[spoofer-users] query regarding the spoofer project
Mikael Abrahamsson
swmike at swm.pp.se
Tue Aug 29 04:21:10 PDT 2017
Hi,
For a test I ran on my native IPv6 connection it shows up under "ingress
spoofing summary" that spoofed IPv6 packets are being received, both for
"private" and "internal"
I am myself an ISP engineer, and I know ISP engineers at my ISP. They have
looked into their IPv6 setup, and as far as I they can tell, they do
antispoofing ACL on all their border/peering routers on ports towards other
ISPs:
60 deny ipv6 2a04:ae00::/26 any
The egress spoofing is well documented in the FAQ, but I can't find exactly
what the tests are for "ingress spoofing". What is private (is this ULA?) What
is "internal" when it comes to IPv6?
All other tests look fine, I can't spoof anything outside of my /56 PD, and all
the IPv4 tests also look fine.
>> IPv6 Result Summary:
>> ASN: 39651
>> Spoofed private addresses, egress: blocked
>> Spoofed routable addresses, egress: blocked
>> Spoofed private addresses, ingress: received
>> Spoofed internal addresses, ingress: received
--
Mikael Abrahamsson email: swmike at swm.pp.se
More information about the spoofer-users
mailing list