This archive is retained to ensure existing URLs remain functional. It will not contain any emails sent to this mailing list after July 1, 2024. For all messages, including those sent before and after this date, please visit the new location of the archive at https://mailman.ripe.net/archives/list/[email protected]/
[atlas] "Spoofing" tests.
- Previous message (by thread): [atlas] "Spoofing" tests.
- Next message (by thread): [atlas] "Spoofing" tests.
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
Lorenzo Colitti
lorenzo at google.com
Wed Sep 18 06:42:36 CEST 2013
On Sun, Sep 15, 2013 at 11:57 AM, Randy Bush <randy at psg.com> wrote: > then again, if you think most of the botnets are behind broadband home > networks, it makes an interesting sample. compare spoof density of > natted vs un-natted. but then, how you gonna spoof from behind a nat? > Just send the packet? I expect a nontrivial proportion of NATs will just say "Source address not in 192.168.1.0/24? Cool, don't have to NAT! Just pass it along." :-) -------------- next part -------------- An HTML attachment was scrubbed... URL: </ripe/mail/archives/ripe-atlas/attachments/20130918/dd61ca4d/attachment.html>
- Previous message (by thread): [atlas] "Spoofing" tests.
- Next message (by thread): [atlas] "Spoofing" tests.
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]