nrw.social ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Wir sind eine freundliche Mastodon Instanz aus Nordrhein-Westfalen. Ob NRW'ler oder NRW-Sympathifanten, jeder ist hier willkommen.

Serverstatistik:

2,8 Tsd.
aktive Profile

#bgp

2 Beiträge2 Beteiligte0 Beiträge heute
NLnet Labs<p>A new release of Rotonda, our composable, programmable <a href="https://fosstodon.org/tags/BGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BGP</span></a> engine, is now available. Version 0.4.0 'Bold and Undaunting Youth' features and <a href="https://fosstodon.org/tags/RPKI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RPKI</span></a> RTR component, as well as Route Origin Validation on incoming routes. <a href="https://github.com/NLnetLabs/rotonda/releases/tag/v0.4.0" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/NLnetLabs/rotonda/r</span><span class="invisible">eleases/tag/v0.4.0</span></a></p>
Rudolph Bott<p>BGP Unnumbered with different vendors in 2025: not so fast, hotshot 🙂 </p><p><a href="https://blog.bott.im/bgp-unnumbered-in-2025-same-idea-different-implementations/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.bott.im/bgp-unnumbered-in</span><span class="invisible">-2025-same-idea-different-implementations/</span></a></p><p><a href="https://chaos.social/tags/juniper" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>juniper</span></a> <a href="https://chaos.social/tags/nokia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nokia</span></a> <a href="https://chaos.social/tags/bird" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bird</span></a> <a href="https://chaos.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://chaos.social/tags/networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networking</span></a> <a href="https://chaos.social/tags/bgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bgp</span></a></p>
Stéphane Bortzmeyer<p><a href="https://mastodon.gougere.fr/tags/BGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BGP</span></a><br>Joli, un des rares cas dans la table de routage mondiale où l'origine est un AS_SET (ici à trois AS) : <a href="https://mastodon.gougere.fr/@bgp/114375106512755449" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.gougere.fr/@bgp/11437</span><span class="invisible">5106512755449</span></a></p>
Stéphane Bortzmeyer<p>Oulah, la doc' <a href="https://mastodon.gougere.fr/tags/BGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BGP</span></a> de Huawei qui dit que dans un AS_SET (un ensemble, au sens mathématique du terme), les AS sont dans un ordre aléatoire. Non, Huawei, ils ne sont pas ordonnés, c'est la définition d'un ensemble.</p><p><a href="https://mastodon.gougere.fr/tags/IlNeFautJamaisLireLaDoc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IlNeFautJamaisLireLaDoc</span></a></p>
IPng Networks<p>oh, hey, AS8298 hit 1M IPv4 routes in the FIB today. Happy Easter!</p><p><a href="https://ublog.tech/tags/bgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bgp</span></a></p>
gyptazy<p>What do you guys do with your left-over (public) IPv4 addresses? And no, that’s meant for real :)</p><p><a href="https://mastodon.gyptazy.com/tags/network" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>network</span></a> <a href="https://mastodon.gyptazy.com/tags/ISP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ISP</span></a> <a href="https://mastodon.gyptazy.com/tags/hosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hosting</span></a> <a href="https://mastodon.gyptazy.com/tags/homelab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>homelab</span></a> <a href="https://mastodon.gyptazy.com/tags/Ipv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ipv6</span></a> <a href="https://mastodon.gyptazy.com/tags/bgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bgp</span></a> <a href="https://mastodon.gyptazy.com/tags/peering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>peering</span></a></p>
Stéphane Bortzmeyer<p><a href="https://mastodon.gougere.fr/tags/routage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>routage</span></a> <a href="https://mastodon.gougere.fr/tags/BGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BGP</span></a> Un million de routes dans l'Internet bientôt ?<br><a href="https://www.bortzmeyer.org/un-million-de-routes.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bortzmeyer.org/un-million-de-r</span><span class="invisible">outes.html</span></a></p>
Stéphane Bortzmeyer<p>% curl -s <a href="https://bgp.bortzmeyer.org/info" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bgp.bortzmeyer.org/info</span><span class="invisible"></span></a><br>OK: 1031455 IPv4 prefixes, 231602 IPv6 prefixes, 84853 AS</p><p>Wow, so much routes, amazing.</p><p><a href="https://mastodon.gougere.fr/tags/BGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BGP</span></a> <a href="https://mastodon.gougere.fr/tags/RIS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RIS</span></a></p>
Kushal Das :python: :tor:<p><a href="https://brainattic.in/2025/03/25/root-hints-vs-rfc-8806/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">brainattic.in/2025/03/25/root-</span><span class="invisible">hints-vs-rfc-8806/</span></a> <a href="https://toots.dgplug.org/tags/dns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dns</span></a> <a href="https://toots.dgplug.org/tags/BGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BGP</span></a></p>
Peter N. M. Hansteen<p>rpki-client 9.5 released <a href="https://www.undeadly.org/cgi?action=article;sid=20250412123402" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">undeadly.org/cgi?action=articl</span><span class="invisible">e;sid=20250412123402</span></a> <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/rpkiclient" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rpkiclient</span></a> <a href="https://mastodon.social/tags/rpki" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rpki</span></a> <a href="https://mastodon.social/tags/bgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bgp</span></a> <a href="https://mastodon.social/tags/pki" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pki</span></a> <a href="https://mastodon.social/tags/crypto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>crypto</span></a> <a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/routing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>routing</span></a> <a href="https://mastodon.social/tags/bgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bgp</span></a> <a href="https://mastodon.social/tags/networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networking</span></a> <a href="https://mastodon.social/tags/freesoftware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freesoftware</span></a> <a href="https://mastodon.social/tags/libresoftware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>libresoftware</span></a></p>
skorpy<p>OH: "Tariffs on <a href="https://chaos.social/tags/IPv4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv4</span></a>, so everything via <a href="https://chaos.social/tags/AS3320" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AS3320</span></a>?"</p><p><a href="https://chaos.social/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a> <a href="https://chaos.social/tags/IPvLegacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPvLegacy</span></a> <a href="https://chaos.social/tags/BGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BGP</span></a></p>
gyptazy<p>Oops! The MXP01 (Italy) peer had some fuck ups, followed by some insane traffic f*ckups at 3AM &amp; 6AM on the other instances.</p><p>Rule Nr. 1: Even changing a single character can result in f*ckups. Always test!</p><p><a href="https://mastodon.gyptazy.com/tags/devops" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>devops</span></a> <a href="https://mastodon.gyptazy.com/tags/bgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bgp</span></a> <a href="https://mastodon.gyptazy.com/tags/peering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>peering</span></a> <a href="https://mastodon.gyptazy.com/tags/ipv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv6</span></a> <a href="https://mastodon.gyptazy.com/tags/traffic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>traffic</span></a> <a href="https://mastodon.gyptazy.com/tags/fail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fail</span></a> <a href="https://mastodon.gyptazy.com/tags/network" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>network</span></a></p>
Erik van Straten<p><span class="h-card" translate="no"><a href="https://chaos.social/@fleaz" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>fleaz</span></a></span> : it's not MultiMultiFactorAuthentication but 1FA max.</p><p>Assuming that you don't use those hardware keys to generate TOTP codes (which are pointless when confronted with the likes of <a href="https://infosec.exchange/tags/Evilginx2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Evilginx2</span></a>), but use WebAuthn instead (FIDO2 passkeys in hardware keys), everything depends on one factor: the domain name of the website.</p><p>1️⃣ DV-CERTS SUCK<br>It is not very common that certificates are issued to malicious parties, but it *does* happen now and then (<a href="https://infosec.exchange/@ErikvanStraten/112914050216821746" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@ErikvanStrat</span><span class="invisible">en/112914050216821746</span></a>).</p><p>2️⃣ SUBDOMAINS<br>Furthermore, sometimes organizations have "dangling" subdomain names. For example,</p><p> test.example.com</p><p>may point to the IP-adress of some cloud server no longer used by example.com. Anyone with write access to that server may install a fake "test.example.com" website and phish you to it. It *may* be used to phish your WebAuthm credentials *if* "example.com" does not explicitly *DENY* WebAuthn from "test.example.com".</p><p>See <a href="https://github.com/w3ctag/design-reviews/issues/97#issuecomment-175766580" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/w3ctag/design-revie</span><span class="invisible">ws/issues/97#issuecomment-175766580</span></a> for how Google prevents "sites.google.com" from authenticating to "google.com".</p><p>3️⃣ DNS HACKED<br>It may not be neccessary to execute BGP-hijacks to redirect network traffic to an impostor: it also all depends on how reliable DNS records are protected against unauthorized access. If the dude in charge for DNS uses a stupid password only, or the DNS provider is easily fooled into believing "I forgot my creds", it's game over. The crooks will obtain a DV-cert in no time, no questions asked, for free.</p><p>4️⃣ All the bells and whistless are moot if there's an alternative way to log in (such as by using a 1FA rescue code) and the user is fooled into providing it (after they've been lied to that their WebAithn public key on the server became corrupted or was lost otherwise).</p><p>5️⃣ Cloudflare MitM's https connections (it's not a secret: <a href="https://blog.cloudflare.com/password-reuse-rampant-half-user-logins-compromised/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.cloudflare.com/password-r</span><span class="invisible">euse-rampant-half-user-logins-compromised/</span></a>). The same applies to any server you log in to, which is accessible by untrustworthy personnel. They can steal your session cookie.</p><p>6️⃣ In the end MFA/2FA is a hoax anyway, because the session cookie (or JWT or whatever) is 1FA anyway.</p><p>Did I mention the risks of account lockout with hardware keys that cannot be backupped? And the mess it is to keep at least one other hardware key synchronized if it's in a vault? And the limitation of, for example, 25 WebAuthn accounts max? And (unpatcheable) vulnerabilities found in hardware keys? And their price? And how easy it is to forget or loose them?</p><p><span class="h-card" translate="no"><a href="https://infosec.exchange/@odr_k4tana" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>odr_k4tana</span></a></span> </p><p><a href="https://infosec.exchange/tags/1FA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>1FA</span></a> <a href="https://infosec.exchange/tags/2FA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>2FA</span></a> <a href="https://infosec.exchange/tags/MFA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MFA</span></a> <a href="https://infosec.exchange/tags/JWT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>JWT</span></a> <a href="https://infosec.exchange/tags/SessionCookie" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SessionCookie</span></a> <a href="https://infosec.exchange/tags/AitM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AitM</span></a> <a href="https://infosec.exchange/tags/MitM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MitM</span></a> <a href="https://infosec.exchange/tags/FIDO2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FIDO2</span></a> <a href="https://infosec.exchange/tags/WebAuthn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebAuthn</span></a> <a href="https://infosec.exchange/tags/Yubikey" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Yubikey</span></a> <a href="https://infosec.exchange/tags/Titan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Titan</span></a> <a href="https://infosec.exchange/tags/BGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BGP</span></a> <a href="https://infosec.exchange/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a></p>
Stéphane Bortzmeyer<p>Association entre adresse IP et AS</p><p>Dans les discussions au sujet du réseau Internet, on voit souvent passer des demandes sur l'AS associé à une adresse IP ou bien le contraire. Mais les questions simples du genre « de quel AS dépend une adresse IP ? » sont… trop simples.</p><p><a href="https://www.bortzmeyer.org/association-as-ip.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bortzmeyer.org/association-as-</span><span class="invisible">ip.html</span></a></p><p><a href="https://mastodon.gougere.fr/tags/BGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BGP</span></a> <a href="https://mastodon.gougere.fr/tags/whois" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>whois</span></a> <a href="https://mastodon.gougere.fr/tags/RDAP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RDAP</span></a> <a href="https://mastodon.gougere.fr/tags/RIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RIR</span></a></p>
gyptazy<p>The core router at KNS in the US like:<br>"Am I joke to you?" - He's absolutely bored. </p><p><a href="https://mastodon.gyptazy.com/tags/network" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>network</span></a> <a href="https://mastodon.gyptazy.com/tags/RUNBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RUNBSD</span></a> <a href="https://mastodon.gyptazy.com/tags/BGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BGP</span></a> <a href="https://mastodon.gyptazy.com/tags/IPv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IPv6</span></a> <a href="https://mastodon.gyptazy.com/tags/core" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>core</span></a> <a href="https://mastodon.gyptazy.com/tags/boxybsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>boxybsd</span></a> <br><span class="h-card" translate="no"><a href="https://mastodon.bsd.cafe/@BoxyBSD" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>BoxyBSD</span></a></span></p>
Vitex<p><a href="https://f.cz/tags/BGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BGP</span></a> <a href="https://f.cz/tags/NyanCat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NyanCat</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Cisco" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cisco</span></a> <a href="https://mastodon.thenewoil.org/tags/IOSXR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IOSXR</span></a> vulnerability lets attackers crash <a href="https://mastodon.thenewoil.org/tags/BGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BGP</span></a> on routers</p><p><a href="https://www.bleepingcomputer.com/news/security/cisco-vulnerability-lets-attackers-crash-bgp-on-ios-xr-routers/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/cisco-vulnerability-lets-attackers-crash-bgp-on-ios-xr-routers/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/Cisco" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cisco</span></a> <a href="https://infosec.exchange/tags/IOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IOS</span></a> <a href="https://infosec.exchange/tags/XR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>XR</span></a> flaw allows attackers to crash <a href="https://infosec.exchange/tags/BGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BGP</span></a> process on routers<br><a href="https://securityaffairs.com/175421/security/cisco-ios-xr-flaw-cve-2025-20115.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/175421/sec</span><span class="invisible">urity/cisco-ios-xr-flaw-cve-2025-20115.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
David Bombal<p>Huge CML update (Docker and more!)</p><p>YouTube video: <a href="https://youtu.be/p08Lwpz-ilI" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/p08Lwpz-ilI</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Sponsored" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sponsored</span></a> <a href="https://infosec.exchange/tags/ccna" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ccna</span></a> <a href="https://infosec.exchange/tags/docker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>docker</span></a> <a href="https://infosec.exchange/tags/bgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bgp</span></a> <a href="https://infosec.exchange/tags/ccnp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ccnp</span></a> <a href="https://infosec.exchange/tags/ccie" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ccie</span></a> <a href="https://infosec.exchange/tags/cisco" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cisco</span></a> Cisco</p>
Stéphane Bortzmeyer<p><a href="https://mastodon.gougere.fr/tags/IETF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IETF</span></a> <a href="https://mastodon.gougere.fr/tags/BGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BGP</span></a></p><p>"BGP Color-Aware Routing" We are going to paint the routers and the links?</p>