Hi, as many of you are acutely aware, IP source spoofing is still a
common attack vector. The ANA spoofer project:
http://spoofer.csail.mit.edu
first began quantifying the extent of source verification in 2005.
We've amassed several years worth of data -- data that has become
particularly interesting in light of recent attacks. However, our
data raised as many questions as it answered. Hence, we have
developed a new version of the tester designed to answer these
questions and improve our Internet-wide inferences.
What's New:
In addition to new tests, we've hooked into CAIDA's Ark
infrastructure which allows us to perform multiple
path-based measurements. This information is presented to
the client now in visual form; see the screenshots for an
example report:
http://spoofer.csail.mit.edu/example/example.php
How you can help:
Simple -- take a few minutes to download and run the
tester. The more points you can run the tester from, the
better.
Comments/Flames:
Welcome, and we appreciate all feedback. Be sure to read
the FAQ: http://spoofer.csail.mit.edu/faq.php
Many thanks,
rob