[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Spoofer Project
- Subject: Spoofer Project
- From: jean at ddostest.me (Jean | ddostest.me)
- Date: Wed, 9 Aug 2017 18:19:11 -0400
- In-reply-to: <[email protected]>
- References: <[email protected]>
Is it me or NANOG's AS allowing spoofing?
https://spoofer.caida.org/as.php?asn=19230
On 17-08-03 09:19 PM, Matthew Luckie wrote:
> Hi,
>
> The CAIDA Spoofer project has been collecting and publicly sharing
> data on the deployment of source address validation since March 2016.
> We've built up a reasonably large install-base of the open-source
> client, and receive tests from 400-500 unique IPs per day. We're
> posting reports with links to test outcomes on the spoofer website.
> In particular, we've got summary statistics for each AS at:
>
> https://spoofer.caida.org/as_stats.php
>
> If you know an operator for anyone on that list who has at least one
> spoofable prefix, please feel free to reach out to them and let them
> know. I've been sending emails to abuse contacts for nearly a year
> now. Roughly 1/5 ASes I've contacted have fixed at least one problem.
> The remediation we know about (automatically generated) is at:
>
> https://spoofer.caida.org/remedy.php
>
> In order to improve the notification emails, I'm also soliciting
> configuration snippets from operators who have deployed source address
> validation. If you have deployed SAV and wouldn't mind sharing
> redacted configuration (privately is fine) including any necessary
> platform details (such as vendor and operating system) we would
> greatly appreciate it. We will aggregate and post configuration
> snippets at https://spoofer.caida.org/
>
> Matthew
>