214 Followers
359 Following
717 Posts

Passionate about networking protocols, the Internet, how to measure it and big data. Overall a curious mind and problem solver.

Interests & profession: #bigdata #dns #bgp #ddos #dataengineering #infosec #threatintel

Homepagehttps://maxresing.de
LinkedInhttps://linkedin.com/in/max-resing/

Found out about a project with millions of randomly generated links. The author explained how #Facebook's scraping bot hit it's page 38 million times. All while the company itself claims that their bot only crawls pages that are shared on their platforms.

Why is there so much dishonesty in some hyperscaling tech companies?

Other crawlers are also listed in a short write-up by the author.

#infosec #crawler #llm #meta

Internet and e-mail policy and practice

It doesn't happen every day that you see a /13 IPv4 network end up on Spamhaus Blocklist (SBL). Such large prefixes are commonly listed in conjunction with IP hijacking activity - and yes, you guessed it, the last /13 entering SBL (and DROP) is a hijacked unallocated prefix, according to our investigations🕵️

102.224.0.0/13, "reserved [by AFRINIC] for future as per section 5.4.7.1 of [AFRINIC's] consolidated policy manual Version 1.1", according to its AFRINIC database record, was suddenly announced by AS3563. Its owner, 🇺🇸Pilot Network Services, Inc, seems to have abandoned it; pilot[.]net is parked nowadays.

Shortly after 102.224.0.0/13 entered SBL and DROP, the BGP announcement by AS3563 disappeared. It remains unclear whether the miscreants themselves or their uplink,🇧🇷ELETRONET S.A. (AS267613), pulled the plug. 🧐

IP hijacking remains a persistent threat. If you are a network operator, please ensure your IP assets and ASNs can't get hijacked, and your infrastructure does not process traffic to or from hijacked networks 👉 https://www.spamhaus.org/resource-hub/hijacking/

#Cybercrime #NetworkSecurity #ThreatIntel

Anyone else heard about the sourvereign, and alternative #DNS #TLD chn. ? There is a #Wikipedia article in Chinese. I am unsure if it is actually something actively pursued in #China to step up their #Internet #control game. Or if it was merely a financial asset to attract venture capital?

Would love some insights from more knowledable people.

#askfedi #askinfosec #askmastodon #censorship #cn

.chn - 维基百科,自由的百科全书

Is there any reason, why curl lists an example in their --header section as follows:

curl -H "User-Agent: yes-please/2000" https://example.com

Is there someone a #Jazz fan, or is it some other kind of a pun? 🤔

#foss #OpenSource #curl #manpage #unix

Oh, hey, #IANA assigned a new block of ASNs to #AFRINIC. A good sign that the #Internet #connectivity in #Africa is growing! Keep up the good work! Details here....

#ASN #BGP

Autonomous System (AS) Numbers

#HackLu has opened their #CfP. There is a vast list of topics of interest, thus opening the floor to researchers of various #cybersecurity, #threatintel and #internetmeasurement disciplines. Much of their work has a European, or even global impact. These folks are a bunch of great minds working passionately for the better good of the #Internet.

Find the announcement here :)

Cheers!

#CIRCL #Luxemburg #EU #Europe #Infosec

Call for papers is now open for hack.lu 2026 (the 20th edition!)

Time to submit a talk, training or workshop to hack.lu

hack.lu 2026

At #ICANN, they currently discuss the rollover of a root KSK. They switch from an #RSA based key to an elliptic curve algorithm. From algorithm 8 to algorithm 13, a common observation in the past 2 or 3 years.

There will be a multi-year (~3 years) transition period in which both algorithms run in parallel.

Anyone want to read upon it, here is the proposal

#DNSSEC #rootservers #ecdsa

Proposed Root KSK Algorithm Rollover

By the way: #Python is such a great tool for these quick endeavors:

lines = res.content.decode("utf-8").split("\n")
lines = filter(lambda e: len(e) and not e.startswith("#"), lines)
addr = [ipaddress.IPv4Network(e) for e in lines]

sum(map(lambda e: e.num_addresses, addr)) / ipaddress.IPv4Network("0.0.0.0/0").num_addresses

That's it. Except you also need to fetch the bogon list, which I excluded to avoid brand promotions.

Just had a discussion on routable #IPv4 address space. This lead me to check #Bogon IP address space. I briefly fetched a public bogon list of a large provider, parsed the CIDR blocks and calculated the number of IPv4 addresses. Dividing this by 0.0.0.0/0 eventually lead to the discovery that 13.89% of the IPv4 address space is non-routable. Way more than I had anticipated.

Your daily dose of #netops knowledge... :)

Anyone else noticed that #DNSOARC actually has their code repositories on #Codeberg? Interested folks can check their page here

#DNS #FOSS #OpenSource

DNS-OARC

The DNS Operations, Analysis, and Research Center (DNS-OARC) brings together key operators, implementors, and researchers on a trusted platform so they can coordinate responses to attacks and other concerns, share information and learn together.

Codeberg.org