[162004] in North American Network Operators' Group
Re: BCP38 tester?
daemon@ATHENA.MIT.EDU (Jay Ashworth)
Sun Mar 31 22:35:03 2013
Date: Sun, 31 Mar 2013 22:34:49 -0400 (EDT)
From: Jay Ashworth <jra@baylink.com>
To: NANOG <nanog@nanog.org>
In-Reply-To: <5158EAFF.30503@pubnix.net>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
----- Original Message -----
> From: "Alain Hebert" <ahebert@pubnix.net>
> An easy target would be anti-virus/trojan/security software
> providers that could add a BCP38 check to their software =D
Yes, but penetration is a problem, which is why I was thinking about
people like YouTube, Ookla, and the like.
Any Flash app that lots of people run frequently. Assuming those apps
could generate the packets, which, on reflection, I would bet they can't.
Cheers,
-- jra
--
Jay R. Ashworth Baylink jra@baylink.com
Designer The Things I Think RFC 2100
Ashworth & Associates http://baylink.pitas.com 2000 Land Rover DII
St Petersburg FL USA #natog +1 727 647 1274