[195430] in North American Network Operators' Group
Re: Spoofer Project
daemon@ATHENA.MIT.EDU (Matthew Luckie)
Tue Aug 8 19:46:28 2017
X-Original-To: nanog@nanog.org
To: "Info | ddostest.me" <info@ddostest.me>, NANOG <nanog@nanog.org>
From: Matthew Luckie <mjl@caida.org>
Date: Wed, 9 Aug 2017 11:45:56 +1200
Errors-To: nanog-bounces@nanog.org
This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--lsFhQSOGQqmmCeA2q8PkCbp9lgODBAAeS
From: Matthew Luckie <mjl@caida.org>
To: "Info | ddostest.me" <info@ddostest.me>, NANOG <nanog@nanog.org>
Message-ID: <e6c741f0-1665-c8f7-5df4-2e4f07648c35@caida.org>
Subject: Re: Spoofer Project
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable
To my knowledge this is the meeting network.
https://spoofer.caida.org/recent_tests.php?as_include=3D19230
Your interpretation of the results is congruent with mine. If you look
through the history of tests you can see SAV is usually deployed on the
network during the meeting.
This is true of other network operator group meeting networks as well.
On 08/09/17 11:25, Info | ddostest.me wrote:
> Is it me or NANOG's AS allowing spoofing?
>=20
> https://spoofer.caida.org/as.php?asn=3D19230
--lsFhQSOGQqmmCeA2q8PkCbp9lgODBAAeS
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
iGwEARECACwWIQTXPLTkr00GLuDVs20rK4MpIRAAYAUCWYpNOA4cbWpsQGNhaWRh
Lm9yZwAKCRArK4MpIRAAYNCqAJkB9AtKA9Q7H0vFKZZzbFqXznEvVACfWSyw18Ch
F+pTVAOUIHndZtrbRrM=
=Y34n
-----END PGP SIGNATURE-----
--lsFhQSOGQqmmCeA2q8PkCbp9lgODBAAeS--