[164899] in North American Network Operators' Group
Re: Spoofing ASNs (Re: SNMP DDoS: the vulnerability you might not
daemon@ATHENA.MIT.EDU (Jared Mauch)
Thu Aug 8 13:51:13 2013
From: Jared Mauch <jared@puck.nether.net>
In-Reply-To: <05D03AC0-0124-4C60-A0E7-04E1F9D4CAAD@puck.nether.net>
Date: Thu, 8 Aug 2013 13:51:05 -0400
To: Saku Ytti <saku@ytti.fi>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
Oops, I pulled the wrong data (off by one column) out before a trip and =
didn't realize it until now.
This is not the spoofer list, but the list of ASNs with open resolvers.
Let me reprocess it.
Apologies, corrected data being generated.
- Jared
On Aug 8, 2013, at 1:29 PM, Jared Mauch <jared@puck.nether.net> wrote:
> The following is a sorted list from worst to best of networks that =
allow spoofing: (cutoff here is 25k)
>=20
> (full list - =
http://openresolverproject.org/full-spoofer-asn-list-201307.txt )