Ho visto questa domanda:
Suppose a university with address block 12.1.0.0/16 has a link connected to AT&T, where the AT&T router forwards packets destined to 12.1.0.0/16 to the university router. Suppose the university router has three forwarding entries: 12.1.1.0/24 out the link to the math department, 12.1.2.0/24 out the link to the CS department, and a “default route” for 0.0.0.0/0 pointing to the AT&T router. Suppose a host in the rest of the Internet sends a packet destined to 12.1.57.109. What would happen to that packet? What could be done to prevent it?
la risposta è:
The packets would loop between the AT&T and university routers, because AT&T would forward the packet to the university (using the route for 12.1.0.0/16) and the university would forward the packet back to AT&T (using the default route 0.0.0.0/0). The university should configure a “null route” to drop all packets matching 12.1.0.0/16 to prevent this. See http://www.nanog.org/mtg-0602/gao.html for details about this issue, and the security vulnerabilities associated with it.
Non riesco a capire quali sono le vulnerabilità della sicurezza ad esso associate
tutto sopra tratto da link