fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

10K
active users

#IOSXR

0 posts0 participants0 posts today
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Cisco" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cisco</span></a> <a href="https://mastodon.thenewoil.org/tags/IOSXR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IOSXR</span></a> vulnerability lets attackers crash <a href="https://mastodon.thenewoil.org/tags/BGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BGP</span></a> on routers</p><p><a href="https://www.bleepingcomputer.com/news/security/cisco-vulnerability-lets-attackers-crash-bgp-on-ios-xr-routers/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/cisco-vulnerability-lets-attackers-crash-bgp-on-ios-xr-routers/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
:atari: :neovim: :terminal:<p>Continuing with my <a href="https://fosstodon.org/tags/pyats" class="mention hashtag" rel="tag">#<span>pyats</span></a> journey. <a href="https://fosstodon.org/tags/IPSLA" class="mention hashtag" rel="tag">#<span>IPSLA</span></a> on <a href="https://fosstodon.org/tags/IOSXR" class="mention hashtag" rel="tag">#<span>IOSXR</span></a> is on today&#39;s todo list.</p>
Łukasz Bromirski :unverified:<p>Annual reminder: I'm running various free projects for networking community - BGP feeds with bogons, FlowSpec, geo information for country filtering, full IPv4/IPv6 global table, RPKI RSes and AS112 sinkholes. All documented here: <a href="https://lukasz.bromirski.net/projects/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lukasz.bromirski.net/projects/</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/bgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bgp</span></a> <a href="https://infosec.exchange/tags/as112" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>as112</span></a> <a href="https://infosec.exchange/tags/anycast" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>anycast</span></a> <a href="https://infosec.exchange/tags/freebsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freebsd</span></a> <a href="https://infosec.exchange/tags/iosxr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iosxr</span></a> <a href="https://infosec.exchange/tags/xrv9000" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>xrv9000</span></a> <a href="https://infosec.exchange/tags/pushdastuff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pushdastuff</span></a></p>
Łukasz Bromirski :unverified:<p>Even seasoned network engineers can make mistakes. Mistakes are good, they make us learn things and remind we should stay humble. And if you waste hours troubleshooting... you write a post ;) <a href="https://lukasz.bromirski.net/post/xr-route-internal/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">lukasz.bromirski.net/post/xr-r</span><span class="invisible">oute-internal/</span></a> <a href="https://infosec.exchange/tags/iosxr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iosxr</span></a> <a href="https://infosec.exchange/tags/routing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>routing</span></a></p>
Łukasz Bromirski :unverified:<p>Doing geoblocking is generally doing 'security by building false sense of it'. However, sometimes somebody forces you to do it anyway. If you know what you're doing, take a look here - any feedback on this is great! <a href="https://lukasz.bromirski.net/bgp-geo-blackholing/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">lukasz.bromirski.net/bgp-geo-b</span><span class="invisible">lackholing/</span></a> <a href="https://infosec.exchange/tags/bgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bgp</span></a> <a href="https://infosec.exchange/tags/geoblocking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>geoblocking</span></a> <a href="https://infosec.exchange/tags/iosxr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iosxr</span></a> <a href="https://infosec.exchange/tags/pushdastuff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pushdastuff</span></a></p>
Łukasz Bromirski :unverified:<p>If You want to experiment with BGP FlowSpec on your router, there's alpha version of my BGP Blackholing FlowSpec server at 85.232.240.180 &amp; 2001:1a68:2c:2::180. You'll get 1345 IPv4 FlowSpec AF prefixes and 45 in IPv6 FlowSpec AF. The rest of configuration is the same as in main project: <a href="https://lukasz.bromirski.net/bgp-blackholing/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">lukasz.bromirski.net/bgp-black</span><span class="invisible">holing/</span></a> Please ping me directly and share your feedback (with your platform details if possible - thanks!) <a href="https://infosec.exchange/tags/iosxr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iosxr</span></a> <a href="https://infosec.exchange/tags/pushdastuff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pushdastuff</span></a> <a href="https://infosec.exchange/tags/bgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bgp</span></a> <a href="https://infosec.exchange/tags/blackholing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blackholing</span></a></p>
Łukasz Bromirski :unverified:<p>You *may* have noticed small disturbance of the force with regards to BGP Full Feed and BGP Blackholing projects. That's because over last two nights I migrated all infra to... this ;) <a href="https://infosec.exchange/tags/iosxr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iosxr</span></a> <a href="https://infosec.exchange/tags/xrv9000" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>xrv9000</span></a> <a href="https://infosec.exchange/tags/pushdastuff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pushdastuff</span></a></p>
Łukasz Bromirski :unverified:<p>Logging to IOS XR using SSH keys - 7.0+ edition howto: lukasz.bromirski.net/post/ios-xr-au… <a href="https://infosec.exchange/tags/iosxr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iosxr</span></a> <a href="https://infosec.exchange/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> <a href="https://infosec.exchange/tags/openssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openssh</span></a> <a href="https://infosec.exchange/tags/hardening" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hardening</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/pushdastuff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pushdastuff</span></a></p>
Łukasz Bromirski :unverified:<p>I decided to upgrade my home internet router before Easter while visiting local PC shop. Seller gave me that. I'm not sure if it supports WPA3 or UPnP though... ;) <a href="https://infosec.exchange/tags/iosxr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iosxr</span></a> <a href="https://infosec.exchange/tags/cisconcs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cisconcs</span></a> <a href="https://infosec.exchange/tags/100ge" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>100ge</span></a> <a href="https://infosec.exchange/tags/400ge" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>400ge</span></a></p>
heise online (inoffiziell)Es gibt wichtige Sicherheitsupdates für Ciscos Netzwerkbetriebssystem IOS XR. Keine der Lücken gilt als kritisch. <br><a href="https://www.heise.de/news/Angreifer-koennten-Cisco-Router-mit-IOS-XR-Software-lahmlegen-6188776.html" rel="nofollow noopener noreferrer" target="_blank">Angreifer könnten Cisco-Router mit IOS XR Software lahmlegen</a><br>
heise online (inoffiziell)Admins sollten professionelle Router von Cisco aus Sicherheitsgründe auf den aktuellen Stand bringen. Angreifer nutzen die Lücken derzeit aus.<br><a href="https://www.heise.de/news/Jetzt-patchen-Cisco-liefert-Sicherheitsupdates-fuer-Router-nach-4916417.html" rel="nofollow noopener noreferrer" target="_blank">Jetzt patchen! Cisco liefert Sicherheitsupdates für Router nach</a><br>
heise online (inoffiziell)Cisco hat Sicherheitsupdates für unter anderem Jabber, IOS XR und Webex Meetings veröffentlicht.<br><a href="https://www.heise.de/security/meldung/Sicherheitsupdates-Cisco-Jabber-praeparierte-Nachricht-Schadcode-4884609.html" rel="nofollow noopener noreferrer" target="_blank">Cisco Sicherheitsupdates: Jabber + präparierte Nachricht = Schadcode</a><br><a href="https://squeet.me/search?tag=Cisco" rel="nofollow noopener noreferrer" target="_blank">#Cisco</a> <a href="https://squeet.me/search?tag=IOSXR" rel="nofollow noopener noreferrer" target="_blank">#IOSXR</a> <a href="https://squeet.me/search?tag=Jabber" rel="nofollow noopener noreferrer" target="_blank">#Jabber</a> <a href="https://squeet.me/search?tag=Patchday" rel="nofollow noopener noreferrer" target="_blank">#Patchday</a> <a href="https://squeet.me/search?tag=Sicherheitsl%C3%BCcken" rel="nofollow noopener noreferrer" target="_blank">#Sicherheitslücken</a> <a href="https://squeet.me/search?tag=Updates" rel="nofollow noopener noreferrer" target="_blank">#Updates</a> <a href="https://squeet.me/search?tag=WebexMeetings" rel="nofollow noopener noreferrer" target="_blank">#WebexMeetings</a>