nanog mailing list archives

Spoofer Report for NANOG for Mar 2018


From: CAIDA Spoofer Project <spoofer-info () caida org>
Date: Mon, 9 Apr 2018 17:44:15 -0700

In response to feedback from operational security communities,
CAIDA's source address validation measurement project
(https://spoofer.caida.org) is automatically generating monthly
reports of ASes originating prefixes in BGP for systems from which
we received packets with a spoofed source address.
We are publishing these reports to network and security operations
lists in order to ensure this information reaches operational
contacts in these ASes.

This report summarises tests conducted within usa, can.

Inferred improvements during Mar 2018:
   ASN Name                                          First-Fixed
 11232 MIDCO-NET                                      2018-03-28
 40801 LEWISU-ROMEOVILLE                              2018-03-28
 33651 CMCS                                           2018-03-29
  7018 ATT-INTERNET4                                  2018-03-31

Further information for the inferred remediation is available at:
https://spoofer.caida.org/remedy.php

Source Address Validation issues inferred during Mar 2018:
   ASN Name                           First-Spoofed Last-Spoofed
   577 BACOM                             2016-03-09   2018-03-31
  7029 WINDSTREAM                        2016-06-21   2018-03-20
   209 CENTURYLINK-US-LEGACY-QWEST       2016-08-16   2018-03-25
 11232 MIDCO-NET                         2016-09-22   2018-03-24
 20412 CLARITY-TELECOM                   2016-09-30   2018-03-31
  6181 FUSE-NET                          2016-10-10   2018-03-25
 62482 AS-LRCOMM                         2016-10-21   2018-03-07
 15305 SYRINGANETWORKS                   2016-10-21   2018-03-28
 25787 ROWE-NETWORKS                     2016-10-21   2018-03-30
   174 COGENT-174                        2016-10-21   2018-03-28
   271 BCNET-AS                          2016-10-24   2018-03-23
 32440 LONI                              2016-11-03   2018-03-29
 33182 DIMENOC                           2016-11-08   2018-03-28
 12083 WOW-INTERNET                      2016-11-09   2018-03-29
  5056 AUREON-5056                       2016-11-10   2018-03-30
  1403 EBOX                              2016-11-12   2018-03-30
 20105 URICHMOND                         2016-11-15   2018-03-28
  3549 LVLT-3549                         2016-11-16   2018-03-29
 54858 AS-SBI                            2016-12-25   2018-03-27
  2152 CSUNET-NW                         2017-02-02   2018-03-31
 21832 KELLINCOM-1                       2017-02-03   2018-03-27
  6461 ZAYO-6461                         2017-06-21   2018-03-27
 26793 ICS-LLC                           2017-08-16   2018-03-25
 30432 UBTANET                           2017-08-23   2018-03-18
 63296 AMARILLO-WIRELESS                 2017-09-01   2018-03-27
  7233 YAHOO-US                          2017-09-07   2018-03-31
 33523 ROWANUNIVERSITY                   2017-10-29   2018-03-27
 11796 AIRSTREAMCOMM-NET                 2017-11-30   2018-03-26
 12222 AKAMAI                            2018-02-14   2018-03-29
 14828 HBCI-1999TA                       2018-02-19   2018-03-18
 55236 CBC                               2018-03-03   2018-03-30
  3257 GTT-BACKBONE                      2018-03-06   2018-03-26
 29384 Qatar-Foundation                  2018-03-08   2018-03-29
 23148 TERRENAP                          2018-03-15   2018-03-29
 22452 NOMINUMII-GLOBAL-NET              2018-03-16   2018-03-16
   226 LOS-NETTOS-AS                     2018-03-26   2018-03-26
 36045 COKCMO-CONVENTION-FACILITIES      2018-03-27   2018-03-27
 54417 STIMULUS-TECHNOLOGIES             2018-03-29   2018-03-29

Further information for these tests where we received spoofed
packets is available at:
https://spoofer.caida.org/recent_tests.php?country_include=usa,can&no_block=1

Please send any feedback or suggestions to spoofer-info () caida org


Current thread: