[129544] in North American Network Operators' Group
Re: Reverse traceroute and spoofing of sources of packets?
daemon@ATHENA.MIT.EDU (Ryan Shea)
Thu Sep 9 17:35:58 2010
In-Reply-To: <AANLkTikiHGH1EFCesBTvF_88yjArdmP6uEaYWj=o9RiO@mail.gmail.com>
Date: Thu, 9 Sep 2010 17:35:41 -0400
From: Ryan Shea <ryanshea@google.com>
To: Christopher Morrow <christopher.morrow@gmail.com>
Cc: nanog list <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
According to the presentation they were planning on releasing a
downloadable tool by May 2009, but in searching around I found no
evidence that this was ever released.
-Ryan
On Thu, Sep 9, 2010 at 4:22 PM, Christopher Morrow
<christopher.morrow@gmail.com> wrote:
>
> I missed this meeting/preso when it happened (yes, 5+ meetings ago)
>
> <http://www.nanog.org/meetings/nanog45/abstracts.php?pt=MTE4OCZuYW5vZzQ1&nm=nanog45>
>
> I note the talks about using spoofed source packets to do some
> measurement, I didn't see anyone in the video say: "But spoofing is
> bad, but you want YOU to be able to do this? what? isn't that a little
> hypocritical?"
>
> Isn't it? and why would someone (an isp) disable BCP38 for this sort
> of activity?
>
> -Chris
>