Someone privately emailed me asking about the problems I had. When I
looked at it some more, I found the autoconf error was just very
misleading, and my build environment was incomplete. With all the right
tools installed, it built just fine on the Ubuntu 12.04 64-bit machine I
was playing on.
On Sun, 31 Mar 2013, Jon Lewis wrote:
They should updated their autoconf. It fails on modern 64-bit Linux.
On Sun, 31 Mar 2013, Paul Ferguson wrote:
You mean like this? :-)
http://spoofer.csail.mit.edu/
- ferg
On Sun, Mar 31, 2013 at 7:48 AM, Jay Ashworth <j...@baylink.com> wrote:
Is there a program which users can run on an end-site workstation which
would test whether they are being some link which is doing BCP38, or some
related type of source-address ingress filtering?
I'm hoping for something that could be downloaded by users and run, and
try to forge a few packets to somewhere useful, which could be logged
somehow in conjunction with some unforged packets containing a traceroute,
so we could build up a database of leaky networks.
On a related topic, while I know GRC Research's Steve Gibson is a bit of
a polarizing personality, he does have a fairly sizable consumer audience,
and might be a great distribution venue for such a thing.
Or, perhaps, is there someone on here from Ookla?
Patrick? Could Akamai be persuaded to take an interest in this as a
research project?
Cheers,
-- jra
--
Jay R. Ashworth Baylink
j...@baylink.com
Designer The Things I Think RFC
2100
Ashworth & Associates http://baylink.pitas.com 2000 Land Rover
DII
St Petersburg FL USA #natog +1 727 647
1274
--
"Fergie", a.k.a. Paul Ferguson
fergdawgster(at)gmail.com
----------------------------------------------------------------------
Jon Lewis, MCP :) | I route
| therefore you are
_________ http://www.lewis.org/~jlewis/pgp for PGP public key_________
----------------------------------------------------------------------
Jon Lewis, MCP :) | I route
| therefore you are
_________ http://www.lewis.org/~jlewis/pgp for PGP public key_________