In response to feedback from operational security communities,
CAIDA's source address validation measurement project
(https://spoofer.caida.org) is automatically generating monthly
reports of ASes originating prefixes in BGP for systems from which
we received packets with a spoofed source address.
We are publishing these reports to network and security operations
lists in order to ensure this information reaches operational
contacts in these ASes.

This report summarises tests conducted within aus.

Inferred improvements during Nov 2020:
 none inferred

Source Address Validation issues inferred during Nov 2020:
ASN    Name                           First-Spoofed Last-Spoofed
38195  SUPERLOOP                         2018-02-02   2020-11-13
45671  AS45671-NET-AU                    2020-08-18   2020-11-25
134697 LAUNTEL                           2020-09-02   2020-11-29

Further information for these tests where we received spoofed
packets is available at:
https://spoofer.caida.org/recent_tests.php?country_include=aus&no_block=1

Source Address Validation issues inferred during Nov 2020
using open resolver tests:
ASN    Name                           Last-Detected
4739   INTERNODE                         2020-11-27
4637   ASN-TELSTRA-GLOBAL                2020-11-26
131284 ETISALATAFG                       2020-11-24

Further information for these tests is available at:
https://spoofer.caida.org/ornog.php?country_include=aus

Please send any feedback or suggestions to spoofer-i...@caida.org
_______________________________________________
AusNOG mailing list
AusNOG@lists.ausnog.net
http://lists.ausnog.net/mailman/listinfo/ausnog

Reply via email to