[168674] in North American Network Operators' Group
Re: BCP38.info
daemon@ATHENA.MIT.EDU (Dobbins, Roland)
Mon Feb 3 02:56:15 2014
From: "Dobbins, Roland" <rdobbins@arbor.net>
To: NANOG <nanog@nanog.org>
Date: Mon, 3 Feb 2014 07:55:53 +0000
In-Reply-To: <1F562C84-3345-46BD-BABB-2AC19356C806@arbor.net>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On Feb 3, 2014, at 2:22 PM, Dobbins, Roland <rdobbins@arbor.net> wrote:
> This is pretty slick, relying upon broken CPE NAT implementations. It's =
the only way I've heard of to remotely infer whether or not a given network=
allows spoofing.
It would be useful to know whether there are in fact NATs, or are 'DNS forw=
arders' . . .
-----------------------------------------------------------------------
Roland Dobbins <rdobbins@arbor.net> // <http://www.arbornetworks.com>
Luck is the residue of opportunity and design.
-- John Milton