From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.taht.net (mail.taht.net [IPv6:2a01:7e00::f03c:91ff:feae:7028]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by lists.bufferbloat.net (Postfix) with ESMTPS id DD8393B2A4 for ; Mon, 17 Apr 2017 12:31:05 -0400 (EDT) Received: from nemesis.taht.net (unknown [IPv6:2601:646:8501:df5:2e0:4cff:fec1:1206]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.taht.net (Postfix) with ESMTPSA id 967EA22894 for ; Mon, 17 Apr 2017 16:31:04 +0000 (UTC) From: Dave Taht To: cerowrt-devel@lists.bufferbloat.net Date: Mon, 17 Apr 2017 09:31:02 -0700 Message-ID: <87tw5nt2rd.fsf@nemesis.taht.net> MIME-Version: 1.0 Content-Type: text/plain Subject: [Cerowrt-devel] bcp38 and the caida "spoofer" tool X-BeenThere: cerowrt-devel@lists.bufferbloat.net X-Mailman-Version: 2.1.20 Precedence: list List-Id: Development issues regarding the cerowrt test router project List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 17 Apr 2017 16:31:06 -0000 from this thread: https://forum.turris.cz/t/implementing-bcp38-in-firewall/3944 I was just pointed at a very cool caida tool called "spoofer", which I think I'm going to start run regularly on my networks. https://www.caida.org/projects/spoofer/#software I am curious as to how many here are using the lede/openwrt bcp38 package?