ohai.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A cozy, fast and secure Mastodon server where everyone is welcome. Run by the folks at ohai.is.

Administered by:

Server stats:

1.9K
active users

#bgp

5 posts5 participants1 post today
Chimmie Firefly 💙💜🤍<p><span>Out of curiosity, have anyone seen IXPs managed by LGBT+?<br><br></span><a href="https://mrrp.chimmie.k.vu/tags/network" rel="nofollow noopener" target="_blank">#network</a> <a href="https://mrrp.chimmie.k.vu/tags/bgp" rel="nofollow noopener" target="_blank">#bgp</a></p>
Stéphane Bortzmeyer<p>Association entre adresse IP et AS</p><p>Dans les discussions au sujet du réseau Internet, on voit souvent passer des demandes sur l'AS associé à une adresse IP ou bien le contraire. Mais les questions simples du genre « de quel AS dépend une adresse IP ? » sont… trop simples.</p><p><a href="https://www.bortzmeyer.org/association-as-ip.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bortzmeyer.org/association-as-</span><span class="invisible">ip.html</span></a></p><p><a href="https://mastodon.gougere.fr/tags/BGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BGP</span></a> <a href="https://mastodon.gougere.fr/tags/whois" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>whois</span></a> <a href="https://mastodon.gougere.fr/tags/RDAP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RDAP</span></a> <a href="https://mastodon.gougere.fr/tags/RIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RIR</span></a></p>
gyptazy<p>The core router at KNS in the US like:<br>"Am I joke to you?" - He's absolutely bored. </p><p><a href="https://mastodon.gyptazy.com/tags/network" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>network</span></a> <a href="https://mastodon.gyptazy.com/tags/RUNBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RUNBSD</span></a> <a href="https://mastodon.gyptazy.com/tags/BGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BGP</span></a> <a href="https://mastodon.gyptazy.com/tags/IPv6" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPv6</span></a> <a href="https://mastodon.gyptazy.com/tags/core" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>core</span></a> <a href="https://mastodon.gyptazy.com/tags/boxybsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>boxybsd</span></a> <br><span class="h-card" translate="no"><a href="https://mastodon.bsd.cafe/@BoxyBSD" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>BoxyBSD</span></a></span></p>
Chimmie Firefly 💙💜🤍<p><span>currently contacting multiple IP Transit and BGP Tunnel providers.<br><br>If you know some good ones, let me know!<br><br></span><a href="https://mrrp.chimmie.k.vu/tags/bgp" rel="nofollow noopener" target="_blank">#bgp</a> <a href="https://mrrp.chimmie.k.vu/tags/asn" rel="nofollow noopener" target="_blank">#asn</a> <a href="https://mrrp.chimmie.k.vu/tags/networking" rel="nofollow noopener" target="_blank">#networking</a></p>
Vitex<p><a href="https://f.cz/tags/BGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BGP</span></a> <a href="https://f.cz/tags/NyanCat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NyanCat</span></a></p>
Unredacted<p>Our Tor exit relays have been successfully migrated to our new network; AS401401. We're nearing completion of the initial stages of our project to make traffic correlation attacks against the Tor network even harder!</p><p><a href="https://bgp.tools/as/401401" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bgp.tools/as/401401</span><span class="invisible"></span></a></p><p><a href="https://metrics.torproject.org/rs.html#search/as:AS401401" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">metrics.torproject.org/rs.html</span><span class="invisible">#search/as:AS401401</span></a></p><p><a href="https://unredacted.social/tags/Tor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tor</span></a> <a href="https://unredacted.social/tags/BGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BGP</span></a></p>
Adrian Offerman<p>also available in English:<br>Adoption of RPKI/ROV security protocol progressing very quickly -- Next step is implementation of ASPA</p><p>Although RPKI/ROV is being adopted very quickly, it's still early days for the other two RPKI-based protocols. Anyone now running RPKI with ROV will be able to take the next step to ASPA in the next few years. Where BGPsec is concerned, it's a question of waiting for the next generation of routing systems.</p><p><a href="https://mastodon.offerman.com/tags/RPKI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RPKI</span></a> <a href="https://mastodon.offerman.com/tags/ASPA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ASPA</span></a> <a href="https://mastodon.offerman.com/tags/BGPsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BGPsec</span></a> <a href="https://mastodon.offerman.com/tags/BGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BGP</span></a> <a href="https://mastodon.offerman.com/tags/IPv6" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPv6</span></a> <a href="https://mastodon.offerman.com/tags/InternetSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InternetSecurity</span></a></p>
Adrian Offerman<p>op SIDN.nl:<br>RPKI/ROV-beveiligingsprotocol maakt razendsnelle adoptie door -- Volgende stap is implementatie van ASPA<br><a href="https://www.sidn.nl/nieuws-en-blogs/rpki-rov-beveiligingsprotocol-maakt-razendsnelle-adoptie-door" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">sidn.nl/nieuws-en-blogs/rpki-r</span><span class="invisible">ov-beveiligingsprotocol-maakt-razendsnelle-adoptie-door</span></a></p><p>Waar RPKI/ROV een heel snelle adoptie heeft doorgemaakt, is het voor de andere twee RPKI-gebaseerde protocollen nog net te vroeg. Wie nu RPKI met ROV heeft draaien, zal een dezer jaren de vervolgstap naar ASPA kunnen maken. Voor BGPsec is het wachten op de volgende generatie routersystemen.</p><p><a href="https://mastodon.offerman.com/tags/RPKI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RPKI</span></a> <a href="https://mastodon.offerman.com/tags/ASPA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ASPA</span></a> <a href="https://mastodon.offerman.com/tags/BGPsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BGPsec</span></a> <a href="https://mastodon.offerman.com/tags/BGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BGP</span></a> <a href="https://mastodon.offerman.com/tags/IPv6" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPv6</span></a> <a href="https://mastodon.offerman.com/tags/InternetSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InternetSecurity</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> <a href="https://mastodon.thenewoil.org/tags/IOSXR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IOSXR</span></a> vulnerability lets attackers crash <a href="https://mastodon.thenewoil.org/tags/BGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BGP</span></a> on routers</p><p><a href="https://www.bleepingcomputer.com/news/security/cisco-vulnerability-lets-attackers-crash-bgp-on-ios-xr-routers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/cisco-vulnerability-lets-attackers-crash-bgp-on-ios-xr-routers/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/Cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cisco</span></a> <a href="https://infosec.exchange/tags/IOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IOS</span></a> <a href="https://infosec.exchange/tags/XR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XR</span></a> flaw allows attackers to crash <a href="https://infosec.exchange/tags/BGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BGP</span></a> process on routers<br><a href="https://securityaffairs.com/175421/security/cisco-ios-xr-flaw-cve-2025-20115.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/175421/sec</span><span class="invisible">urity/cisco-ios-xr-flaw-cve-2025-20115.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>
Rene Robichaud<p>Cisco IOS XR vulnerability lets attackers crash BGP on routers<br><a href="https://www.bleepingcomputer.com/news/security/cisco-vulnerability-lets-attackers-crash-bgp-on-ios-xr-routers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/cisco-vulnerability-lets-attackers-crash-bgp-on-ios-xr-routers/</span></a></p><p><a href="https://mastodon.social/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/CeptBiro" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CeptBiro</span></a> <a href="https://mastodon.social/tags/CiscoIOSXR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CiscoIOSXR</span></a> <a href="https://mastodon.social/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://mastodon.social/tags/BGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BGP</span></a> <a href="https://mastodon.social/tags/Routers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Routers</span></a></p>
Stéphane Bortzmeyer<p><a href="https://mastodon.gougere.fr/tags/IETF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IETF</span></a> <a href="https://mastodon.gougere.fr/tags/BGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BGP</span></a></p><p>"BGP Color-Aware Routing" We are going to paint the routers and the links?</p>
Grzegorz Surmann :verified:<p>BGP als Königs-Routingprotokoll <a href="https://blog.funil.de/2514/sinuspl/deutsch/netzwerk-und-internet/bgp-als-konigs-routingprotokoll/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.funil.de/2514/sinuspl/deu</span><span class="invisible">tsch/netzwerk-und-internet/bgp-als-konigs-routingprotokoll/</span></a> <a href="https://mstdn.funil.de/tags/bgp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bgp</span></a> <a href="https://mstdn.funil.de/tags/internet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>internet</span></a> <a href="https://mstdn.funil.de/tags/policy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>policy</span></a> <a href="https://mstdn.funil.de/tags/protocol" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>protocol</span></a> <a href="https://mstdn.funil.de/tags/rfc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rfc</span></a> <a href="https://mstdn.funil.de/tags/routing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>routing</span></a></p>
RIPE NCC<p>For nearly three decades, we’ve been providing expert training to help our members navigate the digital world. </p><p>Our webinars and in-person courses cover topics like IPv6, BGP, the RIPE Database, and more!</p><p>👉🏼 Join our new mailing list for tailored training updates: <a href="https://www.ripe.net/training/in-person-training-courses/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">ripe.net/training/in-person-tr</span><span class="invisible">aining-courses/</span></a></p><p>💡 All RIPE NCC members can attend in-person sessions free of charge.</p><p><a href="https://mastodon.social/tags/InternetTraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InternetTraining</span></a> <a href="https://mastodon.social/tags/TechTraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechTraining</span></a> <a href="https://mastodon.social/tags/IPv6" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPv6</span></a> <a href="https://mastodon.social/tags/RoutingSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RoutingSecurity</span></a> <a href="https://mastodon.social/tags/BGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BGP</span></a></p>
Stéphane Bortzmeyer<p><a href="https://mastodon.gougere.fr/tags/routage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>routage</span></a> <a href="https://mastodon.gougere.fr/tags/factChecking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>factChecking</span></a> <a href="https://mastodon.gougere.fr/tags/FRnog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FRnog</span></a> <a href="https://mastodon.gougere.fr/tags/BGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BGP</span></a> <br>Très bonne analyse du discours d'un PDG qui prétendait qu'un tiers du trafic Internet mondial passe par ses tuyaux. Spoiler : c'est plus compliqué que ça.</p><p><a href="https://anuragbhatia.com/post/2025/02/analysing-transit-free-networks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">anuragbhatia.com/post/2025/02/</span><span class="invisible">analysing-transit-free-networks/</span></a></p><p>Les chefs et les journalistes veulent toujours des stats simples genre «&nbsp;qui a la plus grosse&nbsp;». Mais la réalité ne se laisse pas faire.</p>
Anurag Bhatia<p>Ever wonder how much routes are there in downstream cone of each known transit free tier 1 network? How much of those routes are single homed Vs multi homed? </p><p>Checkout my latest <a href="https://social.anuragbhatia.com/tags/blog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blog</span></a> post analysing transit free networks - <a href="https://anuragbhatia.com/post/2025/02/analysing-transit-free-networks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">anuragbhatia.com/post/2025/02/</span><span class="invisible">analysing-transit-free-networks/</span></a></p><p><a href="https://social.anuragbhatia.com/tags/BGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BGP</span></a></p>
Stéphane Bortzmeyer<p>Un RFC (pas encore paru mais presque) qui aura pris du temps (7 ans&nbsp;!), routage SPF avec <a href="https://mastodon.gougere.fr/tags/BGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BGP</span></a>. <a href="https://datatracker.ietf.org/doc/draft-ietf-lsvr-bgp-spf/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">datatracker.ietf.org/doc/draft</span><span class="invisible">-ietf-lsvr-bgp-spf/</span></a></p>
Jon "The Nice Guy" Spriggs<p>I wrote a blog post: "Building a <a href="https://toot.io/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://toot.io/tags/Firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewall</span></a> with <a href="https://toot.io/tags/AlmaLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AlmaLinux</span></a> 9, <a href="https://toot.io/tags/NetworkManager" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkManager</span></a>, <a href="https://toot.io/tags/BGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BGP</span></a>, <a href="https://toot.io/tags/DHCP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DHCP</span></a> and <a href="https://toot.io/tags/NFTables" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NFTables</span></a> with <a href="https://toot.io/tags/Puppet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Puppet</span></a>"<br><a href="https://jon.sprig.gs/blog/post/8093" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">jon.sprig.gs/blog/post/8093</span><span class="invisible"></span></a></p>
Ben Hardill<p>OK, so got it working with Unique Unicast IPv6 addresses.</p><p>And now all my devices have yet another address!</p><p><a href="https://bluetoot.hardill.me.uk/tags/BGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BGP</span></a> <a href="https://bluetoot.hardill.me.uk/tags/IPv6" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPv6</span></a> <a href="https://bluetoot.hardill.me.uk/tags/MikroTik" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MikroTik</span></a></p>
Ben Hardill<p>Doesn't look like the MikroTik BGP implementation will use a IPv6 LL address as the next hop.</p><p>Playing with Bird and between 2 Linux boxes works fine, but when sharing routes to my MikroTik 7.17.2 it picks it's default route as the next hop unless I use global addresses.</p><p>Searching sort of implies that it's probably right according to the spec.</p><p>Looks like I might have to play with a Unique Private Prefix</p><p><a href="https://bluetoot.hardill.me.uk/tags/MikroTik" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MikroTik</span></a> <a href="https://bluetoot.hardill.me.uk/tags/IPv6" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPv6</span></a> <a href="https://bluetoot.hardill.me.uk/tags/BGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BGP</span></a></p>