[195430] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Spoofer Project

daemon@ATHENA.MIT.EDU (Matthew Luckie)
Tue Aug 8 19:46:28 2017

X-Original-To: nanog@nanog.org
To: "Info | ddostest.me" <info@ddostest.me>, NANOG <nanog@nanog.org>
From: Matthew Luckie <mjl@caida.org>
Date: Wed, 9 Aug 2017 11:45:56 +1200
Errors-To: nanog-bounces@nanog.org

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--lsFhQSOGQqmmCeA2q8PkCbp9lgODBAAeS
From: Matthew Luckie <mjl@caida.org>
To: "Info | ddostest.me" <info@ddostest.me>, NANOG <nanog@nanog.org>
Message-ID: <e6c741f0-1665-c8f7-5df4-2e4f07648c35@caida.org>
Subject: Re: Spoofer Project
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

To my knowledge this is the meeting network.

https://spoofer.caida.org/recent_tests.php?as_include=3D19230

Your interpretation of the results is congruent with mine.  If you look
through the history of tests you can see SAV is usually deployed on the
network during the meeting.

This is true of other network operator group meeting networks as well.

On 08/09/17 11:25, Info | ddostest.me wrote:
> Is it me or NANOG's AS allowing spoofing?
>=20
> https://spoofer.caida.org/as.php?asn=3D19230


--lsFhQSOGQqmmCeA2q8PkCbp9lgODBAAeS
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----

iGwEARECACwWIQTXPLTkr00GLuDVs20rK4MpIRAAYAUCWYpNOA4cbWpsQGNhaWRh
Lm9yZwAKCRArK4MpIRAAYNCqAJkB9AtKA9Q7H0vFKZZzbFqXznEvVACfWSyw18Ch
F+pTVAOUIHndZtrbRrM=
=Y34n
-----END PGP SIGNATURE-----

--lsFhQSOGQqmmCeA2q8PkCbp9lgODBAAeS--

home help back first fref pref prev next nref lref last post