[168528] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: BCP38.info

daemon@ATHENA.MIT.EDU (Andrei Robachevsky)
Wed Jan 29 05:17:14 2014

Date: Wed, 29 Jan 2014 11:16:41 +0100
From: Andrei Robachevsky <robachevsky@isoc.org>
To: Jared Mauch <jared@puck.nether.net>
In-Reply-To: <40F74E06-0BC1-4177-838B-8A13CA752BE5@puck.nether.net>
Cc: NANOG <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

Hi,

Jared Mauch wrote on 1/28/14 9:03 PM:
> I'd rather share some data and how others can observe this to determine how we can approach a fix.  Someone spoofing your IP address out some other carrier is something you may be interested to know about, even if you have a non-spoofing network.

At the Internet Society we are flashing out an idea of an anti-spoofing
"movement", where ISPs can list themselves as not spoofing-capable on
our website. The requirement is that they can demonstrate that they
block spoofed packets, for instance by successfully running the Spoofer
test. I think your, Jared, test can add to this picture.

Sort of a positive spin on the name and shame technique.

It is not ideal, as one test is not a real proof of such capability, but
might help raising awareness, at least. Does this sound as something
that can be useful and fly?

Andrei


home help back first fref pref prev next nref lref last post