<sarcasm> Do not forget the "NRA" ways.
Circular discussions every time an event arise, let it die out after a few days, and hopefully, nothing change. ----- Alain Hebert aheb...@pubnix.net PubNIX Inc. 50 boul. St-Charles P.O. Box 26770 Beaconsfield, Quebec H9W 6G7 Tel: 514-990-5911 http://www.pubnix.net Fax: 514-990-9443 On 09/27/16 14:16, Joe Klein wrote: > The knobs that are available to push adoption of any standard can include > "Doing nothing", "Educating the community", "Incentives", "Public > Shaming", "Loss of business", "Engaging the policy & legal wanks". It seems > to me the first two options have not moved the ball much. > > Must we move the last four to fix the DDOS problem? The last one scares me, > but the other three might be valid method to move the ball. > > Joe Klein > "Inveniam viam aut faciam" > > PGP Fingerprint: 295E 2691 F377 C87D 2841 00C1 4174 FEDF 8ECF 0CC8 > > On Tue, Sep 27, 2016 at 10:32 AM, Mikael Abrahamsson <swm...@swm.pp.se> > wrote: > >> On Tue, 27 Sep 2016, Joe Klein wrote: >> >> What would it take to test for BCP38 for a specific AS? >> Well, you can get people to run https://www.caida.org/projects >> /spoofer/#software >> >> I tried to get OpenWrt to include similar software, on by default, but >> some people are afraid that they might incur legal action on themselves by >> doing antispoofing-testing. >> >> https://www.ripe.net/participate/ripe/tf/anti-spoofing might be of >> interest. >> >> >> -- >> Mikael Abrahamsson email: swm...@swm.pp.se >>