but a lot of searches would fail. For smaller outfits like Craigslist where all their addresses are in the same netblock, if the university assigned that netblock internally, the entire site would be blocked cold.



                          This won't affect anyone outside the university's internal network. External providers will not accept the university's reassignment of Google's IP space. The only traffic routed to the university will be the public IP addresses that the university owns.



                          Just use IPv6 instead



                          If you sign up for Comcast, they give you a /64 of your very own. If you ask nicely, I've heard they'll just hand you a /48. But let's say you only get a /64, and then, do exactly the plot of RevOlution and create self-replicating nanites that eat electricity, in the same quantity as discussed on the show. Do you have enough IPv6 addresses for every nanite to have its own?



                          Yes. And enough spares to do this on 2 million parallel earths.



                          So if you're really worried about running out of IP addresses, that is the way to go.






                          share|improve this answer










                          New contributor




                          Harper is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                          Check out our Code of Conduct.























                            0












                            0








                            0







                            It would internally black out large swatches of the Internet



                            Sure. Let's say they do the common thing of using private IP addresses internally to their network, such as 10.x.x.x... You know the drill, network address translation at the edge of their network, just like your home network.



                            Except they decided 10.x.x.x is too restrictive for them, and they start assigning public IP addresses internally. It will work, at first. But then problems will start popping up.



                            It's a matter of time before somebody uses 172.217.15.68 for a lab machine. It's one of the IP addresses DNS resolves for www.google.com. Now, sometimes, when someone inside the university tries to do a search on Google, their web browser goes to that lab machine instead. Because the internal routers would have no ability to conceive that there are two 172.217.15.68's, one internal and one external; they would simply route your packets to the internal one.



                            IP blocks assigned internally cannot be routed externally



                            But it's worse than that. They assigned a whole netblock, so all of 172.217.x.x/16 will route to that lab. You probably wouldn't clobber every Google IP, but a lot of searches would fail. For smaller outfits like Craigslist where all their addresses are in the same netblock, if the university assigned that netblock internally, the entire site would be blocked cold.



                            This won't affect anyone outside the university's internal network. External providers will not accept the university's reassignment of Google's IP space. The only traffic routed to the university will be the public IP addresses that the university owns.



                            Just use IPv6 instead



                            If you sign up for Comcast, they give you a /64 of your very own. If you ask nicely, I've heard they'll just hand you a /48. But let's say you only get a /64, and then, do exactly the plot of RevOlution and create self-replicating nanites that eat electricity, in the same quantity as discussed on the show. Do you have enough IPv6 addresses for every nanite to have its own?



                            Yes. And enough spares to do this on 2 million parallel earths.



                            So if you're really worried about running out of IP addresses, that is the way to go.






                            share|improve this answer










                            New contributor




                            Harper is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                            Check out our Code of Conduct.










                            It would internally black out large swatches of the Internet



                            Sure. Let's say they do the common thing of using private IP addresses internally to their network, such as 10.x.x.x... You know the drill, network address translation at the edge of their network, just like your home network.



                            Except they decided 10.x.x.x is too restrictive for them, and they start assigning public IP addresses internally. It will work, at first. But then problems will start popping up.



                            It's a matter of time before somebody uses 172.217.15.68 for a lab machine. It's one of the IP addresses DNS resolves for www.google.com. Now, sometimes, when someone inside the university tries to do a search on Google, their web browser goes to that lab machine instead. Because the internal routers would have no ability to conceive that there are two 172.217.15.68's, one internal and one external; they would simply route your packets to the internal one.



                            IP blocks assigned internally cannot be routed externally



                            But it's worse than that. They assigned a whole netblock, so all of 172.217.x.x/16 will route to that lab. You probably wouldn't clobber every Google IP, but a lot of searches would fail. For smaller outfits like Craigslist where all their addresses are in the same netblock, if the university assigned that netblock internally, the entire site would be blocked cold.



                            This won't affect anyone outside the university's internal network. External providers will not accept the university's reassignment of Google's IP space. The only traffic routed to the university will be the public IP addresses that the university owns.



                            Just use IPv6 instead



                            If you sign up for Comcast, they give you a /64 of your very own. If you ask nicely, I've heard they'll just hand you a /48. But let's say you only get a /64, and then, do exactly the plot of RevOlution and create self-replicating nanites that eat electricity, in the same quantity as discussed on the show. Do you have enough IPv6 addresses for every nanite to have its own?



                            Yes. And enough spares to do this on 2 million parallel earths.



                            So if you're really worried about running out of IP addresses, that is the way to go.







                            share|improve this answer










                            New contributor




                            Harper is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                            Check out our Code of Conduct.









                            share|improve this answer



                            share|improve this answer








                            edited 20 mins ago





















                            New contributor




                            Harper is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                            Check out our Code of Conduct.









                            answered 35 mins ago









                            HarperHarper

                            1011




                            1011




                            New contributor




                            Harper is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                            Check out our Code of Conduct.





                            New contributor





                            Harper is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                            Check out our Code of Conduct.






                            Harper is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                            Check out our Code of Conduct.






















                                Tiago Oliveira is a new contributor. Be nice, and check out our Code of Conduct.










                                draft saved

                                draft discarded


















                                Tiago Oliveira is a new contributor. Be nice, and check out our Code of Conduct.













                                Tiago Oliveira is a new contributor. Be nice, and check out our Code of Conduct.












                                Tiago Oliveira is a new contributor. Be nice, and check out our Code of Conduct.
















                                Thanks for contributing an answer to Network Engineering Stack Exchange!


                                • Please be sure to answer the question. Provide details and share your research!

                                But avoid



                                • Asking for help, clarification, or responding to other answers.

                                • Making statements based on opinion; back them up with references or personal experience.


                                To learn more, see our tips on writing great answers.




                                draft saved


                                draft discarded














                                StackExchange.ready(
                                function () {
                                StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fnetworkengineering.stackexchange.com%2fquestions%2f56208%2fwhat-stops-someone-from-configuring-their-network-with-ip-addresses-they-do-not%23new-answer', 'question_page');
                                }
                                );

                                Post as a guest















                                Required, but never shown





















































                                Required, but never shown














                                Required, but never shown












                                Required, but never shown







                                Required, but never shown

































                                Required, but never shown














                                Required, but never shown












                                Required, but never shown







                                Required, but never shown







                                Popular posts from this blog

                                SQL Server 17 - Attemping to backup to remote NAS but Access is denied

                                Always On Availability groups resolving state after failover - Remote harden of transaction...

                                Restoring from pg_dump with foreign key constraints