cablespaghetti.dev is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.

This server runs the snac software and there is no automatic sign-up process.

Site description
Cablespaghetti's personal snac instance
Admin email
sam@cablespaghetti.dev
Admin account
@sam@cablespaghetti.dev

Search results for tag #networking

[?]Peter N. M. Hansteen » 🌐
@pitrh@mastodon.social

The Book of PF, 4th Edition: It's Here, It's Real nxdomain.no/~peter/its_real_it - now that I have physical copies, I'll bring some to the upcoming conferences such as @EuroBSDCon @nostarch

    [?]Chewie » 🌐
    @chewie@mammut.gogreenit.net

    (netmcr.uk/) is on again this Thursday (12th) in .

    The talk will be by Mark Tearle, titled:

    ‘It is a disaster! Reacting to the Unexpected’*

    Mark has flown across the world, avoiding flight disruptions, to present an interactive talk about disasters that befall networks, data centres and telecommunications infrastructure across the globe. A curated set of incidents will be discussed and the question posed - how would you or your organisation respond?

    Go and chat with some nice people, have some weird 🍻, and if you're hungry, 🍔 and 🍟!

      [?]Larvitz » 🌐
      @Larvitz@mastodon.bsd.cafe

      Nice! NAT64 in action, My IPv6-only jail can successfully talk with Github. No tayga, just the new "af-to" feature, that the "pf" firewall got in 15.0-RELEASE:

      pass in quick on bastille0 inet6 from $jail_net to 64:ff9b::/96 \
      af-to inet from ($ext_if) keep state

      This is genuinly nice! 🙂

        [?]Peter N. M. Hansteen » 🌐
        @pitrh@mastodon.social

        [?]"Musty Bits" McGee » 🌐
        @arichtman@eigenmagic.net

        Partner is away next week - and you know what that means....

        I can break the home network without getting in trouble :blobfoxevil:

          [?]Peter N. M. Hansteen » 🌐
          @pitrh@mastodon.social

          [?]Peter N. M. Hansteen » 🌐
          @pitrh@mastodon.social

          Michael boosted

          [?]Rachel [She/Her] » 🌐
          @rachel@transitory.social

          [?]Mark Stosberg » 🌐
          @markstos@urbanists.social

          [?]Peter N. M. Hansteen » 🌐
          @pitrh@mastodon.social

          Conferences - is only a couple of weeks away, the call for papers for starts tomorrow, and is on for June.

          Read more via "What is BSD? Come to a conference to find out!" nxdomain.no/~peter/what_is_bsd

            [?]BLACKVOID ⚫️ » 🌐
            @blackvoid@mastodon.social

            Finally, the ISP has removed CGNAT and gave me a public IP address for the GSM service.

            Now the failover setup is complete, and with driven updater "favonia/cloudflare-ddns", all is in place.

              [?]Tom :damnified: » 🌐
              @thomas@metalhead.club

              @mikrotik have a Fediverse account. And not only that- they even have their own instance! :o

              mikrotik.social/@mikrotik

                [?]Peter N. M. Hansteen » 🌐
                @pitrh@mastodon.social

                Yes, You Too Can Be An Evil Network Overlord - On The Cheap With OpenBSD, pflow And nfsen nxdomain.no/~peter/yes_you_too

                A story about network metadata and , originally from 2014, good for reprising. See The Book of PF for more @nostarch

                  [?]Larvitz :fedora: :redhat: » 🌐
                  @Larvitz@burningboard.net

                  Any chance that someone might have spare RIPE ATLAS credits?

                  I currently do some experiments with the IPv6 routing of my AS201379 and being able to do measurements on Atlas would be sooooo helpful right now.

                    [?]Radio_Azureus » 🌐
                    @Radio_Azureus@ioc.exchange

                    [?]Larvitz :fedora: :redhat: » 🌐
                    @Larvitz@burningboard.net

                    Spent way too long getting HTTP/3 working on FreeBSD with nginx, so I wrote it all up.

                    The highlights: stock OpenSSL silently breaks QUIC at the HTTP/3 framing layer (the TLS handshake succeeds, so openssl s_client lies to you). eBPF worker routing doesn't exist on FreeBSD. And if nginx is in a jail with IPv4 NAT, a pass rule for UDP 443 is useless without a matching rdr.

                    New post: blog.hofstede.it/http3-on-free

                      [?]Oblomov » 🌐
                      @oblomov@sociale.network

                      16 hours in, we're at ~125K IPs, so we're keeping the rate of around 2 attempts per second. I'm still waiting for recommendations on tools that would allow me to wade through this huge collection of IPs to get statistics on who they belong to, if there's an actual botnet in it (inclusive of residential addresses taken over by it) and/or which datacenters are involved. Any ?

                        [?]"Musty Bits" McGee » 🌐
                        @arichtman@eigenmagic.net

                        One day I'll understand enough to separate the router from the gateway.... Today is not that day.

                        Probably not the year, either.

                          [?]BLACKVOID ⚫️ » 🌐
                          @blackvoid@mastodon.social

                          A proper rain shower today and whole last night. Testing IP67 rating ;)

                            [?]BLACKVOID ⚫️ » 🌐
                            @blackvoid@mastodon.social

                            Stage 3, done. Mounted and connected end to end. All is working!

                              [?]BLACKVOID ⚫️ » 🌐
                              @blackvoid@mastodon.social

                              Stage 2 complete. CAT7 cable is ready and it goes from UDM to the outside end position.

                              Need to attach the RJ45 connectors and mount the modem in place.

                              This will wait until th weather clears. One more stage to go.

                              (also, GSM ISP still didn’t remove CGNAT. I mean how long does it take to configure a single SIM?)

                                [?]BLACKVOID ⚫️ » 🌐
                                @blackvoid@mastodon.social

                                Connect, adopt, update, done. Failover ready.

                                It took about 10-13 pings to switch over. Quick enough in my book.

                                  [?]BLACKVOID ⚫️ » 🌐
                                  @blackvoid@mastodon.social

                                  Internal (non-ideal) testing. The modem is indoors atm for adoption and update.

                                  The speeds are lower as expected, but the whole setup works. This was too easy.

                                    [?]BLACKVOID ⚫️ » 🌐
                                    @blackvoid@mastodon.social

                                    failover setup has arrived!

                                    - 5G oudoor (PoE)
                                    - 50m of CAT7 outdoor cable
                                    - SIM card in the process of CGNAT removal

                                    If the weather holds, it will be a "work" weekend!

                                    Unifi 5G Max outdoor GSM modem for failover network connectivity

                                    Alt...Unifi 5G Max outdoor GSM modem for failover network connectivity

                                      [?]Peter N. M. Hansteen » 🌐
                                      @pitrh@mastodon.social

                                      The fresh 4th edition of The Book of PF in physical form has reached Europe (Ireland), linkedin.com/posts/tomsmythcon - so my stack of author copies are hopefully on the way too.

                                      The book home page is at nostarch.com/book-of-pf-4th-ed

                                      Some background nxdomain.no/~peter/yes_the_boo @nostarch

                                        [?]Chewie » 🌐
                                        @chewie@mammut.gogreenit.net

                                        (netmcr.uk/) is on again this Thursday (12th) in .

                                        The talk will be by Lewis Hill, ‘Migrating from VMWare to Proxmox’:

                                        "We’re very excited to hear from Lewis, who is coming to us with his first talk, and it’s on a really pertinent subject for more than a few of us. Not one to miss!"

                                        Go and chat with some nice people, have some weird 🍻, and if you're hungry, 🍔 and 🍟!

                                          [?]Pete Keen » 🌐
                                          @zrail@hachyderm.io

                                          Thinking about ways for my to be resilient to fundamental network changes like "what if the core router gets swapped out / loses dhcp leases / ISP rolls ipv6 leases"

                                          The best I can figure is using some sort of overlay network to re-bootstrap internal DNS, ideally without requiring internet access. I haven't found a ton of prior art on an internet-less mesh cold start, but I think it's a neat thing to noodle on.

                                            [?]SP⟁CED GO⟁T » 🌐
                                            @finner@appdot.net

                                            So when your internet goes down your android phone understandably starts routing all network requests through mobile data, but maintains the connection to the WiFi and periodically checks to see of internet is back up so it can switch back. This is fine unless you want to access local network stuff. I know I can turn off mobile data, but that has obvious downsides. Is there another way to easily route certain things to the WiFi connection without turning off mobile data?

                                              [?]Larvitz » 🌐
                                              @Larvitz@mastodon.bsd.cafe

                                              I bought a copy of "The Book of PF" from @pitrh

                                              It's the best and most comprehensive resource about the marvelous PF firewall that I've ever seen, and I've been using PF since the early days.

                                              Amazing work!

                                              It's available here on No Starch Press: nostarch.com/book-of-pf-4th-ed

                                              I also recently wrote a practical guide on PF (blog.hofstede.it/pf-firewall-o) for anyone who wants to get started :-)

                                              Cover of "THE BOOK OF PF"

                                              Alt...Cover of "THE BOOK OF PF"

                                                [?]Peter N. M. Hansteen » 🌐
                                                @pitrh@mastodon.social

                                                [?]Peter N. M. Hansteen » 🌐
                                                @pitrh@mastodon.social

                                                [?]Larvitz :fedora: :redhat: » 🌐
                                                @Larvitz@burningboard.net

                                                New blog post: Running your own Autonomous System on FreeBSD.

                                                Got an AS number and IPv6 /48 via RIPE, set up a FreeBSD BGP router with FRR, two upstreams, and built GRE/GIF tunnels ti bring my own globally routable addresses to servers at different providers.

                                                The interesting part: dual-FIB policy routing lets FreeBSD jails speak from both provider and BGP addresses simultaneously.

                                                blog.hofstede.it/running-your-

                                                  [?]Peter N. M. Hansteen » 🌐
                                                  @pitrh@mastodon.social

                                                  [?]Larvitz :fedora: :redhat: » 🌐
                                                  @Larvitz@burningboard.net

                                                  My website "hofstede.it" now lives in my own AS201379 on my asigned IP-addresses 🙂

                                                  bgp.tools/prefix/2a06:9801:1c:

                                                  Running my own BGP router in LONAP (London) with FreeBSD and FRR, where I announce my network 2a06:9801:1c::/48 to the internet.

                                                  Peering is still fairly limited, but that'll improve within the next weeks, when I get 2 additional peers 🙂

                                                    Rachel boosted

                                                    [?]Rachel [She/Her] » 🌐
                                                    @rachel@transitory.social

                                                    :ablobcatbounce:​ Incident report: ​:ablobcatbounce:

                                                    * Previously in the week it was noticed that Cilium had an update to 1.19.0
                                                    * Upon further inspection, this looked to be a pre-release, so it was left alone, cilium is a load-bearing component and should only be touched with care
                                                    * At some point in the last week I forgot about that and hit merge in forgejo, not an issue, since argocd won't auto-sync any load-bearing components (cilium, forgejo, argo, cert-manger, and a handful of others)
                                                    * Over the last few days I have repeatedly restarted various components while troubleshooting some OIDC issues. Including ArgoCD and Forgejo
                                                    * This caused a few sync errors or argo state refresh errors as pods were unceremoniously exploded
                                                    * At some point during this time Cilium ended up out of sync/errored
                                                    * By this point I had forgotten about the cilium major* update
                                                    * I hit sync to clear that out and see what is wrong. Everything is green, and nothing breaks.
                                                    * BGP sessions continue
                                                    * I go about my afternoon
                                                    * BGP sessions expire, causing immediate issues. since my old config was depricated
                                                    * I start the investigation with DNS, since the TV stopped playback and sites stopped loading on my laptop
                                                    * Yup, DNS is down.
                                                    * But not from my dev console, that means ad-guard DNS is down.
                                                    * Ad-guard DNS is throwing errors connecting to quad9 via DoT, I am not sure the cause of this, maybe the UI has a clue
                                                    * ad-guard DNS ui isn't opening, oh. No cluster-based site is opening actually.
                                                    * Confirmed, all LB services are down, must be BGP related
                                                    * Looking in the Mikrotik router I see two BGP sessions, so I restart the BGP service on the router, they drop and don't re-appear, must have been stale on that side.
                                                    * Restart cilium to see logs
                                                    * BGP config error? Wait, did cilium update???

                                                    ⚠️ You may need to take action during upgrade to Cilium v1.19 if you use Network Policies, Cluster Mesh, LoadBalancer IPAM or BGP.
                                                    * Oh right, I've been seeing depreciation warnings about the BGP config for ages now
                                                    * After converting the docs format I am rewarded with the TV abruptly starting the playlist, time to commit this to git and move on, phew
                                                    :ablobcatjumping:

                                                      [?]Myk [He/Him] » 🌐
                                                      @notsle@kzoo.to

                                                      [?]Rachel [She/Her] » 🌐
                                                      @rachel@transitory.social

                                                      A blog series on my descent into maddness with PKI/etc would probably be interesting

                                                      But first I can finish out the networking series (latest post here).

                                                      The last part for now will be about taking the engress policy features and wireguard and then creating a wireguard interface on a Talos linux node, and then assigning routing rules to a non-default table, so only traffic assigned to that interface uses it.

                                                      The end result: ability to create a egress policy targeting a pod, and send all outbound traffic out over that VPN link.

                                                      I could have done this for the web services that I am having exit on the cloud node, but I want to eventually put caching on the edge.

                                                      Of course the goal here with the wireguard exit was to use ProtonVPN for a download client......

                                                        [?]Peter N. M. Hansteen » 🌐
                                                        @pitrh@mastodon.social

                                                        [?]Stefano Marinelli » 🌐
                                                        @stefano@mastodon.bsd.cafe

                                                        Tonight the waves of bot traffic hitting many of the servers I manage have intensified, including Brew on BSD Cafe, but not only that. Honestly, the feeling I have now is no longer the same as it was some time ago (AI scrapers), but that there are real disruption operations going on. I can see it’s much more concentrated around certain providers and certain datacenters. If I block some countries like China, the numbers drop dramatically.

                                                        I still haven’t figured out whether there’s something specific and targeted happening (a broad DDoS) or if they’re still scrapers, but they honestly seem really dumb.

                                                        Maybe we should just create an alternative network and leave the Internet to these entities.
                                                        At this point they’re just talking to themselves anyway.

                                                          [?]Fluchtkapsel [er/ihm, he/him, they/them] » 🌐
                                                          @fluchtkapsel@nerdculture.de

                                                          Assume two machines in the same network each have a link-local address (LLA) and a unique-local address (ULA). They could talk to each other with either address. Is there some kind of prioritizing the one over the other, e.g. always use LLA if available else use ULA?

                                                            [?]Peter N. M. Hansteen » 🌐
                                                            @pitrh@mastodon.social

                                                            Back to top - More...