Home   Stats   Download   News   FAQ   Papers   Contact  

What can you expect when you run the spoofer tester? Here, we provide screen shots, example output and example reports.

Example Output:

After a run of the spoofer client completes, it produces a report customized to your host and host's network. This report includes a graphical display of the AS-level routes (providers) which were probed and colors the graph based on which types of traffic were able to pass. For example:

Invalid Private Bogon

Allowing a visual understanding of which providers are filtering which traffic. A complete sample report is available.

Client Interface:

bash-3.2# ./spoofer
>> MIT ANA Spoofer Project
>> IP Source Spoofing Tester v0.7.3
>> http://spoofer.csail.mit.edu
>> Copyright (c) 2004-2009 Robert Beverly
>>
>> Ready to test (please allow several minutes to complete).
Continue? [y/N]....y
>> Connecting to server...
>> Negotiating test scenario with server...
>> Test scenario with 28 probes
>> Sourcing non-spoofed validation probes: ..
>> Sourcing spoofed probes (please wait): 0..1..2..4..5..6..7..8..9..10..11..12..
>> Performing tracefilter [TTL: 1..2..3..4..5..6..7..8..9..10..11..12..13.
>> Sourcing non-spoofed validation probes: ..
>> Collecting Results: 0..1..2..3..4..5..6..7..8..9..10..11..12..13..14..15..16..
>> Running Traces (please wait)......
>> Finishing test...

Test Complete.
Your test results:
        http://spoofer.csail.mit.edu/report.php?sessionkey=lz1fXXXuXXXXdx
Client Interface (GUI):


$Id: example.php,v 1.3 2009/02/22 16:21:46 rbeverly Exp $
Process Time: 0.000sec