Search
1000 results for “dataplane”
-
Ich habe in den letzten zwei Wochen deutlich mehr über #NIC-#Treiber gelernt, als ich jemals wissen wollte 🙄
Ein Dschungel aus irgendwelchen komischen Einschränkungen in Edge Cases und Extrawürsten, damit Hardware-agnostischer #DataPlane #Code auch möglichst schwer zu schreiben ist 😕
-
AtomicJar is looking for a Staff Engineer for our Data Plane team to help us build across our data-plane application, different cloud infrastructures, and Kubernetes.
If you are interested, apply here: https://www.atomicjar.com/jobs/?gh_jid=4769969004
#hiring #dataplane #engineeringjobs #opensource -
And this is the first time (that I know of anyway) that anybody has done eVPN/VxLAN with Bird2 controlplane plugin, and using a VPP dataplane!
It's alive! Article upcoming, wow I learned so much! :) #vpp
-
@SystemsAppr Research and paper in progress. Imperfect, and preliminary update last presented at #NANOG93
* https://youtube.com/watch?v=t-AUsaOPbJw
* https://dataplane.org/jtk/talks/nanog93-dnssec-outages.pdfWill follow up in email.
-
New paper: The Age of DDoScovery: An Empirical Comparison of Industry and Academic DDoS Assessments (Internet Measurement Conference) 2024. https://dataplane.org/jtk/publications/hnbkh-adeci-24.pdf #IMC2024
Companion website: https://ddoscovery.github.io
-
New paper: Internet Sanctions on Russian Media: Actions and Effects. In the Proceedings of Free and Open Communications on the Internet (FOCI), 2024.https://dataplane.org/jtk/publications/kmfrko-foci-24.pdf
#FOCI24 -
Создание частной сети 5G SA с продвинутыми настройками
Эта статья представляет собой дальнейшее развитие нашей предыдущей статьи , только здесь всё будет на 20 % круче. Мы полностью вынесем функциональность базовой станции на отдельный ПК, возьмём более мощное железо для ядра сети, а также развернём другой open source-стек для радиочасти. В общем, сделаем шаг вперёд и попробуем перейти от демонстратора идеи к тестовому стенду 5G. В этой статье вас ждут: Установка ядра с низкой задержкой. Установка DataPlane Development Kit (DPDK). Установка драйвера UHD из исходных кодов. Подключение USRP X310 к CU/DU с применением DPDK. Развёртывание OpenAirInterface и подключение gNodeB к ядру сети.
-
There are about 14,000 names in the .zip zone.
un.zip is not in the zone, but it is reserved and you can't register it.
bidenleak.zip and trumpleak.zip were both registered on May 13 seemingly at the same time by the same registrant, and are currently parked.
There are dozens of names that have "install" in the first label, those might be good ones for a rainy day analysis.
dataplane.zip has a secret message if you can find it (some did at #FIRSTCON23).
Some .zip names aren't cheap. For example, boston.zip is currently available, but it'll cost ya.
-
New talk: Border Security - Lessons from All Over
The #DePaul University secdaemons student group invited me to present at their annual Daemoncon. Taking inspiration from a classic Bill Cheswick talk and Klaus Dodds' book The New Border Wars, I try to weave some real-world border issues with Internet-specific security perimeter experiences.
All the nuance probably won't come through in this minimal deck. I'm using the venue as an opportunity to work out some ideas that have been on my mind.
-
New blog post: An Affair with IPv6 DAD
The title of this post refers to a network function commonly known as duplicate address detection (DAD). The complete story will cover a range of seemingly unrelated technologies including ARP, Perl socket programming, systemd, IPv6, and a once-popular LAN technology that if you’ve never seen you probably never will, Token Ring. It all starts with a fake DNS server. Oh yeah, I forgot to mention DNS is here as well, but that is just a happy coincidence.
https://dataplane.org/jtk/blog/2022/12/ipv6dad/
#ARP #Perl #systemd #IPv6 #TokenRing #DNS -
New blog post: Slammer 20 Years After
On this date twenty years ago the Internet came as close to a total meltdown as we’ve ever seen since the commercialization of the Internet. A tiny UDP worm payload of just 376 bytes spread to all remotely accessible and vulnerable Microsoft SQL servers listening on port 1434 within a matter of minutes. This tiny payload ultimately infected roughly 75 thousand hosts worldwide and the disruption it caused made international news. It was enough to bring many networks to a screeching halt. This blog post is a personal reflection and reconsideration of the fateful event that continues to resonate as one of my most vivid experiences in Internet availability.
https://dataplane.org/jtk/blog/2023/01/slammer20/
#Slammer #Sapphire -
Scratched an itch that's been bothering me for a while. I created a
vpp-pcaptool to serve network engineers working with #VPP who want something akin to #tcpdump.root@jt-router:~# vpp-pcap -i any --print 2026-05-05 02:27:16.544645919 lan Inbound 192.168.37.1 → 224.0.0.251 MDNS 212 Standard query response 0x0000 SRV, cache flush 0 0 44677 lgwebostv.local NSEC, cache flush lgwebostv.local NSEC, cache flush LG webOS Projector 3D93._hap._tcp.local AAAA, cache flush 2604:2940:4001:172:32b1:b5ff:feb9:232e A, cache flush 10.11.64.235 2026-05-05 02:27:16.568789127 lan Inbound 2602:f90e:10:0:18ff:7059:2bb8:3aac → 2602:f90e:10:0:ffff:ffff:ffff:fffe ICMPv6 90 Neighbor Solicitation for 2602:f90e:10:0:ffff:ffff:ffff:fffe from 16:59:1d:c2:0d:c7 2026-05-05 02:27:16.568827057 bvi100 Outbound 2602:f90e:10:0:ffff:ffff:ffff:fffe → 2602:f90e:10:0:18ff:7059:2bb8:3aac ICMPv6 86 Neighbor Advertisement 2602:f90e:10:0:ffff:ffff:ffff:fffe (rtr, sol, ovr) is at de:ad:00:00:00:64 2026-05-05 02:27:16.568834557 lan.30 Outbound 2602:f90e:10:0:ffff:ffff:ffff:fffe → 2602:f90e:10:0:18ff:7059:2bb8:3aac ICMPv6 90 Neighbor Advertisement 2602:f90e:10:0:ffff:ffff:ffff:fffe (rtr, sol, ovr) is at de:ad:00:00:00:64 2026-05-05 02:27:16.568929957 lan Inbound 2602:f90e:10:0:18ff:7059:2bb8:3aac → 2602:f90e:10:0:ffff:ffff:ffff:fffe ICMPv6 90 Neighbor Solicitation for 2602:f90e:10:0:ffff:ffff:ffff:fffe from 16:59:1d:c2:0d:c7 2026-05-05 02:27:16.568934037 bvi100 Outbound 2602:f90e:10:0:ffff:ffff:ffff:fffe → 2602:f90e:10:0:18ff:7059:2bb8:3aac ICMPv6 86 Neighbor Advertisement 2602:f90e:10:0:ffff:ffff:ffff:fffe (rtr, sol, ovr) is at de:ad:00:00:00:64 2026-05-05 02:27:16.568935527 lan.30 Outbound 2602:f90e:10:0:ffff:ffff:ffff:fffe → 2602:f90e:10:0:18ff:7059:2bb8:3aac ICMPv6 90 Neighbor Advertisement 2602:f90e:10:0:ffff:ffff:ffff:fffe (rtr, sol, ovr) is at de:ad:00:00:00:64VPP has some very rich tracing tools, but I find them ergonomically challenging to use. I came up as a network engineer in the late 90s and early 2000s - this feels much more natural to me.
The repository is on GitHub. Both a plugin and a small Rust utility are used to provide live access to data passing through the VPP dataplane. It can also be chained with
tcpdump,tshark, orwiresharkto use those familiar interfaces. Usage details are in the GitHub README.License is Apache 2.0, so use it as you'd like.
-
Scratched an itch that's been bothering me for a while. I created a
vpp-pcaptool to serve network engineers working with #VPP who want something akin to #tcpdump.root@jt-router:~# vpp-pcap -i any --print 2026-05-05 02:27:16.544645919 lan Inbound 192.168.37.1 → 224.0.0.251 MDNS 212 Standard query response 0x0000 SRV, cache flush 0 0 44677 lgwebostv.local NSEC, cache flush lgwebostv.local NSEC, cache flush LG webOS Projector 3D93._hap._tcp.local AAAA, cache flush 2604:2940:4001:172:32b1:b5ff:feb9:232e A, cache flush 10.11.64.235 2026-05-05 02:27:16.568789127 lan Inbound 2602:f90e:10:0:18ff:7059:2bb8:3aac → 2602:f90e:10:0:ffff:ffff:ffff:fffe ICMPv6 90 Neighbor Solicitation for 2602:f90e:10:0:ffff:ffff:ffff:fffe from 16:59:1d:c2:0d:c7 2026-05-05 02:27:16.568827057 bvi100 Outbound 2602:f90e:10:0:ffff:ffff:ffff:fffe → 2602:f90e:10:0:18ff:7059:2bb8:3aac ICMPv6 86 Neighbor Advertisement 2602:f90e:10:0:ffff:ffff:ffff:fffe (rtr, sol, ovr) is at de:ad:00:00:00:64 2026-05-05 02:27:16.568834557 lan.30 Outbound 2602:f90e:10:0:ffff:ffff:ffff:fffe → 2602:f90e:10:0:18ff:7059:2bb8:3aac ICMPv6 90 Neighbor Advertisement 2602:f90e:10:0:ffff:ffff:ffff:fffe (rtr, sol, ovr) is at de:ad:00:00:00:64 2026-05-05 02:27:16.568929957 lan Inbound 2602:f90e:10:0:18ff:7059:2bb8:3aac → 2602:f90e:10:0:ffff:ffff:ffff:fffe ICMPv6 90 Neighbor Solicitation for 2602:f90e:10:0:ffff:ffff:ffff:fffe from 16:59:1d:c2:0d:c7 2026-05-05 02:27:16.568934037 bvi100 Outbound 2602:f90e:10:0:ffff:ffff:ffff:fffe → 2602:f90e:10:0:18ff:7059:2bb8:3aac ICMPv6 86 Neighbor Advertisement 2602:f90e:10:0:ffff:ffff:ffff:fffe (rtr, sol, ovr) is at de:ad:00:00:00:64 2026-05-05 02:27:16.568935527 lan.30 Outbound 2602:f90e:10:0:ffff:ffff:ffff:fffe → 2602:f90e:10:0:18ff:7059:2bb8:3aac ICMPv6 90 Neighbor Advertisement 2602:f90e:10:0:ffff:ffff:ffff:fffe (rtr, sol, ovr) is at de:ad:00:00:00:64VPP has some very rich tracing tools, but I find them ergonomically challenging to use. I came up as a network engineer in the late 90s and early 2000s - this feels much more natural to me.
The repository is on GitHub. Both a plugin and a small Rust utility are used to provide live access to data passing through the VPP dataplane. It can also be chained with
tcpdump,tshark, orwiresharkto use those familiar interfaces. Usage details are in the GitHub README.License is Apache 2.0, so use it as you'd like.
-
Scratched an itch that's been bothering me for a while. I created a
vpp-pcaptool to serve network engineers working with #VPP who want something akin to #tcpdump.root@jt-router:~# vpp-pcap -i any --print 2026-05-05 02:27:16.544645919 lan Inbound 192.168.37.1 → 224.0.0.251 MDNS 212 Standard query response 0x0000 SRV, cache flush 0 0 44677 lgwebostv.local NSEC, cache flush lgwebostv.local NSEC, cache flush LG webOS Projector 3D93._hap._tcp.local AAAA, cache flush 2604:2940:4001:172:32b1:b5ff:feb9:232e A, cache flush 10.11.64.235 2026-05-05 02:27:16.568789127 lan Inbound 2602:f90e:10:0:18ff:7059:2bb8:3aac → 2602:f90e:10:0:ffff:ffff:ffff:fffe ICMPv6 90 Neighbor Solicitation for 2602:f90e:10:0:ffff:ffff:ffff:fffe from 16:59:1d:c2:0d:c7 2026-05-05 02:27:16.568827057 bvi100 Outbound 2602:f90e:10:0:ffff:ffff:ffff:fffe → 2602:f90e:10:0:18ff:7059:2bb8:3aac ICMPv6 86 Neighbor Advertisement 2602:f90e:10:0:ffff:ffff:ffff:fffe (rtr, sol, ovr) is at de:ad:00:00:00:64 2026-05-05 02:27:16.568834557 lan.30 Outbound 2602:f90e:10:0:ffff:ffff:ffff:fffe → 2602:f90e:10:0:18ff:7059:2bb8:3aac ICMPv6 90 Neighbor Advertisement 2602:f90e:10:0:ffff:ffff:ffff:fffe (rtr, sol, ovr) is at de:ad:00:00:00:64 2026-05-05 02:27:16.568929957 lan Inbound 2602:f90e:10:0:18ff:7059:2bb8:3aac → 2602:f90e:10:0:ffff:ffff:ffff:fffe ICMPv6 90 Neighbor Solicitation for 2602:f90e:10:0:ffff:ffff:ffff:fffe from 16:59:1d:c2:0d:c7 2026-05-05 02:27:16.568934037 bvi100 Outbound 2602:f90e:10:0:ffff:ffff:ffff:fffe → 2602:f90e:10:0:18ff:7059:2bb8:3aac ICMPv6 86 Neighbor Advertisement 2602:f90e:10:0:ffff:ffff:ffff:fffe (rtr, sol, ovr) is at de:ad:00:00:00:64 2026-05-05 02:27:16.568935527 lan.30 Outbound 2602:f90e:10:0:ffff:ffff:ffff:fffe → 2602:f90e:10:0:18ff:7059:2bb8:3aac ICMPv6 90 Neighbor Advertisement 2602:f90e:10:0:ffff:ffff:ffff:fffe (rtr, sol, ovr) is at de:ad:00:00:00:64VPP has some very rich tracing tools, but I find them ergonomically challenging to use. I came up as a network engineer in the late 90s and early 2000s - this feels much more natural to me.
The repository is on GitHub. Both a plugin and a small Rust utility are used to provide live access to data passing through the VPP dataplane. It can also be chained with
tcpdump,tshark, orwiresharkto use those familiar interfaces. Usage details are in the GitHub README.License is Apache 2.0, so use it as you'd like.
-
Scratched an itch that's been bothering me for a while. I created a
vpp-pcaptool to serve network engineers working with #VPP who want something akin to #tcpdump.root@jt-router:~# vpp-pcap -i any --print 2026-05-05 02:27:16.544645919 lan Inbound 192.168.37.1 → 224.0.0.251 MDNS 212 Standard query response 0x0000 SRV, cache flush 0 0 44677 lgwebostv.local NSEC, cache flush lgwebostv.local NSEC, cache flush LG webOS Projector 3D93._hap._tcp.local AAAA, cache flush 2604:2940:4001:172:32b1:b5ff:feb9:232e A, cache flush 10.11.64.235 2026-05-05 02:27:16.568789127 lan Inbound 2602:f90e:10:0:18ff:7059:2bb8:3aac → 2602:f90e:10:0:ffff:ffff:ffff:fffe ICMPv6 90 Neighbor Solicitation for 2602:f90e:10:0:ffff:ffff:ffff:fffe from 16:59:1d:c2:0d:c7 2026-05-05 02:27:16.568827057 bvi100 Outbound 2602:f90e:10:0:ffff:ffff:ffff:fffe → 2602:f90e:10:0:18ff:7059:2bb8:3aac ICMPv6 86 Neighbor Advertisement 2602:f90e:10:0:ffff:ffff:ffff:fffe (rtr, sol, ovr) is at de:ad:00:00:00:64 2026-05-05 02:27:16.568834557 lan.30 Outbound 2602:f90e:10:0:ffff:ffff:ffff:fffe → 2602:f90e:10:0:18ff:7059:2bb8:3aac ICMPv6 90 Neighbor Advertisement 2602:f90e:10:0:ffff:ffff:ffff:fffe (rtr, sol, ovr) is at de:ad:00:00:00:64 2026-05-05 02:27:16.568929957 lan Inbound 2602:f90e:10:0:18ff:7059:2bb8:3aac → 2602:f90e:10:0:ffff:ffff:ffff:fffe ICMPv6 90 Neighbor Solicitation for 2602:f90e:10:0:ffff:ffff:ffff:fffe from 16:59:1d:c2:0d:c7 2026-05-05 02:27:16.568934037 bvi100 Outbound 2602:f90e:10:0:ffff:ffff:ffff:fffe → 2602:f90e:10:0:18ff:7059:2bb8:3aac ICMPv6 86 Neighbor Advertisement 2602:f90e:10:0:ffff:ffff:ffff:fffe (rtr, sol, ovr) is at de:ad:00:00:00:64 2026-05-05 02:27:16.568935527 lan.30 Outbound 2602:f90e:10:0:ffff:ffff:ffff:fffe → 2602:f90e:10:0:18ff:7059:2bb8:3aac ICMPv6 90 Neighbor Advertisement 2602:f90e:10:0:ffff:ffff:ffff:fffe (rtr, sol, ovr) is at de:ad:00:00:00:64VPP has some very rich tracing tools, but I find them ergonomically challenging to use. I came up as a network engineer in the late 90s and early 2000s - this feels much more natural to me.
The repository is on GitHub. Both a plugin and a small Rust utility are used to provide live access to data passing through the VPP dataplane. It can also be chained with
tcpdump,tshark, orwiresharkto use those familiar interfaces. Usage details are in the GitHub README.License is Apache 2.0, so use it as you'd like.
-
Scratched an itch that's been bothering me for a while. I created a
vpp-pcaptool to serve network engineers working with #VPP who want something akin to #tcpdump.root@jt-router:~# vpp-pcap -i any --print 2026-05-05 02:27:16.544645919 lan Inbound 192.168.37.1 → 224.0.0.251 MDNS 212 Standard query response 0x0000 SRV, cache flush 0 0 44677 lgwebostv.local NSEC, cache flush lgwebostv.local NSEC, cache flush LG webOS Projector 3D93._hap._tcp.local AAAA, cache flush 2604:2940:4001:172:32b1:b5ff:feb9:232e A, cache flush 10.11.64.235 2026-05-05 02:27:16.568789127 lan Inbound 2602:f90e:10:0:18ff:7059:2bb8:3aac → 2602:f90e:10:0:ffff:ffff:ffff:fffe ICMPv6 90 Neighbor Solicitation for 2602:f90e:10:0:ffff:ffff:ffff:fffe from 16:59:1d:c2:0d:c7 2026-05-05 02:27:16.568827057 bvi100 Outbound 2602:f90e:10:0:ffff:ffff:ffff:fffe → 2602:f90e:10:0:18ff:7059:2bb8:3aac ICMPv6 86 Neighbor Advertisement 2602:f90e:10:0:ffff:ffff:ffff:fffe (rtr, sol, ovr) is at de:ad:00:00:00:64 2026-05-05 02:27:16.568834557 lan.30 Outbound 2602:f90e:10:0:ffff:ffff:ffff:fffe → 2602:f90e:10:0:18ff:7059:2bb8:3aac ICMPv6 90 Neighbor Advertisement 2602:f90e:10:0:ffff:ffff:ffff:fffe (rtr, sol, ovr) is at de:ad:00:00:00:64 2026-05-05 02:27:16.568929957 lan Inbound 2602:f90e:10:0:18ff:7059:2bb8:3aac → 2602:f90e:10:0:ffff:ffff:ffff:fffe ICMPv6 90 Neighbor Solicitation for 2602:f90e:10:0:ffff:ffff:ffff:fffe from 16:59:1d:c2:0d:c7 2026-05-05 02:27:16.568934037 bvi100 Outbound 2602:f90e:10:0:ffff:ffff:ffff:fffe → 2602:f90e:10:0:18ff:7059:2bb8:3aac ICMPv6 86 Neighbor Advertisement 2602:f90e:10:0:ffff:ffff:ffff:fffe (rtr, sol, ovr) is at de:ad:00:00:00:64 2026-05-05 02:27:16.568935527 lan.30 Outbound 2602:f90e:10:0:ffff:ffff:ffff:fffe → 2602:f90e:10:0:18ff:7059:2bb8:3aac ICMPv6 90 Neighbor Advertisement 2602:f90e:10:0:ffff:ffff:ffff:fffe (rtr, sol, ovr) is at de:ad:00:00:00:64VPP has some very rich tracing tools, but I find them ergonomically challenging to use. I came up as a network engineer in the late 90s and early 2000s - this feels much more natural to me.
The repository is on GitHub. Both a plugin and a small Rust utility are used to provide live access to data passing through the VPP dataplane. It can also be chained with
tcpdump,tshark, orwiresharkto use those familiar interfaces. Usage details are in the GitHub README.License is Apache 2.0, so use it as you'd like.
-
The Internet Last Week
* Ubuntu/Canonical DDoS
https://status.canonical.com/#/incident/KNms6QK9ewuzz-7xUsPsNylV20jEt5kyKsd8A-3ptQEHpOd8VQ40ZQs-KD81fboQXeGZB94okNHdHBGlCv58Sw==
https://techcrunch.com/2026/05/01/ubuntu-services-hit-by-outages-after-ddos-attack/
* Linux copy.fail vulnerability
https://nvd.nist.gov/vuln/detail/CVE-2026-31431
https://xint.io/blog/copy-fail-linux-distributions
* GitHub availability
https://github.blog/news-insights/company-news/an-update-on-github-availability/
https://www.githubstatus.com/incidents/ql942tw29yl6
https://www.githubstatus.com/incidents/dbypmw7h77l5
https://www.githubstatus.com/incidents/vq183jvj6vrw
* cPanel/WHM vulnerability
https://nvd.nist.gov/vuln/detail/CVE-2026-41940
https://support.cpanel.net/hc/en-us/articles/40073787579671-Security-CVE-2026-41940-cPanel-WHM-WP2-Security-Update-04-28-2026
https://censys.com/blog/the-cpanel-situation-is/ -
The Internet Last Week
* Ubuntu/Canonical DDoS
https://status.canonical.com/#/incident/KNms6QK9ewuzz-7xUsPsNylV20jEt5kyKsd8A-3ptQEHpOd8VQ40ZQs-KD81fboQXeGZB94okNHdHBGlCv58Sw==
https://techcrunch.com/2026/05/01/ubuntu-services-hit-by-outages-after-ddos-attack/
* Linux copy.fail vulnerability
https://nvd.nist.gov/vuln/detail/CVE-2026-31431
https://xint.io/blog/copy-fail-linux-distributions
* GitHub availability
https://github.blog/news-insights/company-news/an-update-on-github-availability/
https://www.githubstatus.com/incidents/ql942tw29yl6
https://www.githubstatus.com/incidents/dbypmw7h77l5
https://www.githubstatus.com/incidents/vq183jvj6vrw
* cPanel/WHM vulnerability
https://nvd.nist.gov/vuln/detail/CVE-2026-41940
https://support.cpanel.net/hc/en-us/articles/40073787579671-Security-CVE-2026-41940-cPanel-WHM-WP2-Security-Update-04-28-2026
https://censys.com/blog/the-cpanel-situation-is/ -
The Internet Last Week
* Ubuntu/Canonical DDoS
https://status.canonical.com/#/incident/KNms6QK9ewuzz-7xUsPsNylV20jEt5kyKsd8A-3ptQEHpOd8VQ40ZQs-KD81fboQXeGZB94okNHdHBGlCv58Sw==
https://techcrunch.com/2026/05/01/ubuntu-services-hit-by-outages-after-ddos-attack/
* Linux copy.fail vulnerability
https://nvd.nist.gov/vuln/detail/CVE-2026-31431
https://xint.io/blog/copy-fail-linux-distributions
* GitHub availability
https://github.blog/news-insights/company-news/an-update-on-github-availability/
https://www.githubstatus.com/incidents/ql942tw29yl6
https://www.githubstatus.com/incidents/dbypmw7h77l5
https://www.githubstatus.com/incidents/vq183jvj6vrw
* cPanel/WHM vulnerability
https://nvd.nist.gov/vuln/detail/CVE-2026-41940
https://support.cpanel.net/hc/en-us/articles/40073787579671-Security-CVE-2026-41940-cPanel-WHM-WP2-Security-Update-04-28-2026
https://censys.com/blog/the-cpanel-situation-is/ -
The Internet Last Week
* Ubuntu/Canonical DDoS
https://status.canonical.com/#/incident/KNms6QK9ewuzz-7xUsPsNylV20jEt5kyKsd8A-3ptQEHpOd8VQ40ZQs-KD81fboQXeGZB94okNHdHBGlCv58Sw==
https://techcrunch.com/2026/05/01/ubuntu-services-hit-by-outages-after-ddos-attack/
* Linux copy.fail vulnerability
https://nvd.nist.gov/vuln/detail/CVE-2026-31431
https://xint.io/blog/copy-fail-linux-distributions
* GitHub availability
https://github.blog/news-insights/company-news/an-update-on-github-availability/
https://www.githubstatus.com/incidents/ql942tw29yl6
https://www.githubstatus.com/incidents/dbypmw7h77l5
https://www.githubstatus.com/incidents/vq183jvj6vrw
* cPanel/WHM vulnerability
https://nvd.nist.gov/vuln/detail/CVE-2026-41940
https://support.cpanel.net/hc/en-us/articles/40073787579671-Security-CVE-2026-41940-cPanel-WHM-WP2-Security-Update-04-28-2026
https://censys.com/blog/the-cpanel-situation-is/ -
The Internet Last Week
* Ubuntu/Canonical DDoS
https://status.canonical.com/#/incident/KNms6QK9ewuzz-7xUsPsNylV20jEt5kyKsd8A-3ptQEHpOd8VQ40ZQs-KD81fboQXeGZB94okNHdHBGlCv58Sw==
https://techcrunch.com/2026/05/01/ubuntu-services-hit-by-outages-after-ddos-attack/
* Linux copy.fail vulnerability
https://nvd.nist.gov/vuln/detail/CVE-2026-31431
https://xint.io/blog/copy-fail-linux-distributions
* GitHub availability
https://github.blog/news-insights/company-news/an-update-on-github-availability/
https://www.githubstatus.com/incidents/ql942tw29yl6
https://www.githubstatus.com/incidents/dbypmw7h77l5
https://www.githubstatus.com/incidents/vq183jvj6vrw
* cPanel/WHM vulnerability
https://nvd.nist.gov/vuln/detail/CVE-2026-41940
https://support.cpanel.net/hc/en-us/articles/40073787579671-Security-CVE-2026-41940-cPanel-WHM-WP2-Security-Update-04-28-2026
https://censys.com/blog/the-cpanel-situation-is/ -
The Internet Last Week
* Microsoft services outage
https://www.tomsguide.com/news/live/microsoft-down-live-updates-outage-jan-22-26
https://www.msn.com/en-us/news/technology/microsoft-releases-statement-as-office-teams-365-outages-continue/ar-AA1ULzFd
* ARIN Online ASPA feature support
https://www.arin.net/announcements/20260120/
* Iran Internet partial traffic recovery
https://noc.social/@cloudflareradar/115939119806231525
https://transparencyreport.google.com/traffic/overview?hl=en&fraction_traffic=start:1768694400000;end:1769299199999;product:19;region:IR&lu=fraction_traffic
https://infosec.exchange/@dougmadory/115923020252033160
https://mastodon.social/@netblocks/115955109593934791
https://dnsmon.ripe.net/ir?start=2026-01-18T00:00:00.000Z&end=2026-01-24T23:59:00.000Z&zone=ir.&protocol=udp
https://dnsmon.ripe.net/ir?start=2026-01-18T00:00:00.000Z&end=2026-01-24T23:59:00.000Z&zone=ir.&protocol=tcp
* .il TLD ilns.iland.net.il NS outage
https://dnsmon.ripe.net/il?start=2026-01-18T00:00:00.000Z&end=2026-01-24T23:59:00.000Z&zone=il.&protocol=udp
https://dnsmon.ripe.net/il?start=2026-01-18T00:00:00.000Z&end=2026-01-24T23:59:00.000Z&zone=il.&protocol=tcp -
The Internet Last Week
* SplinterCon
https://splintercon.net/paris/
* ARIN accidental reallocation
https://www.arin.net/announcements/20251212/
https://lists.nanog.org/archives/list/[email protected]/thread/5MCMSACQADNXE65BTK34MQ3PXY4PDETF/
* Azure US government service failures
https://azure.status.microsoft/status/history/?trackingId=ML7_-DWG
* Zayo IX change on Quad9 service effects
https://uptime.quad9.net/incidents/t562nwzcrw09 -
The Internet Last Week
* DENOG 17
https://www.denog.de/de/meetings/denog17/
* Rostelecom network disruptions
https://mastodon.social/@netblocks/115555860051811398
https://mezha.net/eng/bukvy/internet-outages-hit-russian-regions-amid-sovereign-runet-controls/
* ARIN RPKI repository disruption testing
https://arin.statuspage.io/incidents/jpc4yjkwl4jd
https://lists.arin.net/pipermail/arin-tech-discuss/2025-November/001251.html
* Operation Endgame phase 3 cybercrime take down
https://www.europol.europa.eu/media-press/newsroom/news/end-of-game-for-cybercrime-infrastructure-1025-servers-taken-down -
The Internet Last Week
* DigiCert CA bundle expiry
https://help.duo.com/s/article/9451
* Various US DoD route updates
https://www.cidr-report.org/cgi-bin/as-report?as=AS306
https://stat.ripe.net/widget/routing-history#resource=306&starttime=2026-03-29
https://www.cidr-report.org/cgi-bin/as-report?as=AS721
https://stat.ripe.net/widget/routing-history#resource=721&starttime=2026-03-29
https://www.cidr-report.org/cgi-bin/as-report?as=AS27064
https://stat.ripe.net/widget/routing-history#resource=27064&starttime=2026-03-29
https://www.cidr-report.org/cgi-bin/as-report?as=AS27065
https://stat.ripe.net/widget/routing-history#resource=27065&starttime=2026-03-29
* Quad9 enables DoH3 and DoQ
https://quad9.net/news/blog/quad9-enables-dns-over-http-3-and-dns-over-quic/ -
The Internet Last Week
* IETF 125
https://www.ietf.org/meeting/125/
* Cuba power outage effects
https://noc.social/@cloudflareradar/116240190351546459
https://mastodon.social/@IODA/116246041272623316
https://infosec.exchange/@dougmadory/116240466331483809
https://mastodon.social/@netblocks/116240861464667713
* IoT DDoS botnets disrupted
https://www.justice.gov/usao-ak/pr/authorities-disrupt-worlds-largest-iot-ddos-botnets-responsible-record-breaking-attacks
* Unallocated IP4 /13 announced
https://infosec.exchange/@spamhaus/116250561577999852
https://bgp.he.net/net/102.224.0.0/13
https://stat.ripe.net/widget/routing-history#resource=102.224.0.0/13&starttime=2026-03-15
* CAs must perform DNSSEC validation
https://cabforum.org/2025/06/18/ballot-sc-085v2-require-validation-of-dnssec-when-present-for-caa-and-dcv-lookups/
https://infosec.exchange/@mnordhoff/116240122433847371 -
The Internet Last Week
* Botnet disrupts I2P network
https://krebsonsecurity.com/2026/02/kimwolf-botnet-swamps-anonymity-network-i2p/
* Russia restricts Telegram, WhatsApp, YouTube
https://kyivindependent.com/russia-reportedly-restricts-telegram/
https://www.bbc.com/news/articles/clygd10pg5lo
https://www.dw.com/en/youtube-whatsapp-blocked-in-russia/a-75940102
* Airtel.com.ng (#AS36873) route visibility decrease
https://stat.ripe.net/widget/routing-history#starttime=2026-02-08&resource=%2036873
https://www.cidr-report.org/cgi-bin/as-report?as=AS36873
* New .jo TLD name servers
https://dnsmon.ripe.net/jo?start=2026-02-08T00:00:00.000Z&end=2026-02-14T23:59:00.000Z&zone=jo.&protocol=tcp&ipVersion=both
https://dnsmon.ripe.net/jo?start=2026-02-08T00:00:00.000Z&end=2026-02-14T23:59:00.000Z&zone=jo.&protocol=udp&ipVersion=both -
The Internet Last Week
* Botnet disrupts I2P network
https://krebsonsecurity.com/2026/02/kimwolf-botnet-swamps-anonymity-network-i2p/
* Russia restricts Telegram, WhatsApp, YouTube
https://kyivindependent.com/russia-reportedly-restricts-telegram/
https://www.bbc.com/news/articles/clygd10pg5lo
https://www.dw.com/en/youtube-whatsapp-blocked-in-russia/a-75940102
* Airtel.com.ng (#AS36873) route visibility decrease
https://stat.ripe.net/widget/routing-history#starttime=2026-02-08&resource=%2036873
https://www.cidr-report.org/cgi-bin/as-report?as=AS36873
* New .jo TLD name servers
https://dnsmon.ripe.net/jo?start=2026-02-08T00:00:00.000Z&end=2026-02-14T23:59:00.000Z&zone=jo.&protocol=tcp&ipVersion=both
https://dnsmon.ripe.net/jo?start=2026-02-08T00:00:00.000Z&end=2026-02-14T23:59:00.000Z&zone=jo.&protocol=udp&ipVersion=both -
The Internet Last Week
* Botnet disrupts I2P network
https://krebsonsecurity.com/2026/02/kimwolf-botnet-swamps-anonymity-network-i2p/
* Russia restricts Telegram, WhatsApp, YouTube
https://kyivindependent.com/russia-reportedly-restricts-telegram/
https://www.bbc.com/news/articles/clygd10pg5lo
https://www.dw.com/en/youtube-whatsapp-blocked-in-russia/a-75940102
* Airtel.com.ng (#AS36873) route visibility decrease
https://stat.ripe.net/widget/routing-history#starttime=2026-02-08&resource=%2036873
https://www.cidr-report.org/cgi-bin/as-report?as=AS36873
* New .jo TLD name servers
https://dnsmon.ripe.net/jo?start=2026-02-08T00:00:00.000Z&end=2026-02-14T23:59:00.000Z&zone=jo.&protocol=tcp&ipVersion=both
https://dnsmon.ripe.net/jo?start=2026-02-08T00:00:00.000Z&end=2026-02-14T23:59:00.000Z&zone=jo.&protocol=udp&ipVersion=both -
The Internet Last Week
* 2024 US presidential debate traffic effects
https://blog.cloudflare.com/how-the-first-2024-us-presidential-debate-influenced-internet-traffic-and-security-trends
* Kenya Internet disruption
https://puck.nether.net/pipermail/outages/2024-June/015197.html
https://mastodon.social/@IODA/112677911857186148
https://noc.social/@cloudflareradar/112677917132406460
* OpenDNS France/Portugal service suspension
https://support.opendns.com/hc/en-us/articles/27951404269204-OpenDNS-Service-Not-Available-To-Users-In-France-and-Portugal
https://torrentfreak.com/opendns-suspends-service-in-france-due-to-canal-piracy-blocking-order-240629/
* ICQ service shuts down
https://icq.com