[162022] in North American Network Operators' Group
Re: BCP38 tester?
daemon@ATHENA.MIT.EDU (Alain Hebert)
Mon Apr 1 10:07:42 2013
Date: Mon, 01 Apr 2013 10:07:30 -0400
From: Alain Hebert <ahebert@pubnix.net>
To: nanog@nanog.org
In-Reply-To: <51590EC1.2020506@jima.us>
Reply-To: ahebert@pubnix.net
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
Hi,
http://spoofer.csail.mit.edu/ is really the best place to certify
for BCP38.
-----
Alain Hebert ahebert@pubnix.net
PubNIX Inc.
50 boul. St-Charles
P.O. Box 26770 Beaconsfield, Quebec H9W 6G7
Tel: 514-990-5911 http://www.pubnix.net Fax: 514-990-9443
On 04/01/13 00:36, Jima wrote:
> On 2013-03-31 08:48, Jay Ashworth wrote:
>> Is there a program which users can run on an end-site workstation which
>> would test whether they are being some link which is doing BCP38, or
>> some
>> related type of source-address ingress filtering?
>
> I don't have a canned solution, but I've had good luck testing with
> nmap (-S and -e are relevant) while running tcpdump (and filtering for
> the protocols/ports) on a remote host. I can happily report that
> someplace upstream of my home connection is doing some filtering --
> nice. I still need to test at work.
>
> Jima
>
>
>