schleuss.online is one of the many independent Mastodon servers you can use to participate in the fediverse.
This instance has a focus on IT security, general computing, retro video games and game collector discussion. Please, no #NSFW and other 18+ discussion on this instance. See rules for more details

Server stats:

9
active users

#bgp

1 post1 participant0 posts today
Max Resing<p>RE: <a href="https://infosec.exchange/@jtk/115571840599359932" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@jtk/11557184</span><span class="invisible">0599359932</span></a></p><p>Boosting for visibility. <span class="h-card" translate="no"><a href="https://infosec.exchange/@jtk" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>jtk</span></a></span> and I briefly explored what we see on the <code>/8</code>s announced by CAMTEL. It's been discussed on the <a href="https://infosec.exchange/tags/NANOG" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NANOG</span></a> <a href="https://lists.nanog.org/archives/list/nanog@lists.nanog.org/thread/V35DTAURSATFECD623INYMVD2FHP5M5X/" rel="nofollow noopener noreferrer" target="_blank">mailing list</a> as well.</p><p><a href="https://infosec.exchange/tags/bgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bgp</span></a> <a href="https://infosec.exchange/tags/cameroon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cameroon</span></a> <a href="https://infosec.exchange/tags/asert" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>asert</span></a></p>
skorpy<p>Hey <a href="https://chaos.social/tags/FediHire" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FediHire</span></a> 👋</p><p>I am currently looking to get back into being a (part time) <a href="https://chaos.social/tags/Freelancer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Freelancer</span></a>. Do you know of any positions that would require extensive knowledge in the <a href="https://chaos.social/tags/Networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Networking</span></a> / <a href="https://chaos.social/tags/Internet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Internet</span></a> industry?</p><p>My skillset includes <a href="https://chaos.social/tags/Sysadmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sysadmin</span></a> <a href="https://chaos.social/tags/Automation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Automation</span></a> <a href="https://chaos.social/tags/NixOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NixOS</span></a> <a href="https://chaos.social/tags/Peering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Peering</span></a> <a href="https://chaos.social/tags/BGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BGP</span></a> <a href="https://chaos.social/tags/ISP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ISP</span></a> <a href="https://chaos.social/tags/RtBrick" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RtBrick</span></a> <a href="https://chaos.social/tags/Juniper" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Juniper</span></a> <a href="https://chaos.social/tags/Junos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Junos</span></a> <a href="https://chaos.social/tags/Prometheus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Prometheus</span></a> <a href="https://chaos.social/tags/Grafana" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Grafana</span></a> and much more.</p><p>Only open to working with companies based in the EU or EFTA.</p><p>Let’s connect!<br><a href="https://chaos.social/tags/fedihire_de" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fedihire_de</span></a> <a href="https://chaos.social/tags/getfedihired" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>getfedihired</span></a></p>
Max Resing<p>Some interesting facts I like to share to give those remotely related to the industry an idea on the scale of the <a href="https://infosec.exchange/tags/Internet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Internet</span></a> (from the perspective of a network nerd):</p><pre><code>BGP routing table entries examined: 994,587<br>Number of IPv4 prefixes<br> - w/ valid ROA: 555,410<br> - w/o valid ROA: 437,967<br> - w/ invalid ROA: 1.210<br><br>Total ASNs: 77,222<br>Origin-only ASNs: 66,053<br>Transit ASNs: 11,169<br><br></code></pre><p>All these insights are announced weekly by <a href="https://infosec.exchange/tags/apnic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apnic</span></a> . These, and many more insights are available on [thyme.apnic.net]. In my case, I got those updates from the <a href="https://infosec.exchange/tags/AFNOG" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AFNOG</span></a> mailing list. Great community service from everyone!</p><p><a href="https://infosec.exchange/tags/BGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BGP</span></a> <a href="https://infosec.exchange/tags/routingtables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>routingtables</span></a> <a href="https://infosec.exchange/tags/routing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>routing</span></a></p>
IT News<p>Cybersecurity takes a big hit in new Trump executive order - Cybersecurity practitioners are voicing concerns over a rece... - <a href="https://arstechnica.com/security/2025/06/cybersecurity-take-a-big-hit-in-new-trump-executive-order/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">06/cybersecurity-take-a-big-hit-in-new-trump-executive-order/</span></a> <a href="https://schleuss.online/tags/quantumcomputing" class="mention hashtag" rel="tag">#<span>quantumcomputing</span></a> <a href="https://schleuss.online/tags/executiveorders" class="mention hashtag" rel="tag">#<span>executiveorders</span></a> <a href="https://schleuss.online/tags/encryption" class="mention hashtag" rel="tag">#<span>encryption</span></a> <a href="https://schleuss.online/tags/whitehouse" class="mention hashtag" rel="tag">#<span>whitehouse</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="tag">#<span>security</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="tag">#<span>biz</span></a>⁢ <a href="https://schleuss.online/tags/policy" class="mention hashtag" rel="tag">#<span>policy</span></a> <a href="https://schleuss.online/tags/trump" class="mention hashtag" rel="tag">#<span>trump</span></a> <a href="https://schleuss.online/tags/post" class="mention hashtag" rel="tag">#<span>post</span></a> <a href="https://schleuss.online/tags/bgp" class="mention hashtag" rel="tag">#<span>bgp</span></a></p>
NLnet Labs<p>We love our independence, which is why we're now on our own Mastodon instance at social.nlnetlabs.nl! <a href="https://social.nlnetlabs.nl/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> <a href="https://social.nlnetlabs.nl/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a> <a href="https://social.nlnetlabs.nl/tags/BGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BGP</span></a></p>
Max Resing<p>I couldn't have written it better. Those, who are aware of the <a href="https://infosec.exchange/tags/AfriNIC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AfriNIC</span></a> dispute on <a href="https://infosec.exchange/tags/IPv4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv4</span></a> address space should read this <a href="https://www.linkedin.com/posts/ben-roberts-9085592_2025-board-election-process-activity-7334132888881238017-zttU/?utm_source=share&amp;utm_medium=member_android&amp;rcm=ACoAABmRuZQBbJFJdDBR0aczxQ7MwW0XaVpJYm8" rel="nofollow noopener noreferrer" target="_blank">LinkedIn post</a>.</p><p>I quote Ben Roberts, the originator of the post:</p><p>"An important Message to all AfriNIC Members who are holding IP resources from AfriNIC. There is currently a very important election process ongoing to elect a new Board of Directors. The outcome of this election is pivotal to the future of AfriNIC. Make your vote count.</p><p>All IP Resource Holders who are up to date on their bill payments are entitled to vote, but the voting takes place on 23rd Jun at a PHYSICAL MEETING in Mauritius.<br>ONLINE Voting is available but you MUST REGISTER to online vote BY TUESDAY 2nd JUNE (3 Days Time)</p><p>PROXY Voting is available to a proxy who will be present at the Mauritius meeting but for that you MUST REGISTER your proxy vote vote BY 9th JUNE</p><p>Further details...<br><a href="https://lnkd.in/dcYzkuyy" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lnkd.in/dcYzkuyy</span><span class="invisible"></span></a></p><p>-Registration of e-voters open from 28 April to 2 June 2025 and Proxy closure on 9 June 2025.</p><p>-The e-voting election period is from 16 June to 23 June 2025.</p><p>-For the purpose of having a smooth running of the voting on the Election<br>Day 23 June 2025, we encourage Members to clear any outstanding invoices and to ensure that they are in good standing status no later than 16 June 2025 at 23:59 MUT."</p><p><a href="https://afrinic.net/election-process" rel="nofollow noopener noreferrer" target="_blank">Read here</a> for more details on the election process</p><p><a href="https://infosec.exchange/tags/bgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bgp</span></a> <a href="https://infosec.exchange/tags/afrinic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>afrinic</span></a> <a href="https://infosec.exchange/tags/rir" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rir</span></a> <a href="https://infosec.exchange/tags/elections" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>elections</span></a> <a href="https://infosec.exchange/tags/africa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>africa</span></a> <a href="https://infosec.exchange/tags/ipv4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv4</span></a></p>
Stéphane Bortzmeyer<p><a href="https://mastodon.gougere.fr/tags/IETF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IETF</span></a> <a href="https://mastodon.gougere.fr/tags/BGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BGP</span></a></p><p>"BGP Color-Aware Routing" We are going to paint the routers and the links?</p>
Max Resing<p><a href="https://infosec.exchange/tags/TIL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TIL</span></a> about the Internet History Initiative (<span class="h-card" translate="no"><a href="https://cooperate.social/@IHI" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>IHI</span></a></span>). It's a website that focuses on historical relevant public data sets. As a <a href="https://infosec.exchange/tags/datanerd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>datanerd</span></a> and <a href="https://infosec.exchange/tags/datahoarder" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>datahoarder</span></a> of <a href="https://infosec.exchange/tags/internet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>internet</span></a> data, I appreciate that something like this spun up.</p><p>However, I am shocked, I haven't heard from it so far. Although, it's online since January 2024 already! Will definitely start to keep an eye on it.</p><p>Edit: Forgot to link the website: <a href="https://internethistoryinitiative.org/" rel="nofollow noopener noreferrer" target="_blank">internethistoryinitiative.org</a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/data" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>data</span></a> <a href="https://infosec.exchange/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a> <a href="https://infosec.exchange/tags/BGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BGP</span></a> <a href="https://infosec.exchange/tags/IXP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IXP</span></a></p>
Max Resing<p>A great effort on tracking <a href="https://infosec.exchange/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a> locality when it comes to the name resolution on the B <a href="https://infosec.exchange/tags/rootserver" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rootserver</span></a>. The research concludes that 78% route to the regionally closest replicate of the root server. Something, I would not have expected due to the complexity of modern <a href="https://infosec.exchange/tags/peering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>peering</span></a>. This is confirmed by an additional cluster where DNS requests travel cross-Atlantic.</p><p><a href="https://pulse.internetsociety.org/blog/measuring-dns-root-servers-under-change" rel="nofollow noopener noreferrer" target="_blank">Measuring DNS Root Servers Under Change</a></p><p><a href="https://infosec.exchange/tags/anycast" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>anycast</span></a> <a href="https://infosec.exchange/tags/BGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BGP</span></a> <a href="https://infosec.exchange/tags/Internet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Internet</span></a> <a href="https://infosec.exchange/tags/ixp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ixp</span></a> <a href="https://infosec.exchange/tags/isp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>isp</span></a> <a href="https://infosec.exchange/tags/nlnogring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nlnogring</span></a></p>
Richard "RichiH" Hartmann<p><span class="h-card" translate="no"><a href="https://fosstodon.org/@fosdem" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>fosdem</span></a></span> I was asked privately for the "how", and figured a public reply makes sense</p><p><a href="https://www.ripe.net/publications/docs/ripe-801" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">ripe.net/publications/docs/rip</span><span class="invisible">e-801</span></a> is the policy.</p><p>Fun fact: The extra time around an event used to be 1-2 weeks, and this was distilled pain as I had to chase <a href="https://chaos.social/tags/FOSDEM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FOSDEM</span></a> <a href="https://chaos.social/tags/BGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BGP</span></a> upstreams to update sessions, filters, etc and usually needed to escalate through to last level support</p><p>Before automation and the Cloud, a new <a href="https://chaos.social/tags/BGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BGP</span></a> announcement took days to weeks by default</p><p>So I got the <a href="https://chaos.social/tags/RIPE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RIPE</span></a> policy changed and extended to a month :)</p>
Richard "RichiH" Hartmann<p><span class="h-card" translate="no"><a href="https://fosstodon.org/@fosdem" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>fosdem</span></a></span> I just announced our temporary <a href="https://chaos.social/tags/IPv4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv4</span></a> PI space 151.216.128.0/17 for <a href="https://chaos.social/tags/FOSDEM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FOSDEM</span></a>. If you want, you can follow it starting to become visible over the next hours and days on any <a href="https://chaos.social/tags/BGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BGP</span></a> <a href="https://chaos.social/tags/lookingglass" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lookingglass</span></a>, e.g. <a href="https://lg.de-cix.net/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lg.de-cix.net/</span><span class="invisible"></span></a> has quite a few globally so you can see it spread.</p><p>As of this writing, <a href="https://lg.de-cix.net/search?q=151.216.128.0%2F17" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">lg.de-cix.net/search?q=151.216</span><span class="invisible">.128.0%2F17</span></a> has it in Frankfurt and Marseille, and nowhere else. Usually for new BGP announcements from EU, they show up in LATAM last, with a delay of up to three days.</p>
Doug Madory<p>Just after 15:30 UTC on Dec 11, 2024, AWS began announcing 1000+ new <a href="https://infosec.exchange/tags/BGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BGP</span></a> prefixes covering nearly all of the cloud provider's assigned IP space.</p><p>As a result, the total amount of IP space originated by AS16509 increased 3x for <a href="https://infosec.exchange/tags/IPv4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv4</span></a> and 25x for <a href="https://infosec.exchange/tags/ipv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv6</span></a> !!</p><p><a href="https://www.kentik.com/analysis/aws-announces-super-aggregates-massively-expands-bgp-footprint/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">kentik.com/analysis/aws-announ</span><span class="invisible">ces-super-aggregates-massively-expands-bgp-footprint/</span></a></p>
cynicalsecurity :cm_2:<p>H. Schulmann et al., "RPKI: Not Perfect But Good Enough"¹ </p><p>The Resource Public Key Infrastructure (RPKI) protocol was standardized to add cryptographic security to Internet routing. With over 50% of Internet resources protected with RPKI today, the protocol already impacts significant parts of Internet traffic. In addition to its growing adoption, there is also increasing political interest in RPKI. The White House indicated in its Roadmap to Enhance Internet Routing Security, on 4 September 2024, that RPKI is a mature and readily available technology for securing inter-domain routing. The Roadmap attributes the main obstacles towards wide adoption of RPKI to a lack of understanding, lack of prioritization, and administrative barriers.<br>This work presents the first comprehensive study of the maturity of RPKI as a viable production-grade technology. We find that current RPKI implementations still lack production-grade resilience and are plagued by software vulnerabilities, inconsistent specifications, and operational challenges, raising significant security concerns. The deployments lack experience with full-fledged strict RPKI-validation in production environments and operate in fail-open test mode. We provide recommendations to improve RPKI resilience and guide stakeholders in securing their deployments against emerging threats.<br>The numerous issues we have discovered with the current RPKI specifications and implementations inevitably lead to the question: Is RPKI sufficiently stable to align with the expectations outlined in the White House roadmap? Certainly, it is not perfect, but is it good enough? The answer, as we will explore, varies depending on one's viewpoint.</p><p><a href="https://bsd.network/tags/BGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BGP</span></a> <a href="https://bsd.network/tags/RPKI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RPKI</span></a> <a href="https://bsd.network/tags/arXiv" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>arXiv</span></a> </p><p>__<br>¹ <a href="https://arxiv.org/abs/2409.14518" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">arxiv.org/abs/2409.14518</span><span class="invisible"></span></a></p>
Julius Kaiser<p>I remember seeing public IPv4 addresses from Xerox and the US DoD assigned to DTAG LTE SIMs internally in Germany (04/2020), probably because they ran out of RFC1918 space. Do you have other such examples? I would like to collect them. (boosts in the IP/ net admin bubble appreciated!)</p><p><a href="https://mastodon.online/tags/ipv4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv4</span></a> <a href="https://mastodon.online/tags/telco" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>telco</span></a> <a href="https://mastodon.online/tags/networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networking</span></a> <a href="https://mastodon.online/tags/network" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>network</span></a> <a href="https://mastodon.online/tags/telekom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>telekom</span></a> <a href="https://mastodon.online/tags/sysadmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sysadmin</span></a> <a href="https://mastodon.online/tags/ipv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv6</span></a> <a href="https://mastodon.online/tags/cgnat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cgnat</span></a> <a href="https://mastodon.online/tags/nat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nat</span></a> <a href="https://mastodon.online/tags/rfc1918" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rfc1918</span></a> <a href="https://mastodon.online/tags/internet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>internet</span></a> <a href="https://mastodon.online/tags/dtag" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dtag</span></a> <a href="https://mastodon.online/tags/bgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bgp</span></a> <a href="https://mastodon.online/tags/dfz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dfz</span></a></p>
Peter N. M. Hansteen<p>OpenBGPD 8.6 released <a href="https://www.undeadly.org/cgi?action=article;sid=20240920154121" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">undeadly.org/cgi?action=articl</span><span class="invisible">e;sid=20240920154121</span></a> <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/openbgpd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbgpd</span></a> <a href="https://mastodon.social/tags/bgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bgp</span></a> <a href="https://mastodon.social/tags/routing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>routing</span></a></p>
IT News<p>A “ridiculously weak password” causes disaster for Spain’s No. 2 mobile carrier - Enlarge (credit: Getty Images) </p><p>Orange España, Spain’s second-b... - <a href="https://arstechnica.com/?p=1993801" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="">arstechnica.com/?p=1993801</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/bodergatewayprotocol" class="mention hashtag" rel="tag">#<span>bodergatewayprotocol</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="tag">#<span>security</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="tag">#<span>biz</span></a>⁢ <a href="https://schleuss.online/tags/bgp" class="mention hashtag" rel="tag">#<span>bgp</span></a></p>
Stéphane Bortzmeyer<p>Now, you know what <a href="https://mastodon.gougere.fr/tags/BGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BGP</span></a> means.</p>
Julius Kaiser<p>"Getting public IP address ranges routed on the Internet is no rocket science. It does, however, involve steps (including paperwork!) and concepts that are probably unfamiliar to administrators who are used to private routing domains only. This guide tries to explain what’s essential to register public IP prefixes for an organisation and make them reachable globally." <a href="https://jlsksr.de/docs/isp-guide/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">jlsksr.de/docs/isp-guide/</span><span class="invisible"></span></a></p><p><a href="https://mastodon.online/tags/isp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>isp</span></a> <a href="https://mastodon.online/tags/ripe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ripe</span></a> <a href="https://mastodon.online/tags/bgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bgp</span></a> <a href="https://mastodon.online/tags/howto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>howto</span></a></p>
Doug Madory<p>Hang on... is <a href="https://infosec.exchange/tags/BGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BGP</span></a> the three-napkin protocol, or the two-napkin protocol?</p><p>Exactly how many napkins were needed to propose BGP in 1989?? Maybe it is three sides of two napkins.</p>
IT News<p>This Week in Security: Not a Vulnerability, BGP Bug Propogation, and Press Enter to Hack - Curl was recently notified of a CVE, CVE-2020-19909, rated at a hair-raising 9.8 o... - <a href="https://hackaday.com/2023/09/01/this-week-in-security-not-a-vulnerability-bgp-bug-propogation-and-press-enter-to-hack/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2023/09/01/this-w</span><span class="invisible">eek-in-security-not-a-vulnerability-bgp-bug-propogation-and-press-enter-to-hack/</span></a> <a href="https://schleuss.online/tags/thisweekinsecurity" class="mention hashtag" rel="tag">#<span>thisweekinsecurity</span></a> <a href="https://schleuss.online/tags/hackadaycolumns" class="mention hashtag" rel="tag">#<span>hackadaycolumns</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="tag">#<span>securityhacks</span></a> <a href="https://schleuss.online/tags/news" class="mention hashtag" rel="tag">#<span>news</span></a> <a href="https://schleuss.online/tags/bgp" class="mention hashtag" rel="tag">#<span>bgp</span></a> <a href="https://schleuss.online/tags/cve" class="mention hashtag" rel="tag">#<span>cve</span></a> <a href="https://schleuss.online/tags/tpm" class="mention hashtag" rel="tag">#<span>tpm</span></a></p>