On 03/31/13 21:50, Jason Lixfeld wrote:
> On 2013-03-31, at 9:43 PM, Peter Baldridge <[email protected]> wrote:
>
>> I can assume that If you are spoofing packets, resetting passwords on cpe
>> and replacing the box would be trivial. So it's questionable how useful
>> this is. It seems like it just adds cost to for customers that can't spoof
>> a packet to save their lives.
> Maybe it's useful for the people who have no idea that their computers are
> infected by bots that spoof packets.
>
>> On Mar 31, 2013 6:37 PM, "Jason Lixfeld" <[email protected]> wrote:
>>
>> On 2013-03-31, at 10:48 AM, Jay Ashworth <[email protected]> wrote:
>>
>>> Is there a program which users can run on an end-site workstation which
>>> would test whether they are being some link which is doing BCP38, or some
>>> related type of source-address ingress filtering?
>>>
>>> I'm hoping for something that could be downloaded by users and run, and
>>> try to forge a few packets to somewhere useful, which could be logged
>>> somehow in conjunction with some unforged packets containing a traceroute,
>>> so we could build up a database of leaky networks.
>>>
>>> On a related topic, while I know GRC Research's Steve Gibson is a bit of
>>> a polarizing personality, he does have a fairly sizable consumer audience,
>>> and might be a great distribution venue for such a thing.
>>>
>>> Or, perhaps, is there someone on here from Ookla?
>>>
>>> Patrick? Could Akamai be persuaded to take an interest in this as a
>>> research project?
>>
>> From my perspective, 99% of end-users probably don't understand (or care)
>> that their provider might be responsible for initiating or precipitating a
>> DDoS attacks, period. Most network operators are probably either too
>> inexperienced to understand or too lazy to care.
>>
>> I believe that most everyone has a CPE of some sort, whether their service
>> is resi or commercial. So, what about shifting the focus to the CPE
>> manufacturers? They bend to technology and/or market pressures by bringing
>> things like NAT, Firewalls, DLNA, UPnP, IPv6 (heh), PPPoE, RFC1483, etc. to
>> their respective products in to satisfy technology limitations or security
>> concerns or whatever. Why can't they help the cause by implementing some
>> sort of RFC'ified BCP38 thing?
>>
An easy target would be anti-virus/trojan/security software
providers that could add a BCP38 check to their software =D
-----
Alain Hebert [email protected]
PubNIX Inc.
50 boul. St-Charles
P.O. Box 26770 Beaconsfield, Quebec H9W 6G7
Tel: 514-990-5911 http://www.pubnix.net Fax: 514-990-9443