Dino,
The Spoofer Project (http://spoofer.cmand.org/summary.php) offers a
longitudinal view of BCP 38 deployment. I think that the results that they
report validate Sander's objection. Furthermore, they may suggest that Sander's
objection will remain valid for years to come.
Ron
> -----Original Message-----
> From: Dino Farinacci [mailto:[email protected]]
> Sent: Friday, May 16, 2014 7:37 PM
> To: Sander Steffann
> Cc: Ronald Bonica; Roger Jorgensen; [email protected]
> Subject: Re: [lisp] Restarting last call on LISP threats
>
> > Unfortunately this is not unlikely :( I certainly wouldn't consider it an
> amazing feat... BCP38 is not implemented as much as it should be.
>
> I know there are many cases where BCP38 is not practice but more and more
> access providers due uRPF.
>
> You only need one in the path. And the ones that don't do it are using
> resources to transit packets to possible black holes.
>
> Dino
_______________________________________________
lisp mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/lisp