From swmike at swm.pp.se Tue Aug 29 04:21:10 2017 From: swmike at swm.pp.se (Mikael Abrahamsson) Date: Tue, 29 Aug 2017 13:21:10 +0200 (CEST) Subject: [spoofer-users] query regarding the spoofer project Message-ID: Hi, For a test I ran on my native IPv6 connection it shows up under "ingress spoofing summary" that spoofed IPv6 packets are being received, both for "private" and "internal" I am myself an ISP engineer, and I know ISP engineers at my ISP. They have looked into their IPv6 setup, and as far as I they can tell, they do antispoofing ACL on all their border/peering routers on ports towards other ISPs: 60 deny ipv6 2a04:ae00::/26 any The egress spoofing is well documented in the FAQ, but I can't find exactly what the tests are for "ingress spoofing". What is private (is this ULA?) What is "internal" when it comes to IPv6? All other tests look fine, I can't spoof anything outside of my /56 PD, and all the IPv4 tests also look fine. >> IPv6 Result Summary: >> ASN: 39651 >> Spoofed private addresses, egress: blocked >> Spoofed routable addresses, egress: blocked >> Spoofed private addresses, ingress: received >> Spoofed internal addresses, ingress: received -- Mikael Abrahamsson email: swmike at swm.pp.se