[161993] in North American Network Operators' Group
Re: BCP38 tester?
daemon@ATHENA.MIT.EDU (Paul Ferguson)
Sun Mar 31 10:55:07 2013
In-Reply-To: <28787874.307.1364741335939.JavaMail.root@benjamin.baylink.com>
Date: Sun, 31 Mar 2013 07:54:55 -0700
From: Paul Ferguson <fergdawgster@gmail.com>
To: Jay Ashworth <jra@baylink.com>
Cc: NANOG <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
You mean like this? :-)
http://spoofer.csail.mit.edu/
- ferg
On Sun, Mar 31, 2013 at 7:48 AM, Jay Ashworth <jra@baylink.com> wrote:
> Is there a program which users can run on an end-site workstation which
> would test whether they are being some link which is doing BCP38, or some
> related type of source-address ingress filtering?
>
> I'm hoping for something that could be downloaded by users and run, and
> try to forge a few packets to somewhere useful, which could be logged
> somehow in conjunction with some unforged packets containing a traceroute,
> so we could build up a database of leaky networks.
>
> On a related topic, while I know GRC Research's Steve Gibson is a bit of
> a polarizing personality, he does have a fairly sizable consumer audience,
> and might be a great distribution venue for such a thing.
>
> Or, perhaps, is there someone on here from Ookla?
>
> Patrick? Could Akamai be persuaded to take an interest in this as a
> research project?
>
> Cheers,
> -- jra
> --
> Jay R. Ashworth Baylink jra@baylink.com
> Designer The Things I Think RFC 2100
> Ashworth & Associates http://baylink.pitas.com 2000 Land Rover DII
> St Petersburg FL USA #natog +1 727 647 1274
>
--
"Fergie", a.k.a. Paul Ferguson
fergdawgster(at)gmail.com