[191836] in North American Network Operators' Group
Re: BCP38 adoption "incentives"?
daemon@ATHENA.MIT.EDU (Alain Hebert)
Wed Sep 28 07:06:35 2016
X-Original-To: nanog@nanog.org
To: nanog@nanog.org
From: Alain Hebert <ahebert@pubnix.net>
Date: Wed, 28 Sep 2016 07:05:57 -0400
In-Reply-To: <CAP032Ttqjsw2aX1LFchfOJqwqXqWB+QkdHitL7X14rZkpRBDXg@mail.gmail.com>
Reply-To: ahebert@pubnix.net
Errors-To: nanog-bounces@nanog.org
<sarcasm>
Do not forget the "NRA" ways.
Circular discussions every time an event arise, let it die out after
a few days, and hopefully, nothing change.
-----
Alain Hebert ahebert@pubnix.net
PubNIX Inc.
50 boul. St-Charles
P.O. Box 26770 Beaconsfield, Quebec H9W 6G7
Tel: 514-990-5911 http://www.pubnix.net Fax: 514-990-9443
On 09/27/16 14:16, Joe Klein wrote:
> The knobs that are available to push adoption of any standard can include
> "Doing nothing", "Educating the community", "Incentives", "Public
> Shaming", "Loss of business", "Engaging the policy & legal wanks". It seems
> to me the first two options have not moved the ball much.
>
> Must we move the last four to fix the DDOS problem? The last one scares me,
> but the other three might be valid method to move the ball.
>
> Joe Klein
> "Inveniam viam aut faciam"
>
> PGP Fingerprint: 295E 2691 F377 C87D 2841 00C1 4174 FEDF 8ECF 0CC8
>
> On Tue, Sep 27, 2016 at 10:32 AM, Mikael Abrahamsson <swmike@swm.pp.se>
> wrote:
>
>> On Tue, 27 Sep 2016, Joe Klein wrote:
>>
>> What would it take to test for BCP38 for a specific AS?
>> Well, you can get people to run https://www.caida.org/projects
>> /spoofer/#software
>>
>> I tried to get OpenWrt to include similar software, on by default, but
>> some people are afraid that they might incur legal action on themselves by
>> doing antispoofing-testing.
>>
>> https://www.ripe.net/participate/ripe/tf/anti-spoofing might be of
>> interest.
>>
>>
>> --
>> Mikael Abrahamsson email: swmike@swm.pp.se
>>