On Wed, 2009-01-21 at 12:44 +1100, Mark Andrews wrote:
>         You should talk to your ISP to chase the traffic back to
>         its source and get BCP 38 implemented there.  BCP 38 is ~10
>         years old now.  There is no excuse for not filtering spoofed
>         traffic.

        Absolutely.

        Putting myself at the other end of the telescope, I'm wondering
        what tools (if any) are available for verifying that the ingress
        filtering actually in place is indeed compliant with BCP 38.

        I try to be conscientious, but drawing valid conclusions from 
        visual inspection of the ACLs is already a challenge for my 
        domestic network (3 LANs and an upstream).  Enterprise (even 
        with only one upstream) or ISP networks are likely more 
        difficult to verify.

        Pointers for my next RTFM binge are welcome.  Further discussion
        is probably off-topic for the bind-users list.

        /Niall


_______________________________________________
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to