Beverly et al. found that 77% of Internet clients can spoof source addresses within their own /24 and 11% can spoof within their own /16, with these characteristics holding across a wide range of countries and regions. The authors use this result to argue that IP-spoofed cover traffic — where measurement probes appear to originate from many hosts in the same AS — is broadly feasible in practice.
From 2015-jones-can — Can Censorship Measurements Be Safe(r)?
· §4.2
· 2015
· Hot Topics in Networks
Implications
Censorship measurement (and circumvention probe) traffic can be distributed across spoofed source IPs within the same /24 subnet on most networks, making per-host attribution by surveillance systems significantly harder without triggering unusually selective IDS rules.
For stateful protocols where spoofed replies would cause a RST from the real host, use TTL-limited server responses calibrated to die between the surveillance observation point and the actual host — requires pre-scanning to count hops from the network boundary to each host.