Spoofer project update

Hi, as many of you are acutely aware, IP source spoofing is still a
common attack vector. The ANA spoofer project:

first began quantifying the extent of source verification in 2005.
We've amassed several years worth of data -- data that has become
particularly interesting in light of recent attacks. However, our
data raised as many questions as it answered. Hence, we have
developed a new version of the tester designed to answer these
questions and improve our Internet-wide inferences.

What's New:
  In addition to new tests, we've hooked into CAIDA's Ark
  infrastructure which allows us to perform multiple
  path-based measurements. This information is presented to
  the client now in visual form; see the screenshots for an
  example report:

How you can help:
  Simple -- take a few minutes to download and run the
  tester. The more points you can run the tester from, the

  Welcome, and we appreciate all feedback. Be sure to read
  the FAQ: http://spoofer.csail.mit.edu/faq.php

Many thanks,


< a call to fingers >

please run this test if you haven't already.
we're trying to get a 2009 baseline on filtering.
i've blogged a reminder at:
and will post results there (and here) too, once we have some.
if you run into any problems, email us.

Internet science: can't do it without you, yada.

ps: if you want to host an Ark node so we can test
topology near you in the future, read
and send us mail.