Hi,

For a test I ran on my native IPv6 connection it shows up under "ingress spoofing summary" that spoofed IPv6 packets are being received, both for "private" and "internal"

I am myself an ISP engineer, and I know ISP engineers at my ISP. They have looked into their IPv6 setup, and as far as I they can tell, they do antispoofing ACL on all their border/peering routers on ports towards other ISPs:

60 deny ipv6 2a04:ae00::/26 any

The egress spoofing is well documented in the FAQ, but I can't find exactly what the tests are for "ingress spoofing". What is private (is this ULA?) What is "internal" when it comes to IPv6?

All other tests look fine, I can't spoof anything outside of my /56 PD, and all the IPv4 tests also look fine.

IPv6 Result Summary:
  ASN: 39651
   Spoofed private addresses, egress: blocked
   Spoofed routable addresses, egress: blocked
   Spoofed private addresses, ingress: received
   Spoofed internal addresses, ingress: received

--
Mikael Abrahamsson    email: [email protected]

_______________________________________________
spoofer-users mailing list
[email protected]
https://mailman.caida.org/mailman/listinfo/spoofer-users

Reply via email to