home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!cs.utexas.edu!sdd.hp.com!think.com!barmar
- From: barmar@think.com (Barry Margolin)
- Newsgroups: comp.protocols.tcp-ip
- Subject: Re: IP Directed Broadcast
- Date: 30 Jul 1992 19:54:39 GMT
- Organization: Thinking Machines Corporation, Cambridge MA, USA
- Lines: 26
- Message-ID: <159hdvINN6j7@early-bird.think.com>
- References: <11132@crackers.clearpoint.com>
- NNTP-Posting-Host: telecaster.think.com
-
- In article <11132@crackers.clearpoint.com> martillo@stars.clearpoint.com (Joachim Martillo) writes:
- >If a networks gateways do not filter IP broadcasts and that network
- >has active loops in its subnet topology, and if someone extern to the
- >network sends a directed broadcast to that network with a TTL of 255,
- >the target network could easily suffer a major broadcast storm.
- >
- >Such a storm would seem a bad thing. Maybe I am missing something,
- >but perhaps filterning directed broadcasts should be obligatory rather
- >than optional.
-
- This is why they are allowed to filter them out. They aren't required to
- filter them because they don't cause a problem on non-subnetted networks
- (e.g. directed broadcasts to a subnet of a subnetted network), networks
- without active loops, or networks where the routers compute a spanning tree
- to prevent broadcast loops (cisco Brouters have this option). Why actively
- prohibit something when there are reasonable ways of making use of it?
-
- Routers that support forwarding of directed broadcasts should have a way to
- disable it, so that networks where it will cause storms will not be
- susceptible to this. It should probably even be off by default. But
- network administrators should be able to enable it if they want.
- --
- Barry Margolin
- System Manager, Thinking Machines Corp.
-
- barmar@think.com {uunet,harvard}!think!barmar
-