What stops someone from configuring their network with IP addresses they do not own?












2















Here's the scenario. I was picturing a university that bought a range of IP addresses. I think they'd still be inside a ISP (right?), but they'd have freedom to configure stuff the way they wanted.



What stops them from attributing their routers and hosts already in use IP addresses?



And what would happen if indeed someone do this?










share|improve this question









New contributor




Tiago Oliveira is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.

























    2















    Here's the scenario. I was picturing a university that bought a range of IP addresses. I think they'd still be inside a ISP (right?), but they'd have freedom to configure stuff the way they wanted.



    What stops them from attributing their routers and hosts already in use IP addresses?



    And what would happen if indeed someone do this?










    share|improve this question









    New contributor




    Tiago Oliveira is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
    Check out our Code of Conduct.























      2












      2








      2








      Here's the scenario. I was picturing a university that bought a range of IP addresses. I think they'd still be inside a ISP (right?), but they'd have freedom to configure stuff the way they wanted.



      What stops them from attributing their routers and hosts already in use IP addresses?



      And what would happen if indeed someone do this?










      share|improve this question









      New contributor




      Tiago Oliveira is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.












      Here's the scenario. I was picturing a university that bought a range of IP addresses. I think they'd still be inside a ISP (right?), but they'd have freedom to configure stuff the way they wanted.



      What stops them from attributing their routers and hosts already in use IP addresses?



      And what would happen if indeed someone do this?







      router ip network internet ip-address






      share|improve this question









      New contributor




      Tiago Oliveira is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.











      share|improve this question









      New contributor




      Tiago Oliveira is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.









      share|improve this question




      share|improve this question








      edited 3 hours ago







      Tiago Oliveira













      New contributor




      Tiago Oliveira is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.









      asked 4 hours ago









      Tiago OliveiraTiago Oliveira

      7415




      7415




      New contributor




      Tiago Oliveira is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.





      New contributor





      Tiago Oliveira is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.






      Tiago Oliveira is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.






















          2 Answers
          2






          active

          oldest

          votes


















          3














          Most likely if they're a big university they are their own ISP, using BGP to connect their network to the internet via a number of upstream networks.



          Nothing stops them from using IP addresses they should not be using, and it would work in their local network. However, it won't work on the internet. Their upstream networks providing them connectivity should have filters in place which would only allow the university to advertise IP addresses assigned to them. If the direct upstreams wouldn't filter them, the upstreams' upstreams will. And if IP addresses which are in use by another network would be used by the university, that other network would become unreachable from the university network.



          In addition, there are a number of project (for example RIPE RIS and BGPmon) which monitor routing tables and alert on any "illegal" IP advertisement (BGP Hijacks and routing anomalies).






          share|improve this answer































            1














            Nothing will stop them using the addresses on their own machines.



            What happens if they try to advertise them to the Internet depends on how sloppy their providers are. If their providers are following best practices then there will be filters in place and the advertisements won't get beyond the hijacker's borders.



            OTOH if their providers and their providers providers are sloppy then a bogus announcement can go much further resulting in significant disruption to the legitimate owners of the IP space.



            Such happenings will almost certainly get noticed and there will likely be some heated discussions and some extra filtering added.






            share|improve this answer























              Your Answer








              StackExchange.ready(function() {
              var channelOptions = {
              tags: "".split(" "),
              id: "496"
              };
              initTagRenderer("".split(" "), "".split(" "), channelOptions);

              StackExchange.using("externalEditor", function() {
              // Have to fire editor after snippets, if snippets enabled
              if (StackExchange.settings.snippets.snippetsEnabled) {
              StackExchange.using("snippets", function() {
              createEditor();
              });
              }
              else {
              createEditor();
              }
              });

              function createEditor() {
              StackExchange.prepareEditor({
              heartbeatType: 'answer',
              autoActivateHeartbeat: false,
              convertImagesToLinks: false,
              noModals: true,
              showLowRepImageUploadWarning: true,
              reputationToPostImages: null,
              bindNavPrevention: true,
              postfix: "",
              imageUploader: {
              brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
              contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
              allowUrls: true
              },
              noCode: true, onDemand: true,
              discardSelector: ".discard-answer"
              ,immediatelyShowMarkdownHelp:true
              });


              }
              });






              Tiago Oliveira is a new contributor. Be nice, and check out our Code of Conduct.










              draft saved

              draft discarded


















              StackExchange.ready(
              function () {
              StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fnetworkengineering.stackexchange.com%2fquestions%2f56208%2fwhat-stops-someone-from-configuring-their-network-with-ip-addresses-they-do-not%23new-answer', 'question_page');
              }
              );

              Post as a guest















              Required, but never shown

























              2 Answers
              2






              active

              oldest

              votes








              2 Answers
              2






              active

              oldest

              votes









              active

              oldest

              votes






              active

              oldest

              votes









              3














              Most likely if they're a big university they are their own ISP, using BGP to connect their network to the internet via a number of upstream networks.



              Nothing stops them from using IP addresses they should not be using, and it would work in their local network. However, it won't work on the internet. Their upstream networks providing them connectivity should have filters in place which would only allow the university to advertise IP addresses assigned to them. If the direct upstreams wouldn't filter them, the upstreams' upstreams will. And if IP addresses which are in use by another network would be used by the university, that other network would become unreachable from the university network.



              In addition, there are a number of project (for example RIPE RIS and BGPmon) which monitor routing tables and alert on any "illegal" IP advertisement (BGP Hijacks and routing anomalies).






              share|improve this answer




























                3














                Most likely if they're a big university they are their own ISP, using BGP to connect their network to the internet via a number of upstream networks.



                Nothing stops them from using IP addresses they should not be using, and it would work in their local network. However, it won't work on the internet. Their upstream networks providing them connectivity should have filters in place which would only allow the university to advertise IP addresses assigned to them. If the direct upstreams wouldn't filter them, the upstreams' upstreams will. And if IP addresses which are in use by another network would be used by the university, that other network would become unreachable from the university network.



                In addition, there are a number of project (for example RIPE RIS and BGPmon) which monitor routing tables and alert on any "illegal" IP advertisement (BGP Hijacks and routing anomalies).






                share|improve this answer


























                  3












                  3








                  3







                  Most likely if they're a big university they are their own ISP, using BGP to connect their network to the internet via a number of upstream networks.



                  Nothing stops them from using IP addresses they should not be using, and it would work in their local network. However, it won't work on the internet. Their upstream networks providing them connectivity should have filters in place which would only allow the university to advertise IP addresses assigned to them. If the direct upstreams wouldn't filter them, the upstreams' upstreams will. And if IP addresses which are in use by another network would be used by the university, that other network would become unreachable from the university network.



                  In addition, there are a number of project (for example RIPE RIS and BGPmon) which monitor routing tables and alert on any "illegal" IP advertisement (BGP Hijacks and routing anomalies).






                  share|improve this answer













                  Most likely if they're a big university they are their own ISP, using BGP to connect their network to the internet via a number of upstream networks.



                  Nothing stops them from using IP addresses they should not be using, and it would work in their local network. However, it won't work on the internet. Their upstream networks providing them connectivity should have filters in place which would only allow the university to advertise IP addresses assigned to them. If the direct upstreams wouldn't filter them, the upstreams' upstreams will. And if IP addresses which are in use by another network would be used by the university, that other network would become unreachable from the university network.



                  In addition, there are a number of project (for example RIPE RIS and BGPmon) which monitor routing tables and alert on any "illegal" IP advertisement (BGP Hijacks and routing anomalies).







                  share|improve this answer












                  share|improve this answer



                  share|improve this answer










                  answered 4 hours ago









                  Teun VinkTeun Vink

                  11k52751




                  11k52751























                      1














                      Nothing will stop them using the addresses on their own machines.



                      What happens if they try to advertise them to the Internet depends on how sloppy their providers are. If their providers are following best practices then there will be filters in place and the advertisements won't get beyond the hijacker's borders.



                      OTOH if their providers and their providers providers are sloppy then a bogus announcement can go much further resulting in significant disruption to the legitimate owners of the IP space.



                      Such happenings will almost certainly get noticed and there will likely be some heated discussions and some extra filtering added.






                      share|improve this answer




























                        1














                        Nothing will stop them using the addresses on their own machines.



                        What happens if they try to advertise them to the Internet depends on how sloppy their providers are. If their providers are following best practices then there will be filters in place and the advertisements won't get beyond the hijacker's borders.



                        OTOH if their providers and their providers providers are sloppy then a bogus announcement can go much further resulting in significant disruption to the legitimate owners of the IP space.



                        Such happenings will almost certainly get noticed and there will likely be some heated discussions and some extra filtering added.






                        share|improve this answer


























                          1












                          1








                          1







                          Nothing will stop them using the addresses on their own machines.



                          What happens if they try to advertise them to the Internet depends on how sloppy their providers are. If their providers are following best practices then there will be filters in place and the advertisements won't get beyond the hijacker's borders.



                          OTOH if their providers and their providers providers are sloppy then a bogus announcement can go much further resulting in significant disruption to the legitimate owners of the IP space.



                          Such happenings will almost certainly get noticed and there will likely be some heated discussions and some extra filtering added.






                          share|improve this answer













                          Nothing will stop them using the addresses on their own machines.



                          What happens if they try to advertise them to the Internet depends on how sloppy their providers are. If their providers are following best practices then there will be filters in place and the advertisements won't get beyond the hijacker's borders.



                          OTOH if their providers and their providers providers are sloppy then a bogus announcement can go much further resulting in significant disruption to the legitimate owners of the IP space.



                          Such happenings will almost certainly get noticed and there will likely be some heated discussions and some extra filtering added.







                          share|improve this answer












                          share|improve this answer



                          share|improve this answer










                          answered 1 hour ago









                          Peter GreenPeter Green

                          7,47621226




                          7,47621226






















                              Tiago Oliveira is a new contributor. Be nice, and check out our Code of Conduct.










                              draft saved

                              draft discarded


















                              Tiago Oliveira is a new contributor. Be nice, and check out our Code of Conduct.













                              Tiago Oliveira is a new contributor. Be nice, and check out our Code of Conduct.












                              Tiago Oliveira is a new contributor. Be nice, and check out our Code of Conduct.
















                              Thanks for contributing an answer to Network Engineering Stack Exchange!


                              • Please be sure to answer the question. Provide details and share your research!

                              But avoid



                              • Asking for help, clarification, or responding to other answers.

                              • Making statements based on opinion; back them up with references or personal experience.


                              To learn more, see our tips on writing great answers.




                              draft saved


                              draft discarded














                              StackExchange.ready(
                              function () {
                              StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fnetworkengineering.stackexchange.com%2fquestions%2f56208%2fwhat-stops-someone-from-configuring-their-network-with-ip-addresses-they-do-not%23new-answer', 'question_page');
                              }
                              );

                              Post as a guest















                              Required, but never shown





















































                              Required, but never shown














                              Required, but never shown












                              Required, but never shown







                              Required, but never shown

































                              Required, but never shown














                              Required, but never shown












                              Required, but never shown







                              Required, but never shown







                              Popular posts from this blog

                              404 Error Contact Form 7 ajax form submitting

                              How to know if a Active Directory user can login interactively

                              Refactoring coordinates for Minecraft Pi buildings written in Python