Is it me or NANOG's AS allowing spoofing? https://spoofer.caida.org/as.php?asn=19230
On 17-08-03 09:19 PM, Matthew Luckie wrote: > Hi, > > The CAIDA Spoofer project has been collecting and publicly sharing > data on the deployment of source address validation since March 2016. > We've built up a reasonably large install-base of the open-source > client, and receive tests from 400-500 unique IPs per day. We're > posting reports with links to test outcomes on the spoofer website. > In particular, we've got summary statistics for each AS at: > > https://spoofer.caida.org/as_stats.php > > If you know an operator for anyone on that list who has at least one > spoofable prefix, please feel free to reach out to them and let them > know. I've been sending emails to abuse contacts for nearly a year > now. Roughly 1/5 ASes I've contacted have fixed at least one problem. > The remediation we know about (automatically generated) is at: > > https://spoofer.caida.org/remedy.php > > In order to improve the notification emails, I'm also soliciting > configuration snippets from operators who have deployed source address > validation. If you have deployed SAV and wouldn't mind sharing > redacted configuration (privately is fine) including any necessary > platform details (such as vendor and operating system) we would > greatly appreciate it. We will aggregate and post configuration > snippets at https://spoofer.caida.org/ > > Matthew >