This archive is retained to ensure existing URLs remain functional. It will not contain any emails sent to this mailing list after July 1, 2024. For all messages, including those sent before and after this date, please visit the new location of the archive at https://mailman.ripe.net/archives/list/ripe-atlas@ripe.net/
[atlas] Spoofing the source IP address from a probe?
- Previous message (by thread): [atlas] Spoofing the source IP address from a probe?
- Next message (by thread): [atlas] Spoofing the source IP address from a probe?
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
Daniel Karrenberg
daniel.karrenberg at ripe.net
Wed Jun 12 20:37:24 CEST 2013
On 12.06.2013, at 17:44 , Joe Provo <jzp-ripe at rsuc.gweep.net> wrote: > I would encourage those in the community who wish to be > performing individual spoof testing (or instruct others how > to do so) to use the easy-peasey pointy-clicky CAIDA/CSAIL > tool: http://spoofer.cmand.org/ > (also spoofer.csail.mit.edu, spooftest.net, etc etc) Seconded. Using this something like this is a conscious decision of the user. I have personally run Robert Beverley's probes regularly for many years and I am proud to say that both my broadband providers have never allowed source address spoofing. This involves a conscious decision on my part taking into account local network etiquette, my relation to my providers and the local legal situation. It is very very different from the RIPE community deciding to use RIPE Atlas to do this from my network. Daniel
- Previous message (by thread): [atlas] Spoofing the source IP address from a probe?
- Next message (by thread): [atlas] Spoofing the source IP address from a probe?
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]