cablespaghetti.dev is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.

This server runs the snac software and there is no automatic sign-up process.

Site description
Cablespaghetti's personal snac instance
Admin email
sam@cablespaghetti.dev
Admin account
@sam@cablespaghetti.dev

Search results for tag #networking

[?]Peter N. M. Hansteen » 🌐
@pitrh@mastodon.social

In the world of BSD conferendes, BSDCan 2026 bsdcan.org is next, on June 17-20 in Ottawa, Canada.

Read more about the BSD conferences in "What is BSD? Come to a conference to find out!" nxdomain.no/~peter/what_is_bsd

    [?]joany » 🌐
    @joany@mastodon.bsd.cafe

    Can anyone recommend a decent 2 port PCI network card?

    Not PCIe or PCI-X!!!!

    Bonus if its compatible with and has 1Gb ports

      [?]Larvitz :fedora: :redhat: » 🌐
      @Larvitz@burningboard.net

      test as as German Telefonica roaming customer in the Belgian "Orange" network: [insert sad face here]

        [?]Hacker News » 🤖 🌐
        @h4ckernews@mastodon.social

        [?]Chewie » 🌐
        @chewie@mammut.gogreenit.net

        (netmcr.uk/) is on again this Thursday (9th) in .

        There will be 2 talks:

        * Ross Moya, ‘BNG evolution at a fast growing altnet’:

        A deep dive into how we scaled our BNG deployments to support rapid subscriber growth and the features and improvements we picked up along the way.

        * Thomas Mangin, ‘Ze: What ExaBGP should always have been’:

        We’re very delighted to have Thomas back again to speak about BGP, and this time he’s back with a new and improved project. There will be BGP, there will be Go, and there will be some judicious use of new-fangled programming methods.

        Go and chat with some nice people, have some weird 🍻, and if you're hungry, 🍔 and 🍟!

          [?]Peter N. M. Hansteen » 🌐
          @pitrh@mastodon.social

          [?]Hi I'm Sean [He/Him] » 🌐
          @seano@masto.nyc

          Y'all I was at Chelsea flea yesterday and was swept up in a tsunami of nostalgia. These lil blue mfers used to crush embedded Linux, they carried me through my networking labs

          WRT54G leggo

          An old Linksys router that used to be a household name

          Alt...An old Linksys router that used to be a household name

            [?]Hacker News » 🤖 🌐
            @h4ckernews@mastodon.social

            New Patches Allow Building Linux IPv6-Only, Option to Deprecate "Legacy" IPv4

            phoronix.com/news/Linux-IPv6-I

              [?]Hacker News » 🤖 🌐
              @h4ckernews@mastodon.social

              [?]Tailscale » 🌐
              @tailscale@hachyderm.io

              At ? Missing good coffee?

              Drop by Tailscale’s Peer-to-Pour Cafe at Sextant Coffee Roasters, just steps from Moscone, for free coffee, sweet treats, custom swag, keycap fidgets, and chats with the team. Open Tues Mar 24, 8:00-5:00 and Wed Mar 25, 8:00-4:30 for badge holders. Plus: demos, expo swag, raffles, and more all week.

              tailscale.com/rsac26/?utm_sour

                feld boosted

                [?]Larvitz :fedora: :redhat: » 🌐
                @Larvitz@burningboard.net

                Running a FreeBSD server with two independent uplinks?

                My latest deep dive covers how to mix a physical provider and a BGP tunnel to serve NAT'd, routed, and pure public jail traffic on a single bridge.

                We break down Dual-FIB policy routing and show you how to use PF's rtable and reply-to directives to fix asymmetric routing and keep traffic strictly separated.

                Policy routing done right: blog.hofstede.it/dual-fib-poli

                  [?]Root Moose » 🌐
                  @RootMoose@mastodon.bsd.cafe

                  Any Wireguard gurus out there?

                  Is the following possible?

                  I have a network behind two firewalls with the outer firewall being on CGNAT.

                  I can create a WG tunnel via a VPS outside the CGNAT (random VPS on public Internet) to allow hosts on the network inside of the second firewall to expose TCP ports like an adhoc web server or whatever.

                  This seems to work fine. I can curl a page inside the firewalls by connecting to the public VPS on the configured port for the tunnel.

                  I've tried to get a Wireguard VPN connection to work over this tunnel.

                  That is, a client outside the CGNAT firewall tries to create a VPN connection on the inside the second firewall.

                  Trying to do this by creating a Wireguard VPN connection through an existing Wireguard tunnel.

                  Both firewalls are OPNSense, remote client can be anything but am trying a Win 11 VM currently.

                  I still need to spend more time working on it but I'm really not getting anywhere and was wondering...

                  Is this even possible?

                  Anyone done this?

                  Perhaps there is a different/better approach I should try?

                  👂 👂 All ears. 👂 👂

                    [?]Chewie » 🌐
                    @chewie@mammut.gogreenit.net

                    Good morning!
                    Tonight it is (netmcr.uk/) again in .
                    Join them for a at the Northern Monk (northernmonk.com/pages/manches) from 7pm.

                    Talks will include:

                    * *Sam Cater, 'CHERI - Bolstering security by baking it into silicon'*:

                    A quick run-down of what the CHERI Alliance is and how it came to be, what the technology does, how it's being utilised today with wins & losses. There will be some use-cases demonstrated and a little spin on how that's useful to Sam's employer.

                    * *Christian Farrow, 'From networked clocks to TikTok: atomic timekeeping makes its retro return!'*:

                    Our resident Time Lord is back once again with a neat run down on atomic timekeeping. Arcane mysteries or run-of-the-mill devices? Come find out!

                    *You?*:

                    Feel free to come and speak to us if you've something to speak about, on the evening or ahead of time!

                    Hopefully see you there for some 🍻 , 🍔, 🍟 and ℹ️ 😀

                      Timo Geusch boosted

                      [?]Larvitz :fedora: :redhat: » 🌐
                      @Larvitz@burningboard.net

                      Part 3 of my hobby AS series is up: connecting my AS201379 to LocIX Düsseldorf via a dedicated FreeBSD edge router.

                      Covers route server peering, IPv6-in-IPv6 GIF tunnels, PF on a shared peering LAN, and iBGP back to the core.

                      blog.hofstede.it/running-your-

                        [?]"Musty Bits" McGee » 🌐
                        @arichtman@eigenmagic.net

                        [?]"Musty Bits" McGee » 🌐
                        @arichtman@eigenmagic.net

                        There's no way to do both SLAAC GUAs plus ULAs using DHCPv6 is there?

                        I need all the machines to have ULA for Wireguard reasons but I don't want to give up the GUAs.

                          [?]Da_Gut [He/Him] » 🌐
                          @Da_Gut@dice.camp

                          A favorite of mine. It came around years ago on the Twitter website. I've long lost who to credit.

                          Thanks to detective work by those more talented than I, it appears to belong to "Ally M Hennessy", used in one of her workshops…

                           HELLO. MY NAME IS INIGO MONTOYA. YOU KILLED MY FATHER. PREPARE TO DIE. 
INIGO’S GUIDE TO NETWORKING SUCCESS 
1. POLITE GREETING 
2. NAME 
3. RELEVANT PERSONAL LINK 
4. MANAGE EXPECTATIONS

Princess Bride (the movie) themed meme. Inigo is a Spaniard - long black hair, black mustache, black eyebrows - classic fantasy swashbuckler dress.

                          Alt... HELLO. MY NAME IS INIGO MONTOYA. YOU KILLED MY FATHER. PREPARE TO DIE. INIGO’S GUIDE TO NETWORKING SUCCESS 1. POLITE GREETING 2. NAME 3. RELEVANT PERSONAL LINK 4. MANAGE EXPECTATIONS Princess Bride (the movie) themed meme. Inigo is a Spaniard - long black hair, black mustache, black eyebrows - classic fantasy swashbuckler dress.

                            [?]Peter N. M. Hansteen » 🌐
                            @pitrh@mastodon.social

                            [?]Peter N. M. Hansteen » 🌐
                            @pitrh@mastodon.social

                            [?]Rachel [She/Her] » 🌐
                            @rachel@transitory.social

                            Huh. The router can't connect to addresses on the other side of BGP, but everything else can connect to the BGP addresses just fine. Traceroutes are....strange....


                            This is probably not a good sign.... I should poke at it more tonight probably something with route reflection ?

                              [?]Lety Does Stuff [she/her] » 🌐
                              @lety@doesstuff.social

                              As a female professional, I am passionate about fostering deep, meaningful connections and pursuing collaborative synergies with other women in my field. 🏳️‍🌈✨

                                [?]"Musty Bits" McGee » 🌐
                                @arichtman@eigenmagic.net

                                Site 2 Site Wireguard AllowedIPs question.

                                IPv4 both sites are private address ranges with no overlap, so to do split tunnel I just configure the client AllowedIPs to match the server's untunneled LAN range. Easy enough.

                                However for IPv6 everything has GUA addresses thanks to prefix delegation. Thing is, the ISP won't guarantee my prefix. So how do I guard against prefix changes... Or do I just have to update the client config then?

                                  [?]"Musty Bits" McGee » 🌐
                                  @arichtman@eigenmagic.net

                                  How is everyone doing IPAM for home networks and different sites?

                                  I'm specifically looking at the following:

                                  - ULA for Site2Site VPN - thinking of sticking with one /48 ULA and doing sequential /64s. Or should I just say fuck it and do a different /48 for each?
                                  - IPv4 subnets. Current site is set up with 192.168.1.0/24 and then I went down from 198.168.255.0/24 for VPN ranges. Do I do move the VPN ranges to be sequential on the original site and then what, have a gap and start the new site at 192.168.100.0? I have seen some clever solutions about encoding latitude+longitude into the bits to ensure no clashes, of course I'm not ever going to scale like that but...

                                  Hrm...

                                    [?]"Musty Bits" McGee » 🌐
                                    @arichtman@eigenmagic.net

                                    Finally up to breaking the home network (notwork eheh) as promised while partner is away.

                                    Some scuffles with passwords and IPv6 so far but tethering looks to be working dual stack so both WiFi networks and routers are UP and *both* have internet. Which means no having to look stuff up on my phone or swap networks to get back to the router admin. Incredible luxury tbh

                                    A break and then on to wireguard

                                      [?]Peter N. M. Hansteen » 🌐
                                      @pitrh@mastodon.social

                                      The Book of PF, 4th Edition: It's Here, It's Real nxdomain.no/~peter/its_real_it - now that I have physical copies, I'll bring some to the upcoming conferences such as @EuroBSDCon @nostarch

                                        [?]Chewie » 🌐
                                        @chewie@mammut.gogreenit.net

                                        (netmcr.uk/) is on again this Thursday (12th) in .

                                        The talk will be by Mark Tearle, titled:

                                        ‘It is a disaster! Reacting to the Unexpected’*

                                        Mark has flown across the world, avoiding flight disruptions, to present an interactive talk about disasters that befall networks, data centres and telecommunications infrastructure across the globe. A curated set of incidents will be discussed and the question posed - how would you or your organisation respond?

                                        Go and chat with some nice people, have some weird 🍻, and if you're hungry, 🍔 and 🍟!

                                          [?]Peter N. M. Hansteen » 🌐
                                          @pitrh@mastodon.social

                                          [?]"Musty Bits" McGee » 🌐
                                          @arichtman@eigenmagic.net

                                          Partner is away next week - and you know what that means....

                                          I can break the home network without getting in trouble :blobfoxevil:

                                            [?]Peter N. M. Hansteen » 🌐
                                            @pitrh@mastodon.social

                                            [?]Peter N. M. Hansteen » 🌐
                                            @pitrh@mastodon.social

                                            Michael boosted

                                            [?]Rachel [She/Her] » 🌐
                                            @rachel@transitory.social

                                            [?]Mark Stosberg » 🌐
                                            @markstos@urbanists.social

                                            [?]Peter N. M. Hansteen » 🌐
                                            @pitrh@mastodon.social

                                            Conferences - is only a couple of weeks away, the call for papers for starts tomorrow, and is on for June.

                                            Read more via "What is BSD? Come to a conference to find out!" nxdomain.no/~peter/what_is_bsd

                                              [?]BLACKVOID ⚫️ » 🌐
                                              @blackvoid@mastodon.social

                                              Finally, the ISP has removed CGNAT and gave me a public IP address for the GSM service.

                                              Now the failover setup is complete, and with driven updater "favonia/cloudflare-ddns", all is in place.

                                                [?]Tom :damnified: » 🌐
                                                @thomas@metalhead.club

                                                @mikrotik have a Fediverse account. And not only that- they even have their own instance! :o

                                                mikrotik.social/@mikrotik

                                                  [?]Peter N. M. Hansteen » 🌐
                                                  @pitrh@mastodon.social

                                                  Yes, You Too Can Be An Evil Network Overlord - On The Cheap With OpenBSD, pflow And nfsen nxdomain.no/~peter/yes_you_too

                                                  A story about network metadata and , originally from 2014, good for reprising. See The Book of PF for more @nostarch

                                                    [?]Larvitz :fedora: :redhat: » 🌐
                                                    @Larvitz@burningboard.net

                                                    Any chance that someone might have spare RIPE ATLAS credits?

                                                    I currently do some experiments with the IPv6 routing of my AS201379 and being able to do measurements on Atlas would be sooooo helpful right now.

                                                      [?]Radio_Azureus » 🌐
                                                      @Radio_Azureus@ioc.exchange

                                                      [?]Larvitz :fedora: :redhat: » 🌐
                                                      @Larvitz@burningboard.net

                                                      Spent way too long getting HTTP/3 working on FreeBSD with nginx, so I wrote it all up.

                                                      The highlights: stock OpenSSL silently breaks QUIC at the HTTP/3 framing layer (the TLS handshake succeeds, so openssl s_client lies to you). eBPF worker routing doesn't exist on FreeBSD. And if nginx is in a jail with IPv4 NAT, a pass rule for UDP 443 is useless without a matching rdr.

                                                      New post: blog.hofstede.it/http3-on-free

                                                        [?]Oblomov » 🌐
                                                        @oblomov@sociale.network

                                                        16 hours in, we're at ~125K IPs, so we're keeping the rate of around 2 attempts per second. I'm still waiting for recommendations on tools that would allow me to wade through this huge collection of IPs to get statistics on who they belong to, if there's an actual botnet in it (inclusive of residential addresses taken over by it) and/or which datacenters are involved. Any ?

                                                          [?]"Musty Bits" McGee » 🌐
                                                          @arichtman@eigenmagic.net

                                                          One day I'll understand enough to separate the router from the gateway.... Today is not that day.

                                                          Probably not the year, either.

                                                            [?]BLACKVOID ⚫️ » 🌐
                                                            @blackvoid@mastodon.social

                                                            A proper rain shower today and whole last night. Testing IP67 rating ;)

                                                              Back to top - More...