From: Antoin Verschuren <antoin.verschuren@sidn.nl> If all we want to know is an oversight of the state of spoofing now, and in a year's time, can't we just ask the Atlas users (AKA the mailinglist) that want to know to do a 1 time spoofing test on http://spoofer.csail.mit.edu/summary.php from their atlas probe network? IMHO that is less work than to ask Atlas users for permission. Antoin, Thanks for suggesting that, we agree that Atlas nodes are a terrific way to increase the scope of visibility of spoofing. I should note that we have spent the last few months updating the 7-year old spoofer code and web site (btw, it's now at http://spoofer.cmand.org/ , jointly managed by Rob Beverly at nps.edu and CAIDA) including adding tests for IPv6 spoofing ability, making graphs on the summary page clearer, classifying spoofing-capable networks into types, and allowing probing to multiple (CAIDA Ark) destintations (which also increases visibility into spoofing, but not nearly as much as 1000+ Atlas nodes would..) we plan to deploy and announce an updated version by 1 June. so if you're going to encourage Atlas nodes to try our spoofer test, it would be ideal to have them do it shortly after 1 June. we will send an announcement to this list when we release the new version. after june we will still be working on better techniques to filter tests for representativeness, and other methodology improvements. please do send us requests for other changes/additions you would like to see. ( http://spoofer.cmand.org/contact.php ) thanks, k (and Rob Beverly and Ryan Koga, current team)