This archive is retained to ensure existing URLs remain functional. It will not contain any emails sent to this mailing list after July 1, 2024. For all messages, including those sent before and after this date, please visit the new location of the archive at https://mailman.ripe.net/archives/list/ripe-atlas@ripe.net/
[atlas] Spoofing measurenments
- Previous message (by thread): [atlas] Spoofing measurenments
- Next message (by thread): [atlas] Spoofing measurenment
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
Karsten Thomann
karsten_thomann at linfre.de
Tue Nov 17 19:12:47 CET 2015
I don't think the measurement would show usable results, as you don't know if the cpe at the probe would block unknown sources or the provider. For example at my home the v4 connection uses the provider owned cpe nat and v6 would go through my firewall as the sixxs tunnel terminate on it. How would you know where the anti spoofing is implemented? Gesendet von meinem BlackBerry Originalnachricht Von: Peter Koch Gesendet: Dienstag, 17. November 2015 19:02 An: ripe-atlas at ripe.net Betreff: Re: [atlas] Spoofing measurenments On Tue, Nov 17, 2015 at 07:50:16PM +0300, Pavel Odintsov wrote: > Could we detect probe hosts who do not deploy outgoing filtering and > accept spoofed traffic? while this may sound tempting, I think it would be more helpful in the long run to maintain atlas probes as a tool to map the Internet rather than as "spy in the house". -Peter
- Previous message (by thread): [atlas] Spoofing measurenments
- Next message (by thread): [atlas] Spoofing measurenment
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]