[162004] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: BCP38 tester?

daemon@ATHENA.MIT.EDU (Jay Ashworth)
Sun Mar 31 22:35:03 2013

Date: Sun, 31 Mar 2013 22:34:49 -0400 (EDT)
From: Jay Ashworth <jra@baylink.com>
To: NANOG <nanog@nanog.org>
In-Reply-To: <5158EAFF.30503@pubnix.net>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

----- Original Message -----
> From: "Alain Hebert" <ahebert@pubnix.net>

> An easy target would be anti-virus/trojan/security software
> providers that could add a BCP38 check to their software =D

Yes, but penetration is a problem, which is why I was thinking about
people like YouTube, Ookla, and the like.

Any Flash app that lots of people run frequently.  Assuming those apps
could generate the packets, which, on reflection, I would bet they can't.

Cheers,
-- jra
-- 
Jay R. Ashworth                  Baylink                       jra@baylink.com
Designer                     The Things I Think                       RFC 2100
Ashworth & Associates     http://baylink.pitas.com         2000 Land Rover DII
St Petersburg FL USA               #natog                      +1 727 647 1274


home help back first fref pref prev next nref lref last post