This project wraps the CAIDA Spoofer prober in a Docker container. It automatically runs the spoofing tests, collects network metadata via ipwho.is, and emails the results using AWS SES (via msmtp).
- Ubuntu 22.04 Base: Uses the official CAIDA PPA.
- Auto-Reporting: Parses CAIDA logs to find the session URL and summary results.
- Metadata Enrichment: Fetches Host IP, ASN, and ISP details via ipwho.is.
- SMTP Integration: Pre-configured for AWS SES with logic to break Gmail message threading.
- Cleanup Script: Includes a rebuild.sh script to handle Docker build cache cleanup.
- Configure your credentials in a
.envfile (see docker-compose.yml for required variables). - Run
chmod +x entrypoint.sh rebuild.sh. - Execute
./rebuild.sh.
To run the test automatically every week (Sunday at 4:00 AM), install the provided cron file:
sudo cp caida-spoofer.cron /etc/cron.d/caida-spoofer
sudo chmod 644 /etc/cron.d/caida-spoofer