Skip to main content

Methods for Remotely Measuring IP Spoofing Capability
draft-wang-bmwg-measure-meth-ip-spoofing-00

Document Type Expired Internet-Draft (individual)
Expired & archived
Authors Shuai Wang , Dan Li , Ruifeng Li , Qian Cao
Last updated 2024-10-12 (Latest revision 2024-04-10)
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

This document summarizes and standardizes methods for remotely measuring a network's IP spoofing capability. For outbound spoofing capability measurement, i.e., whether the network allows IP spoofing traffic to be sent from inside the network to the outside of the network, DNS traceroute can be used to check whether spoofed packets are generated in the network and sent to outside of the network. For inbound spoofing capability measurment, i.e., whether the network allows IP spoofing traffic from the outside the network to arrive inside, DNS resolver and ICMPv6 rate limiting mechanism can be utilized to check whether spoofed packets are received by devices in the network.

Authors

Shuai Wang
Dan Li
Ruifeng Li
Qian Cao

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)