Interesting tidbit, thanks for sharing. I do all the proper filtering but 
didn't consider blocking spoofing attacks from the outside. Not seeing much on 
how a Mikrotik would handle this. Probably firewall? 

[ https://www.wavedirect.net/ |    ] 
[ https://www.facebook.com/ruralhighspeed ] [ 
https://www.instagram.com/wave.direct/ ] [ 
https://www.linkedin.com/company/wavedirect-telecommunication/ ] [ 
https://twitter.com/wavedirect1 ] [ https://www.youtube.com/user/WaveDirect ] 
        STEVEN KENNEY 
DIRECTOR OF GLOBAL CONNECTIVITY & CONTINUITY A: 158 Erie St. N | Leamington ON 
E: st...@wavedirect.org | P: 519-737-9283 
W: www.wavedirect.net 


From: "John Osmon" <jos...@rigozsaurus.com> 
To: "af" <af@af.afmug.com> 
Sent: Monday, October 12, 2020 11:57:26 PM 
Subject: Re: [AFMUG] Brigham Young University's Internet Measurement and 
Anti-Abuse Laboratory 

On Mon, Oct 12, 2020 at 05:49:18PM -0400, Mark - Myakka Technologies wrote: 
[...] 
> I can not think of any 
> valid reason for someone to spoof my IP on incoming packets. 

There are some asymmetrical cases where you may see your own addresses 
coming in over an edge router. Most of them are solved better with 
VPNs, but they do exist. 

There are few cases anymore where not following BCP38 is required... 

-- 
AF mailing list 
AF@af.afmug.com 
http://af.afmug.com/mailman/listinfo/af_af.afmug.com 
-- 
AF mailing list
AF@af.afmug.com
http://af.afmug.com/mailman/listinfo/af_af.afmug.com

Reply via email to