[161995] in North American Network Operators' Group
Re: BCP38 tester?
daemon@ATHENA.MIT.EDU (Jon Lewis)
Sun Mar 31 13:31:53 2013
Date: Sun, 31 Mar 2013 13:31:37 -0400 (EDT)
From: Jon Lewis <jlewis@lewis.org>
To: Paul Ferguson <fergdawgster@gmail.com>
In-Reply-To: <CANQy6FaNdYTfCzWi2V2S39ps6a8rHBxw--0srDAHZh-dLr5vmQ@mail.gmail.com>
Cc: NANOG <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
They should updated their autoconf. It fails on modern 64-bit Linux.
On Sun, 31 Mar 2013, Paul Ferguson wrote:
> You mean like this? :-)
>
> http://spoofer.csail.mit.edu/
>
> - ferg
>
>
> On Sun, Mar 31, 2013 at 7:48 AM, Jay Ashworth <jra@baylink.com> wrote:
>
>> Is there a program which users can run on an end-site workstation which
>> would test whether they are being some link which is doing BCP38, or some
>> related type of source-address ingress filtering?
>>
>> I'm hoping for something that could be downloaded by users and run, and
>> try to forge a few packets to somewhere useful, which could be logged
>> somehow in conjunction with some unforged packets containing a traceroute,
>> so we could build up a database of leaky networks.
>>
>> On a related topic, while I know GRC Research's Steve Gibson is a bit of
>> a polarizing personality, he does have a fairly sizable consumer audience,
>> and might be a great distribution venue for such a thing.
>>
>> Or, perhaps, is there someone on here from Ookla?
>>
>> Patrick? Could Akamai be persuaded to take an interest in this as a
>> research project?
>>
>> Cheers,
>> -- jra
>> --
>> Jay R. Ashworth Baylink jra@baylink.com
>> Designer The Things I Think RFC 2100
>> Ashworth & Associates http://baylink.pitas.com 2000 Land Rover DII
>> St Petersburg FL USA #natog +1 727 647 1274
>>
>
>
>
> --
> "Fergie", a.k.a. Paul Ferguson
> fergdawgster(at)gmail.com
>
----------------------------------------------------------------------
Jon Lewis, MCP :) | I route
| therefore you are
_________ http://www.lewis.org/~jlewis/pgp for PGP public key_________