Is #RANCID still alive in production environments?

We’re considering integration with #NetXMS and trying to estimate real-world usage.

#networking #netops #opensource #NMS

Do you use it?

Yes, we use it
0%
I know teams that use it
6.8%
No
6.8%
What is RANCID?
86.4%
Poll ended at .

Sometimes figuring out whats happening over time in the Mikrotik changelogs isn't as easy as it should be..... I made a tool to display changelog entries and data in different ways, as well as searching all changelogs for keywords. (MLAG for instance is a good search keyword).

This is still in really early public availability, but its been useful for 2 out of 2 people I shared it with and so I expect it will be useful for a wider audience.

https://mikrotik-changelog-tracker.hextet.net/

#mikrotik #changelogs #neteng #netops #networking #networks

Search – MikroTik Changelog Tracker

Just had a discussion on routable #IPv4 address space. This lead me to check #Bogon IP address space. I briefly fetched a public bogon list of a large provider, parsed the CIDR blocks and calculated the number of IPv4 addresses. Dividing this by 0.0.0.0/0 eventually lead to the discovery that 13.89% of the IPv4 address space is non-routable. Way more than I had anticipated.

Your daily dose of #netops knowledge... :)

📰 Noction IRP v4.3 Launches with Automated DDoS Detection and Routing-Native Mitigation

Noction releases IRP v4.3 with Automatic Anomaly Detection! 🛡️ The new feature provides rapid, automated DDoS detection & mitigation using routing-native tools like BGP FlowSpec and RTBH to protect networks at the edge. #DDoS #BGP #NetOps #CyberSec...

🔗 https://cyber.netsecops.io/articles/noction-irp-v4-3-introduces-automated-ddos-detection-and-mitigation/?utm_source=mastodon&utm_…

Noction IRP v4.3 Launches with Automated DDoS Detection and Routing-Native Mitigation

Noction has released IRP v4.3, featuring Automatic Anomaly Detection (AAD) for rapid identification and mitigation of DDoS attacks using BGP FlowSpec and RTBH.

CyberNetSec.io

Looking for a sponsoring LIR for my ASN.
I run a small non‑commercial network with a WireGuard uplink via Route64 and plan a second upstream (HE POP) for redundancy and BGP/IPv6 learning.
I can maintain IRR/RPKI. Any LIR willing to sponsor an ASN is welcome.

#BGP #ASN #IPv6 #Multihoming #HomeLab #NetOps #NetworkEngineering #RIPE #LIR #NOG #PLNOG #DENOG #NLNOG #UKNOF #Routing #Sysadmin #Route64 #HurricaneElectric

Psssst! Don't tell anyone but more and more POPs are coming up for my next free service! It's not only for @[email protected]

#ipv4 #ipv6 #router #routing #network #bgp #AS #BoxyBSD #opensource #net #netops

Pour finir, l’info a fait son chemin
jusqu’à la mailing-list des administrateurs de relais #tor.

Donc c’est bien une des campagnes ...académiques de sensibilisation de masse.

Mais comme souvent, au final ça suscite plus de questions que de réponses,
vu qu’on parle d’une attaque au niveau AS / BGP.

Thread côté Tor
👇
https://lists.torproject.org/mailman3/hyperkitty/list/[email protected]/thread/R5IUD5DJBBJXJ3Q3YXY3HLDLDHA6AO57/

Et bien évidemment, ça déclenche des réactions très humaines 😅

Extrait qui résume assez bien l’ambiance :

“ Is the stated vulnerability an actively exploited problem or is this a DoS attack by scaremongering?

My guess is it is neither. I would be that it's just some over-excited
researchers who want to get the news out about just how awful BGP is.
But, while it is "exploitable", there's not much that can be done with
it. All an attacker could do is cause the connections destined for your
relay to go to their servers instead. But crucially, they do not have
your relay key, so all other relays and clients would refuse to connect
to them..”

Bref,
je vais quand même ouvrir un ticket chez Scaleway,
histoire de voir ce qu’ils en pensent de leur côté.

#BGP #NetOps #bgphijacking

Fwd: Potential vulnerability found in your Tor Relay - tor-relays - lists.torproject.org

You are in an admin/programmer/devops role. When you look for a solution to a problem, what is the ratio of time reach for AI first? In this poll, "Other" includes official docs, howto posts, video tutorials or similar things.

#ai #softwaredev #sysadmin #devops #netops

AI 80%, other 20%
20%
AI 60%, other 40%
0%
AI 40%, other 60%
20%
AI 20%, other 80%
60%
Poll ended at .

Just signed up my AS space for @greynoise. Curious to see what will land in my inbox as we're tiny, but it can't hurt...

#netops, #overengineering, #selfhosting

Hmmm, #NANOG discusses #IPv4 pricing falling below $20. There is also a claim that North-American ISPs sell much of their IPv4 space. Why is that happening? Is it, because #IPv6 is now the preferred method?

#routing #bgp #netops