Is it me or NANOG's AS allowing spoofing?
https://spoofer.caida.org/as.php?asn=19230
On 17-08-03 09:19 PM, Matthew Luckie wrote:
> Hi,
>
> The CAIDA Spoofer project has been collecting and publicly sharing
> data on the deployment of source address validation since March 2016.
To my knowledge this is the meeting network.
https://spoofer.caida.org/recent_tests.php?as_include=19230
Your interpretation of the results is congruent with mine. If you look
through the history of tests you can see SAV is usually deployed on the
network during the meeting.
This is true of oth
Hi,
The CAIDA Spoofer project has been collecting and publicly sharing
data on the deployment of source address validation since March 2016.
We've built up a reasonably large install-base of the open-source
client, and receive tests from 400-500 unique IPs per day. We're
posting re
, 2009 at 11:36:18AM -0400, Robert Beverly wrote:
Hi, as many of you are acutely aware, IP source spoofing is still a
common attack vector. The ANA spoofer project:
http://spoofer.csail.mit.edu
first began quantifying the extent of source verification in 2005.
We've amas
Hi, as many of you are acutely aware, IP source spoofing is still a
common attack vector. The ANA spoofer project:
http://spoofer.csail.mit.edu
first began quantifying the extent of source verification in 2005.
We've amassed several years worth of data -- data that has become
particu
5 matches
Mail list logo