On 2017-03-01 23:49, Jeroen Massar wrote:
> On 2017-03-01 17:02, Franziska Lichtblau wrote:
[..]
Related paper:
http://www.caida.org/publications/papers/2017/using_loops_observed_traceroute/
Using Loops Observed in Traceroute to Infer the Ability to Spoof
8<---
Despite source IP address
On 2017-03-01 17:02, Franziska Lichtblau wrote:
> On Wed, Mar 01, 2017 at 12:50:49PM +0100, Jeroen Massar wrote:
>> On 2017-03-01 11:59, Franziska Lichtblau wrote:
>> [..]
Oh, and indeed, Switzerland is a bad place for BCP38, most networks
allow spoofing on both IPv4 and IPv6.
>>>
>>>
On Wed, Mar 01, 2017 at 12:50:49PM +0100, Jeroen Massar wrote:
> On 2017-03-01 11:59, Franziska Lichtblau wrote:
> [..]
> >> Oh, and indeed, Switzerland is a bad place for BCP38, most networks
> >> allow spoofing on both IPv4 and IPv6.
> >
> > Which is "kinda good" for me cause only answers from
On 2017-03-01 11:59, Franziska Lichtblau wrote:
[..]
>> Oh, and indeed, Switzerland is a bad place for BCP38, most networks
>> allow spoofing on both IPv4 and IPv6.
>
> Which is "kinda good" for me cause only answers from people who are
> implementing
> all of that won't help us much
On Wed, Mar 01, 2017 at 11:22:44AM +0100, Jeroen Massar wrote:
> On 2017-03-01 09:58, Franziska Lichtblau wrote:
> > we are a team of researchers from TU Berlin [1] working on a measurement
> > project
> > to assess the ramifications of traffic with spoofed source IP addresses in
> > the
> >
On 2017-03-01 09:58, Franziska Lichtblau wrote:
> Hi,
>
> we are a team of researchers from TU Berlin [1] working on a measurement
> project
> to assess the ramifications of traffic with spoofed source IP addresses in
> the
> Internet.
>
> To better understand the operational challenges that
6 matches
Mail list logo