[atlas] "Spoofing" tests.
- Previous message (by thread): [atlas] "Spoofing" tests.
- Next message (by thread): [atlas] "Spoofing" tests.
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
Andrei Robachevsky
robachevsky at isoc.org
Mon Sep 9 09:33:49 CEST 2013
I think that would be one way to alleviate the concerns, yes. Also note that we are talking about special category of users who have somewhat more control over their network - not a typical BB user sitting behind a NAT. Another important question IMO is how these data is going to be used. Several people I talked to were supporting of the idea of instigating an "anti-spoofing" movement among the ISPs, where in order to get (and stay) on a public list of networks who care one needs to pass anti-spoofing tests. Atlas and Spoofer would be instrumental in this effort. Andrei Warren Kumari wrote on 9/7/13 7:24 PM: > Apologies if this has already been discussed enlist -- I took a quick look though the archives and didn't see it. > > I believe that the reason for not allowing things like tests that send spoofed packets is that it might violate the AUP that participants have with their ISPs / be viewed by participants ISPs as an attack. > > So, what about having a checkbox in the Probe Settings that says something like: "I have no AUP with my ISP or I'm fine to violate my AUP. Run intrusive or dangerous tests on this probe" ? This would create a subset of probes that could be used for more interesting tests, an d would allow for greater visibility into things. > > W > > --- > It is a mistake to think you can solve any major problem just with potatoes. --Douglas Adams > >
- Previous message (by thread): [atlas] "Spoofing" tests.
- Next message (by thread): [atlas] "Spoofing" tests.
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]