Python client/server utility to test for BCP38 compliance.
- Run a server somewhere
- ./bcp38-server.py
 
- Edit the server value/run the client (needs root access to spoof packets):
- sudo ./bcp38-client-spoof.py
 
- Check the server console for output, 1 single line which shows the packet source, and packet contents being the same means you're BCP38 compliant. Up to 23 lines will be output sourced from randomly generated IP addresses.
- apt-get install python-scapy