Re: Spoofer Project

2017-08-10 Thread Jean | ddostest.me via NANOG
Is it me or NANOG's AS allowing spoofing? https://spoofer.caida.org/as.php?asn=19230 On 17-08-03 09:19 PM, Matthew Luckie wrote: > Hi, > > The CAIDA Spoofer project has been collecting and publicly sharing > data on the deployment of source address validation since March 2016.

Re: Spoofer Project

2017-08-08 Thread Matthew Luckie
To my knowledge this is the meeting network. https://spoofer.caida.org/recent_tests.php?as_include=19230 Your interpretation of the results is congruent with mine. If you look through the history of tests you can see SAV is usually deployed on the network during the meeting. This is true of oth

Spoofer Project

2017-08-08 Thread Matthew Luckie
Hi, The CAIDA Spoofer project has been collecting and publicly sharing data on the deployment of source address validation since March 2016. We've built up a reasonably large install-base of the open-source client, and receive tests from 400-500 unique IPs per day. We're posting re

Re: Spoofer project update -- need 3-5 minutes of your time to test

2009-04-05 Thread k claffy
, 2009 at 11:36:18AM -0400, Robert Beverly wrote: Hi, as many of you are acutely aware, IP source spoofing is still a common attack vector. The ANA spoofer project: http://spoofer.csail.mit.edu first began quantifying the extent of source verification in 2005. We've amas

Spoofer project update

2009-03-31 Thread Robert Beverly
Hi, as many of you are acutely aware, IP source spoofing is still a common attack vector. The ANA spoofer project: http://spoofer.csail.mit.edu first began quantifying the extent of source verification in 2005. We've amassed several years worth of data -- data that has become particu