cablespaghetti.dev is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.

This server runs the snac software and there is no automatic sign-up process.

Site description
Cablespaghetti's personal snac instance
Admin email
sam@cablespaghetti.dev
Admin account
@sam@cablespaghetti.dev

Search results for tag #networking

[?]Peter N. M. Hansteen » 🌐
@pitrh@mastodon.social

[?]Peter N. M. Hansteen » 🌐
@pitrh@mastodon.social

[?]Larvitz :fedora: :redhat: » 🌐
@Larvitz@burningboard.net

New blog post: Running your own Autonomous System on FreeBSD.

Got an AS number and IPv6 /48 via RIPE, set up a FreeBSD BGP router with FRR, two upstreams, and built GRE/GIF tunnels ti bring my own globally routable addresses to servers at different providers.

The interesting part: dual-FIB policy routing lets FreeBSD jails speak from both provider and BGP addresses simultaneously.

blog.hofstede.it/running-your-

    [?]Peter N. M. Hansteen » 🌐
    @pitrh@mastodon.social

    [?]Larvitz :fedora: :redhat: » 🌐
    @Larvitz@burningboard.net

    My website "hofstede.it" now lives in my own AS201379 on my asigned IP-addresses 🙂

    bgp.tools/prefix/2a06:9801:1c:

    Running my own BGP router in LONAP (London) with FreeBSD and FRR, where I announce my network 2a06:9801:1c::/48 to the internet.

    Peering is still fairly limited, but that'll improve within the next weeks, when I get 2 additional peers 🙂

      Rachel boosted

      [?]Rachel [She/Her] » 🌐
      @rachel@transitory.social

      :ablobcatbounce:​ Incident report: ​:ablobcatbounce:

      * Previously in the week it was noticed that Cilium had an update to 1.19.0
      * Upon further inspection, this looked to be a pre-release, so it was left alone, cilium is a load-bearing component and should only be touched with care
      * At some point in the last week I forgot about that and hit merge in forgejo, not an issue, since argocd won't auto-sync any load-bearing components (cilium, forgejo, argo, cert-manger, and a handful of others)
      * Over the last few days I have repeatedly restarted various components while troubleshooting some OIDC issues. Including ArgoCD and Forgejo
      * This caused a few sync errors or argo state refresh errors as pods were unceremoniously exploded
      * At some point during this time Cilium ended up out of sync/errored
      * By this point I had forgotten about the cilium major* update
      * I hit sync to clear that out and see what is wrong. Everything is green, and nothing breaks.
      * BGP sessions continue
      * I go about my afternoon
      * BGP sessions expire, causing immediate issues. since my old config was depricated
      * I start the investigation with DNS, since the TV stopped playback and sites stopped loading on my laptop
      * Yup, DNS is down.
      * But not from my dev console, that means ad-guard DNS is down.
      * Ad-guard DNS is throwing errors connecting to quad9 via DoT, I am not sure the cause of this, maybe the UI has a clue
      * ad-guard DNS ui isn't opening, oh. No cluster-based site is opening actually.
      * Confirmed, all LB services are down, must be BGP related
      * Looking in the Mikrotik router I see two BGP sessions, so I restart the BGP service on the router, they drop and don't re-appear, must have been stale on that side.
      * Restart cilium to see logs
      * BGP config error? Wait, did cilium update???

      ⚠️ You may need to take action during upgrade to Cilium v1.19 if you use Network Policies, Cluster Mesh, LoadBalancer IPAM or BGP.
      * Oh right, I've been seeing depreciation warnings about the BGP config for ages now
      * After converting the docs format I am rewarded with the TV abruptly starting the playlist, time to commit this to git and move on, phew
      :ablobcatjumping:

        [?]Myk [He/Him] » 🌐
        @notsle@kzoo.to

        [?]Digital Escape Tools » 🌐
        @xabd@mastodon.social

        LibreSpeed is a lightweight, open-source internet speed test you can fully self-host.

        No trackers, no Flash/Java, no forced telemetry just download, upload, ping, and jitter. A privacy-friendly alternative to Speedtest.net and Fast.com.

        👉 github.com/librespeed/speedtest

        👉 More tools like this: digital-escape-tools-phi.verce

        Self-hosted Speed Test for HTML5 and more. Easy setup, examples, configurable, mobile friendly. Supports PHP, Node, Multiple servers, and more

        Alt...Self-hosted Speed Test for HTML5 and more. Easy setup, examples, configurable, mobile friendly. Supports PHP, Node, Multiple servers, and more

          [?]Rachel [She/Her] » 🌐
          @rachel@transitory.social

          A blog series on my descent into maddness with PKI/etc would probably be interesting

          But first I can finish out the networking series (latest post here).

          The last part for now will be about taking the engress policy features and wireguard and then creating a wireguard interface on a Talos linux node, and then assigning routing rules to a non-default table, so only traffic assigned to that interface uses it.

          The end result: ability to create a egress policy targeting a pod, and send all outbound traffic out over that VPN link.

          I could have done this for the web services that I am having exit on the cloud node, but I want to eventually put caching on the edge.

          Of course the goal here with the wireguard exit was to use ProtonVPN for a download client......

            [?]Peter N. M. Hansteen » 🌐
            @pitrh@mastodon.social

            [?]Stefano Marinelli » 🌐
            @stefano@mastodon.bsd.cafe

            Tonight the waves of bot traffic hitting many of the servers I manage have intensified, including Brew on BSD Cafe, but not only that. Honestly, the feeling I have now is no longer the same as it was some time ago (AI scrapers), but that there are real disruption operations going on. I can see it’s much more concentrated around certain providers and certain datacenters. If I block some countries like China, the numbers drop dramatically.

            I still haven’t figured out whether there’s something specific and targeted happening (a broad DDoS) or if they’re still scrapers, but they honestly seem really dumb.

            Maybe we should just create an alternative network and leave the Internet to these entities.
            At this point they’re just talking to themselves anyway.

              [?]Fluchtkapsel [er/ihm, he/him, they/them] » 🌐
              @fluchtkapsel@nerdculture.de

              Assume two machines in the same network each have a link-local address (LLA) and a unique-local address (ULA). They could talk to each other with either address. Is there some kind of prioritizing the one over the other, e.g. always use LLA if available else use ULA?

                [?]Peter N. M. Hansteen » 🌐
                @pitrh@mastodon.social

                [?]Peter N. M. Hansteen » 🌐
                @pitrh@mastodon.social

                Oh, I suppose I have been slacking and not telling you that if you order The Book of PF, 4th ed nostarch.com/book-of-pf-4th-ed now, you will get the *final version* ebook (print is still in progress) @nostarch

                Also see nxdomain.no/~peter/yes_the_boo

                  [?]"Musty Bits" McGee » 🌐
                  @arichtman@eigenmagic.net

                  [?]BastilleBSD :freebsd: » 🌐
                  @BastilleBSD@fosstodon.org

                  Need to expose a service running inside a Bastille jail? Use the `bastille rdr` command to easily map a port from the host to the jailed system.

                    [?]Eugene :freebsd: :emacslogo: [he/him] » 🌐
                    @evgandr@mastodon.bsd.cafe

                    Few days ago I successfully configured to have a TURN/STUN server for in-family calls. But … looks like bots or some bad guys constantly trying to connect to my TURN server to use it for something :-(

                    Of course, it is impossible, since anonymous access or any other access without right key is impossible. But, there are no IPs of attackers in the log file, even wth "Verbose" directive — only my local and public IPs and my server's hostname :drgn_cry:

                    Maybe, there is some way to force coturn to display IP addresses of connected clients, so I could ban them all with fail2ban?

                    Screenshot of turn.log with lines of unsuccessful attempts to connect to my TURN server. Sadly, there are only my IPs and hostname, no IPs of attackers.

                    Alt...Screenshot of turn.log with lines of unsuccessful attempts to connect to my TURN server. Sadly, there are only my IPs and hostname, no IPs of attackers.

                      [?]Tommi 🤯 [they/he] » 🌐
                      @tommi@pan.rent

                      I am in @EUCommission’s Berlaymont building, connected to the EC_Guest WiFi.

                      Very weird and interesting: pan.rent is blocked by the firewall. I can ping and traceroute our server, but I cannot load it via Web interface nor via API. It works with a VPN, though.

                      traceroute to pan.rent (46.62.195.61), 30 hops max, 60 byte pckts
 1  _gateway (172.17.192.1)  7.825 ms  7.800 ms  7.787 ms
 2  10.129.12.28 (10.129.12.28)  7.770 ms  7.755 ms  7.741 ms
 3  147.67.127.126 (147.67.127.126)  8.460 ms  8.448 ms  8.435 ms
 4  147.67.4.97 (147.67.4.97)  8.437 ms  8.422 ms  8.408 ms
 5  147.67.127.17 (147.67.127.17)  8.394 ms  8.366 ms  8.351 ms
 6  147.67.16.1 (147.67.16.1)  8.336 ms  6.759 ms  8.052 ms
 7  213.194.0.154 (213.194.0.154)  8.030 ms  8.006 ms  7.982 ms
 8  166-49-153-16.gia.bt.net (166.49.153.16)  14.405 ms  14.177 ms  14.152 ms
 9  t2c4-xe-1-0-0.be-bru.gia.bt.net (166.49.195.128)  15.313 ms t2c4-xe-1-0-1.be-bru.gia.bt.net (166.49.195.130)  15.291 ms  15.273 ms
10  t2c4-xe-0-0-0.nl-ams2.gia.bt.net (166.49.208.232)  15.253 ms t2c4-xe-7-2-0.nl-ams2.gia.bt.net (166.49.208.97)  17.151 ms t2c4-xe-8-3-3.nl-ams2.gia.bt.net (166.49.195.114)  15.217 ms
11  t2c3-et-11-0-2-1.nl-ams2.gia.bt.net (166.49.164.156)  15.199 ms t2c3-et-5-0-2-1.nl-ams2.gia.bt.net (166.49.164.132)  15.180 ms t2c3-et-11-0-2-1.nl-ams2.gia.bt.net (166.49.164.156)  17.028 ms
12  213-133-124-217.clients.your-server.de (213.133.124.217)  17.786 ms  17.770 ms  17.238 ms
13  * * *
15  core32.hel1.hetzner.com (213.239.254.69)  38.999 ms core31.hel1.hetzner.com (213.239.254.61)  38.679 ms  38.662 ms
16  * * *
18  29584.your-cloud.host (65.109.47.68)  38.865 ms  38.784 ms  37.986 ms
19  static.61.195.62.46.clients.your-server.de (46.62.195.61)  39.988 ms  38.882 ms  38.760 ms

                      Alt...traceroute to pan.rent (46.62.195.61), 30 hops max, 60 byte pckts 1 _gateway (172.17.192.1) 7.825 ms 7.800 ms 7.787 ms 2 10.129.12.28 (10.129.12.28) 7.770 ms 7.755 ms 7.741 ms 3 147.67.127.126 (147.67.127.126) 8.460 ms 8.448 ms 8.435 ms 4 147.67.4.97 (147.67.4.97) 8.437 ms 8.422 ms 8.408 ms 5 147.67.127.17 (147.67.127.17) 8.394 ms 8.366 ms 8.351 ms 6 147.67.16.1 (147.67.16.1) 8.336 ms 6.759 ms 8.052 ms 7 213.194.0.154 (213.194.0.154) 8.030 ms 8.006 ms 7.982 ms 8 166-49-153-16.gia.bt.net (166.49.153.16) 14.405 ms 14.177 ms 14.152 ms 9 t2c4-xe-1-0-0.be-bru.gia.bt.net (166.49.195.128) 15.313 ms t2c4-xe-1-0-1.be-bru.gia.bt.net (166.49.195.130) 15.291 ms 15.273 ms 10 t2c4-xe-0-0-0.nl-ams2.gia.bt.net (166.49.208.232) 15.253 ms t2c4-xe-7-2-0.nl-ams2.gia.bt.net (166.49.208.97) 17.151 ms t2c4-xe-8-3-3.nl-ams2.gia.bt.net (166.49.195.114) 15.217 ms 11 t2c3-et-11-0-2-1.nl-ams2.gia.bt.net (166.49.164.156) 15.199 ms t2c3-et-5-0-2-1.nl-ams2.gia.bt.net (166.49.164.132) 15.180 ms t2c3-et-11-0-2-1.nl-ams2.gia.bt.net (166.49.164.156) 17.028 ms 12 213-133-124-217.clients.your-server.de (213.133.124.217) 17.786 ms 17.770 ms 17.238 ms 13 * * * 15 core32.hel1.hetzner.com (213.239.254.69) 38.999 ms core31.hel1.hetzner.com (213.239.254.61) 38.679 ms 38.662 ms 16 * * * 18 29584.your-cloud.host (65.109.47.68) 38.865 ms 38.784 ms 37.986 ms 19 static.61.195.62.46.clients.your-server.de (46.62.195.61) 39.988 ms 38.882 ms 38.760 ms

                        Nicd boosted

                        [?]cos » 🌐
                        @cos@fosstodon.org

                        I need a long distance (~300m) network connection through forest. Wireless or lasers don't like any obstacles so I need to rule them out.

                        Cat6 official max distance is 100m, but what if I would slow the speed down to 10mbps - would it allow longer cable runs? Online searches reveal that there is lot of ai-generated or just copied content without answers.

                          [?]Peter N. M. Hansteen » 🌐
                          @pitrh@mastodon.social

                          [?]BSDCan » 🌐
                          @bsdcan@bsd.network

                          3 more days!

                          BSDCan 2026 is now accepting submissions for the June 2026 conference, see bsdcan.org/2026/papers.html and links therein for instructions.

                          Submissions deadline is January 17, 2026, the conference runs tutorials June 17-18, talks June 19-20.

                            [?]Peter N. M. Hansteen » 🌐
                            @pitrh@mastodon.social

                            [?]Gary Hawkins » 🌐
                            @ghawkins@mastodon.garyhawkins.uk

                            I wish there was a switch/option on the ip (-6) route show command to sort correctly by prefix and preflix length.

                              [?]Peter N. M. Hansteen » 🌐
                              @pitrh@mastodon.social

                              [?]Alex Kretzschmar » 🌐
                              @ironicbadger@techhub.social

                              [?]Alex Kretzschmar » 🌐
                              @ironicbadger@techhub.social


                              Cleaned up the basement rack.

                                [?]Peter N. M. Hansteen » 🌐
                                @pitrh@mastodon.social

                                [?]Ricardo Martín :bsdhead: » 🌐
                                @ricardo@mastodon.bsd.cafe

                                Never miss a chance to criticize, and don’t lose sleep over rejecting a job at a company whose electrical installation is a total shitshow ✌️

                                  [?]Chewie » 🌐
                                  @chewie@mammut.gogreenit.net

                                  (netmcr.uk/) in is on tomorrow (8th January) at the Northern Monk (northernmonk.com/pages/manches) from 7pm.

                                  Tim Panton will be talking about ‘Quantifying 5G Uplink Performance From a Moving Vehicle’

                                  Sounds complicated/interesting 😀

                                  Go and chat with some nice people, have some weird 🍻, and if you're hungry, 🍔 and 🍟!

                                    [?]Dan Ports » 🌐
                                    @dan@discuss.systems

                                    When adopting a new 100GbE switch, it’s important to follow gradual introduction procedures to keep your existing cats from becoming stressed and developing RDMA aggression.

                                    A Siamese tabby cat sniffs an Arista switch sitting on a table

                                    Alt...A Siamese tabby cat sniffs an Arista switch sitting on a table

                                      [?]Peter N. M. Hansteen » 🌐
                                      @pitrh@mastodon.social

                                      [?]Peter N. M. Hansteen » 🌐
                                      @pitrh@mastodon.social

                                      There will be a "Network Management with the OpenBSD Packet Filter Toolset" at AsiaBSDCon in Taipei Thursday, March 19 2026.

                                      Yours truly and Max Stucchi teaching networking goodness.

                                      Details soon to emerge at 2026.asiabsdcon.org/ @stucchimax

                                        [?]0x0 » 🌐
                                        @0x0@hachyderm.io

                                        Maybe will surprise me... my all-in-one crap ass ISP modem/router/wifi/whatever only has 4 gigabit LAN ports.

                                        I'd like to bridge-mode it and get a replacement with 6+ gigabit LAN ports, any suggestions shipping within the EU?

                                        Boosts welcome.

                                          [?]Michael Jack » 🌐
                                          @mjack@mastodon.bsd.cafe

                                          Playground setup with Raspberry Pi 5 and Mikrotik hEX router.

                                          The Pi, with a M.2 HAT+ Compact, is running Raspberry Pi OS Desktop.

                                          The hEX is running RouterOS 7.20.6, without a default configuration. Right now it's acting more like a switch.

                                          I'm using Raspberry Pi Connect to access the Pi from outside my home network, and mostly ssh and WinBox to access the devices when inside, but Connect also works here.

                                          Photo of Raspberry Pi 5 in a standard white case and a MikroTik hEX router, sitting next to each other, and on top of a USB-C docking station

                                          Alt...Photo of Raspberry Pi 5 in a standard white case and a MikroTik hEX router, sitting next to each other, and on top of a USB-C docking station

                                          Screen shot from Raspberry Pi Connect, showing a device named "playground". The device is online and offers "Screen sharing" and "Remote shell" access

                                          Alt...Screen shot from Raspberry Pi Connect, showing a device named "playground". The device is online and offers "Screen sharing" and "Remote shell" access

                                            [?]Stefano Marinelli » 🌐
                                            @stefano@mastodon.bsd.cafe

                                            I’ve been losing my mind for almost 4 hours, and I feel like an idiot.

                                            At first I couldn't understand why the TLS handshake was always taking more than 300 milliseconds. I thought it was a local or server-side issue. Only after about an hour did I test google.com and saw the exact same behavior.

                                            That's when I realized that with my other WAN connection, the timing drops significantly.

                                            So I started going crazy over my MikroTik configuration, convinced it had to be something related to multi-WAN. I even briefly asked an AI (I know, I know...), which said the problem was probably my neighbor, who had eaten too much pizza.

                                            At that point, I kept spiraling.

                                            Then it hit me that the Vodafone Station has its built-in Wi-Fi disabled, since I manage the network behind it. I could enable it and bypass the MikroTik. I enabled it and ran a direct test.

                                            Bingo. Same problem.

                                            So the issue is upstream. I suspect it’s "Vodafone Rete Sicura", some awful thing I never wanted and that probably does some kind of traffic inspection.

                                            I really can't wait for FTTH to arrive so I can finally get rid of this stuff.

                                              [?]Peter N. M. Hansteen » 🌐
                                              @pitrh@mastodon.social

                                              [?]Peter N. M. Hansteen » 🌐
                                              @pitrh@mastodon.social

                                              Back to top - More...