[spoofer-users] [spoofer-info] Operating system restriction

Zach Norris znorris at gmail.com
Wed Sep 23 06:52:13 PDT 2015


Ken,

Attached are the outputs of that command you requested that I run. I'm not
sure why IPv6 suddenly started failing either as I verified IPv6
connectivity. Also:

Linux phong 3.16.0-49-generic #65~14.04.1-Ubuntu SMP Wed Sep 9 10:03:23 UTC
2015 x86_64 x86_64 x86_64 GNU/Linux

root at phong:/proc/sys/net/ipv4/conf/eth0# cat rp_filter
0

root at phong:/proc/sys/net/ipv4/conf/all# cat rp_filter
0


-Zach

On Tue, Sep 15, 2015 at 3:00 PM, Ken Keys <kkeys at caida.org> wrote:

> Zach,
>
> Could you repeat the run with the "-vvv" option, capture the output, and
> send it to us?
> E.g.:  sudo ./spoofer -vvv >spoofer.log 2>&1
> That will give us more information to help figure out what's wrong.
>
>
> On 2015-09-14 19:51, Matthew Luckie wrote:
>
> Hi Zach,
>
> Thanks for your report.
>
> Can you provide us the URL for your report?  Also, what operating system
> and what version of spoofer were you using?
>
> Matthew
>
> On 09/15/15 14:17, Zach Norris wrote:
>
> I'm attempting to test if my ISP allows for IP spoofing. Unfortunately
> I'm seeing this error in the generated report, "The spoofer was unable
> to send spoofed headers due to an operating system restriction."
>
> Here is a snippet from my most recent run of spoofer:
>
>
> Test scenario with 52 probes
>
> Sourcing non-spoofed IPv4 validation probes: 1..2..3..4..5..6..7..
> Sourcing spoofed IPv4 probes (please wait): 1..(L3)*** Warn: Unable
>
> to spoof with raw ip.
> (L2)*** Warn: 130.206.158.142 <http://130.206.158.142> <http://130.206.158.142>: No route to host
> 2..*** Warn: 130.206.158.142 <http://130.206.158.142> <http://130.206.158.142>: No route to host
> 3..*** Warn: 130.206.158.142 <http://130.206.158.142> <http://130.206.158.142>: No route to host
> 4..*** Warn: 130.217.77.6 <http://130.217.77.6> <http://130.217.77.6>: No route to host
> 5..*** Warn: 130.217.77.6 <http://130.217.77.6> <http://130.217.77.6>: No route to host
> 6..*** Warn: 130.217.77.6 <http://130.217.77.6> <http://130.217.77.6>: No route to host
> 7..*** Warn: 139.91.90.6 <http://139.91.90.6> <http://139.91.90.6>: No route to host
> 8..*** Warn: 139.91.90.6 <http://139.91.90.6> <http://139.91.90.6>: No route to host
> 9..*** Warn: 139.91.90.6 <http://139.91.90.6> <http://139.91.90.6>: No route to host
> 10..*** Warn: 78.41.116.2 <http://78.41.116.2> <http://78.41.116.2>: No route to host
>
> ...
>
>
> Performing tracefilter [TTL: 1..*** Warn: 192.172.226.240
>
> <http://192.172.226.240> <http://192.172.226.240>: No route to host
> 2..*** Warn: 192.172.226.240 <http://192.172.226.240> <http://192.172.226.240>: No route to host
> 3..*** Warn: 192.172.226.240 <http://192.172.226.240> <http://192.172.226.240>: No route to host
> 4..*** Warn: 192.172.226.240 <http://192.172.226.240> <http://192.172.226.240>: No route to host
> 5..*** Warn: 192.172.226.240 <http://192.172.226.240> <http://192.172.226.240>: No route to host
>
> ...
>
> I verified that I do have reverse path filter disabled on all ipv4
> interfaces. I've also disabled any source IP filtering at my router and
> no longer see any dropped packets because of this. I would think that
> packets should be making it, at least, to the first ISP router.
>
> Does anyone have any suggestions? I feel as though I'm not testing properly.
>
> Thank you,
> Zach
>
>
> _______________________________________________
> spoofer-info mailing listspoofer-info at caida.orghttps://rommie.caida.org/mailman/listinfo/spoofer-info
>
>
>
> _______________________________________________
> spoofer-info mailing listspoofer-info at caida.orghttps://rommie.caida.org/mailman/listinfo/spoofer-info
>
>
> --
> Ken Keyskkeys at caida.org
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://rommie.caida.org/pipermail/spoofer-users/attachments/20150923/6525c8f0/attachment-0001.htm
-------------- next part --------------
A non-text attachment was scrubbed...
Name: spoofer.log
Type: text/x-log
Size: 76783 bytes
Desc: not available
Url : http://rommie.caida.org/pipermail/spoofer-users/attachments/20150923/6525c8f0/spoofer-0001.bin
-------------- next part --------------
A non-text attachment was scrubbed...
Name: spoofer2.log
Type: text/x-log
Size: 76784 bytes
Desc: not available
Url : http://rommie.caida.org/pipermail/spoofer-users/attachments/20150923/6525c8f0/spoofer2-0001.bin


More information about the spoofer-users mailing list