#routage #BGP Un million de routes dans l'Internet bientôt ?
https://www.bortzmeyer.org/un-million-de-routes.html
#routage #BGP Un million de routes dans l'Internet bientôt ?
https://www.bortzmeyer.org/un-million-de-routes.html
% curl -s https://bgp.bortzmeyer.org/info
OK: 1031455 IPv4 prefixes, 231602 IPv6 prefixes, 84853 AS
Wow, so much routes, amazing.
Oops! The MXP01 (Italy) peer had some fuck ups, followed by some insane traffic f*ckups at 3AM & 6AM on the other instances.
Rule Nr. 1: Even changing a single character can result in f*ckups. Always test!
@pmevzek @TheGibson
I would put more thought into how all of this can be attacked and/or abused.
It is always DNS. It is always BGP.
@fleaz : it's not MultiMultiFactorAuthentication but 1FA max.
Assuming that you don't use those hardware keys to generate TOTP codes (which are pointless when confronted with the likes of #Evilginx2), but use WebAuthn instead (FIDO2 passkeys in hardware keys), everything depends on one factor: the domain name of the website.
DV-CERTS SUCK
It is not very common that certificates are issued to malicious parties, but it *does* happen now and then (https://infosec.exchange/@ErikvanStraten/112914050216821746).
SUBDOMAINS
Furthermore, sometimes organizations have "dangling" subdomain names. For example,
test.example.com
may point to the IP-adress of some cloud server no longer used by example.com. Anyone with write access to that server may install a fake "test.example.com" website and phish you to it. It *may* be used to phish your WebAuthm credentials *if* "example.com" does not explicitly *DENY* WebAuthn from "test.example.com".
See https://github.com/w3ctag/design-reviews/issues/97#issuecomment-175766580 for how Google prevents "sites.google.com" from authenticating to "google.com".
DNS HACKED
It may not be neccessary to execute BGP-hijacks to redirect network traffic to an impostor: it also all depends on how reliable DNS records are protected against unauthorized access. If the dude in charge for DNS uses a stupid password only, or the DNS provider is easily fooled into believing "I forgot my creds", it's game over. The crooks will obtain a DV-cert in no time, no questions asked, for free.
All the bells and whistless are moot if there's an alternative way to log in (such as by using a 1FA rescue code) and the user is fooled into providing it (after they've been lied to that their WebAithn public key on the server became corrupted or was lost otherwise).
Cloudflare MitM's https connections (it's not a secret: https://blog.cloudflare.com/password-reuse-rampant-half-user-logins-compromised/). The same applies to any server you log in to, which is accessible by untrustworthy personnel. They can steal your session cookie.
In the end MFA/2FA is a hoax anyway, because the session cookie (or JWT or whatever) is 1FA anyway.
Did I mention the risks of account lockout with hardware keys that cannot be backupped? And the mess it is to keep at least one other hardware key synchronized if it's in a vault? And the limitation of, for example, 25 WebAuthn accounts max? And (unpatcheable) vulnerabilities found in hardware keys? And their price? And how easy it is to forget or loose them?
Association entre adresse IP et AS
Dans les discussions au sujet du réseau Internet, on voit souvent passer des demandes sur l'AS associé à une adresse IP ou bien le contraire. Mais les questions simples du genre « de quel AS dépend une adresse IP ? » sont… trop simples.
For nearly three decades, we’ve been providing expert training to help our members navigate the digital world.
Our webinars and in-person courses cover topics like IPv6, BGP, the RIPE Database, and more!
Join our new mailing list for tailored training updates: https://www.ripe.net/training/in-person-training-courses/
All RIPE NCC members can attend in-person sessions free of charge.
#routage #factChecking #FRnog #BGP
Très bonne analyse du discours d'un PDG qui prétendait qu'un tiers du trafic Internet mondial passe par ses tuyaux. Spoiler : c'est plus compliqué que ça.
https://anuragbhatia.com/post/2025/02/analysing-transit-free-networks/
Les chefs et les journalistes veulent toujours des stats simples genre « qui a la plus grosse ». Mais la réalité ne se laisse pas faire.
Ever wonder how much routes are there in downstream cone of each known transit free tier 1 network? How much of those routes are single homed Vs multi homed?
Checkout my latest #blog post analysing transit free networks - https://anuragbhatia.com/post/2025/02/analysing-transit-free-networks/
Un RFC (pas encore paru mais presque) qui aura pris du temps (7 ans !), routage SPF avec #BGP. https://datatracker.ietf.org/doc/draft-ietf-lsvr-bgp-spf/
Hey #homelab users!
You probably already know me by my free @BoxyBSD project and I often got asked about IPv4 addresses. Currebtly, I tinker with a new but also honestly not free service. The idea is creating a static IP service for homelab users. I'm aware that there're already some around, so what could be some benefits here?
- Static single #IPv4 & #IPv6 /48 (so you can subnet your homelab to several /64 without breaking #slacc)
- Bigger subnets (IPv4: /29, /28, /27 | IPv6: /32)
- Full RIPE personalization (inc. abuse & Co)
- #OpenVPN, #Wireguard, #GRE Support
- Auto configure (e.g., you load the wireguard config on any client and the addresses Arena immediately bound to that interface)
- Split usage / multiple tunnels: Use different IPs from your subnets at different locations
- Integration into #BoxyBSD
- Location in Germany or Netherlands (selectable)
- Hosted on redundant #FreeBSD nodes
Pricing:
- The starter package probably around 10€/month (not more) + 15€ setup including 2T traffic
- Pricing for addiriinal/larger subnets not yet sure, probably higher setup fees to avoid hoppers and spamers to keep the addresses clean
- Optional traffic packages (when exceeding speed Limit of 10Mbit which should still be ok for most homelabs)
World this be interesting? Im aware that many ones already do this by VPS themselves, so this might just be a bit easier and optionally offering whole networks including RIPE personalizations.
Is Your Internet Service Provider (ISP) Secure? Test It Now!
https://www.byteswifts.com/2025/02/is-your-isp-secure-test-it-now.html
#FOSDEM 2025 special!
Did you met @gyptazy at the conference? Double your resources or get a second VPS in the same or different location for enhancing the learning, evaluation and testing possibilities!
* Learn and create HA setups
* Test #BGP multi-site setups
* Test pf firewall setups
* Test #Wireguard setups
* Test #ZFS send/receive functions
* And many more things
How? Just message @gyptazy in Matrix by your already present and defined Matrix account.
#TIL about the Internet History Initiative (@IHI). It's a website that focuses on historical relevant public data sets. As a #datanerd and #datahoarder of #internet data, I appreciate that something like this spun up.
However, I am shocked, I haven't heard from it so far. Although, it's online since January 2024 already! Will definitely start to keep an eye on it.