[168528] in North American Network Operators' Group
Re: BCP38.info
daemon@ATHENA.MIT.EDU (Andrei Robachevsky)
Wed Jan 29 05:17:14 2014
Date: Wed, 29 Jan 2014 11:16:41 +0100
From: Andrei Robachevsky <robachevsky@isoc.org>
To: Jared Mauch <jared@puck.nether.net>
In-Reply-To: <40F74E06-0BC1-4177-838B-8A13CA752BE5@puck.nether.net>
Cc: NANOG <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
Hi,
Jared Mauch wrote on 1/28/14 9:03 PM:
> I'd rather share some data and how others can observe this to determine how we can approach a fix. Someone spoofing your IP address out some other carrier is something you may be interested to know about, even if you have a non-spoofing network.
At the Internet Society we are flashing out an idea of an anti-spoofing
"movement", where ISPs can list themselves as not spoofing-capable on
our website. The requirement is that they can demonstrate that they
block spoofed packets, for instance by successfully running the Spoofer
test. I think your, Jared, test can add to this picture.
Sort of a positive spin on the name and shame technique.
It is not ideal, as one test is not a real proof of such capability, but
might help raising awareness, at least. Does this sound as something
that can be useful and fly?
Andrei