Rawtest is a simple program to test how well packets with spoofed source addresses get routed. Its operation is simple: it sends a battery of spoofed packets to a server at Columbia University. Note that since the program spoofs the return address of the packets it sends, it typically has to be run as root.
Download the source code here:
It is fairly portable and has been tested on both Linux and OpenBSD. If you have any problems or find any bugs, please contact us.
Unpack the tarball.
% tar xvzf rawtest-?.?.tgz
Compile the program.
% cd rawtest && make
If you are willing, you can edit ip_list.txt and add some IP addresses to the list that is already there. We're particularly interested in IP addresses such as:
Feel free to add whatever other IPs you like -- the more you add, the more we learn.
NOTE! For each IP address that you add, please enter a comment after it. This comment will be included in the packets sent to our server and it will help us classify them. For example, if you add the IP address of a machine on your local network, it might look like this:
10.1.3.72 # IP of a machine on my local network
Since the program spoofs the return address of the packets it is sending, it typically has to be run as root. Run the program with:
% cd src; sudo ./rawtest -v -f ip_list.txt
Please run the program several times over the course of a day or two, and at different times of the day.