"Everyone should be deploying BCP 38! Wait, they are …."
jra at baylink.com
Tue Feb 18 17:20:04 UTC 2014
Here's a piece which uses the MIT ANA data to assert that the job is mostly done already.
Unless I'm very much mistaken, it appears that a large percentage of the failed BCP 38 spoofing tests listed in that data are actually due to customer side NAT routers dropping packets...
which is of course egress filtering rather than ingress filtering, and thus doesn't actually apply to our questions.
Am I interpreting that correctly?
(Oh, and bcp38.info is now the number 2 Ghit for "bcp38"; thanks to 5 new contributors for signing up to help so far this week.)
Sent from my Android phone with K-9 Mail. Please excuse my brevity.
More information about the NANOG