[spoofer-users] query regarding the spoofer project

Mikael Abrahamsson swmike at swm.pp.se
Tue Aug 29 04:21:10 PDT 2017


Hi,

For a test I ran on my native IPv6 connection it shows up under "ingress 
spoofing summary" that spoofed IPv6 packets are being received, both for 
"private" and "internal"

I am myself an ISP engineer, and I know ISP engineers at my ISP. They have 
looked into their IPv6 setup, and as far as I they can tell, they do 
antispoofing ACL on all their border/peering routers on ports towards other 
ISPs:

60 deny ipv6 2a04:ae00::/26 any

The egress spoofing is well documented in the FAQ, but I can't find exactly 
what the tests are for "ingress spoofing". What is private (is this ULA?) What 
is "internal" when it comes to IPv6?

All other tests look fine, I can't spoof anything outside of my /56 PD, and all 
the IPv4 tests also look fine.

>> IPv6 Result Summary:
>>   ASN: 39651
>>    Spoofed private addresses, egress: blocked
>>    Spoofed routable addresses, egress: blocked
>>    Spoofed private addresses, ingress: received
>>    Spoofed internal addresses, ingress: received

-- 
Mikael Abrahamsson    email: swmike at swm.pp.se



More information about the spoofer-users mailing list