John Kristoff
banner
jtk.infosec.exchange.ap.brid.gy
John Kristoff
@jtk.infosec.exchange.ap.brid.gy
UIC PhD candidate | https://Dataplane.org | Netscout. Internet infrastructure (#BGP, #DNS) and #infosec. Bit mechanic. Also: #Blues / tfr / #fedi22

🌉 bridged from ⁂ https://infosec.exchange/@jtk, follow @ap.brid.gy to interact
Curious what the thinking is for an edu to slice off a /24 that ended up at a Bulgarian web hoster.
https://social.bgp.tools/@transfers/statuses/01KA30858R3DSVDK72F1EY82WM
Post by IP/ASN Transfers, @transfers@bgp.tools
"University of Idaho" (ARIN) transferred 198.60.193.0/24 (Taken from 198.60.193.0 - 198.60.207.255) to "K Media Tech Ltd" (RIPE) (Estimated Market Value: $7.17 K)
social.bgp.tools
November 15, 2025 at 11:12 AM
Weekend Reads

* Reflections on the .us TLD
https://computer.rip/2025-11-11-dot-us.html
* Freedom on the Net 2025 report
https://freedomhouse.org/report/freedom-net/2025/uncertain-future-global-internet
* Vodafone Germany leaving public IXes […]
Original post on infosec.exchange
infosec.exchange
November 14, 2025 at 9:09 PM
Q1: do you set hostname on your #bgp routers and send it to peers

Q2: do your peers set and send their hostname to you?

I know BIRD and FRR support this, not sure about others.

ref: https://datatracker.ietf.org/doc/html/draft-walton-bgp-hostname-capability-02 - yes a long expired draft
Hostname Capability for BGP
In this document, we introduce a new BGP capability that allows the advertisemnet of a BGP speaker's hostname.
datatracker.ietf.org
November 12, 2025 at 10:17 PM
.gov #dns notes

On 2025-01-19 there were two "biden" names, bidenlibrary and bidenwhitehouse. Not so unusual. Associated names for Obama and Trump were also there and remain still. These are exec branch names but the agency responsible for them is the National Archives and Records […]
Original post on infosec.exchange
infosec.exchange
November 12, 2025 at 5:44 PM
This isn't the first transfer to aws.eu. This is the most visible and overt shift in assets by the big U.S. cloud providers I'm aware of. Others (e.g., Google and Microsoft) talk about doing more in the EU and providing isolation, but as far as I can tell Amazon's separation is going a step […]
Original post on infosec.exchange
infosec.exchange
November 12, 2025 at 2:57 PM
Latitude.sh (#as262287 and #as396356) has entered into an agreement to be acquired by Megaport (various ASNs).
November 11, 2025 at 12:58 PM
I'd guess related to the Internet interference reportedly happening within Cameroon, CAMNET (#as15964) leaking #bgp routes for 4.0.0.0/8 and 8.0.0.0/8, e.g.,

https://www.cidr-report.org/cgi-bin/as-report?as=AS15964&view=2.0 […]
Original post on infosec.exchange
infosec.exchange
November 10, 2025 at 1:38 AM
Cloudflare overtaking Apache in the web server survey feels a bit like when people starting using OpenDNS over their local ISP resolvers.

I have an idea of what could be next, but you're not going to like it.
November 7, 2025 at 10:31 PM
Seems noteworthy that #akamai put this short statement on their blog.

"Akamai is aware of content and connectivity filtering within Russia. [...] Because of the constantly evolving situation - including active hostilities - ongoing delivery of traffic to users in Russia is provided […]
Original post on infosec.exchange
infosec.exchange
November 7, 2025 at 7:40 PM
I'm not sure I should be surprised, sad, or just bemused at how often the literal wildcard, e.g. '*.domain.example' shows up in queries at my auth servers. Something(s) out of Hetzner seems to love doing this a lot.
November 7, 2025 at 2:48 PM
This is probably related to an in-progress VPN service Barrett Lyon has been working on. See domain shown for details.
https://social.bgp.tools/@new_ripe_asns/statuses/01K9F4SHHZQ5JV0E23W9SKDKDA
Post by new_ripe_asns, @new_ripe_asns@bgp.tools
AS203921 - [doxx.net corporation]
social.bgp.tools
November 7, 2025 at 2:38 PM
Reposted by John Kristoff
Something that started as a small curiosity and weekend project turned into a long article with several surprises for myself (including how bad I am at time estimates). I went down quite a few rabbit holes along the way.

EDNS Client Subnet in Practice: Evaluating Public Resolver Behaviors […]
Original post on unix.family
unix.family
November 3, 2025 at 2:13 PM
Bogus #bgp routes that were little noticed. The origin ASN appears to have been a typo for #as327885 (Viettel Tanzania), perhaps in a failed attempt at a government directed shutdown?

https://stat.ripe.net/widget/routing-history#starttime=2025-10-26&resource=372885 […]
Original post on infosec.exchange
infosec.exchange
November 3, 2025 at 12:54 AM
.co TLD registry web sites returning 503s at the moment. They apparently;y had some name registration service outage a couple of days ago, possibly related?

https://web.archive.org/web/20251102204006/https://www.cointernet.com.co/

https://web.archive.org/web/20251102204125/https://www.go.co/
November 2, 2025 at 8:45 PM
Yet more presumably to HostRoyale, who has not been considered a major player in the hosting business afaik. And they are not particularly cheap. But they are acquiring a substantial amount of v4 space that is making me at least, perk up and take notice. Something is driving these purchases, and […]
Original post on infosec.exchange
infosec.exchange
November 1, 2025 at 12:24 AM
Original post on infosec.exchange
infosec.exchange
October 31, 2025 at 8:57 PM
cleardocks is a lot like steel-axis I mentioned yesterday, and their prefixes tend to end up at HostRoyale (#as203020).

HostRoyale is approaching 2000 IP4 (mostly) /24 routes that come from all over the address space, topologically and geographically […]
Original post on infosec.exchange
infosec.exchange
October 31, 2025 at 1:16 PM
"Nearly half of The Information's subscribers (about 50%) who responded to our latest survey bought or sold cryptocurrency, crypto ETFs, or crypto treasury stocks in the past three months."

And about 2/3 (of their total 45,000 subscribers) at this influential tech/biz pub have at one time or […]
Original post on infosec.exchange
infosec.exchange
October 31, 2025 at 1:23 AM
ROA Planner, as seen on the #nanog list:

https://rootbeer.testing.ns.internet2.edu/roa-planner/

"The implementation remains fragile and will be unavailable intermittently, but we hope to improve it over the next couple of weeks."

aka beta test.

#rpki
RPKI-ROA Planner
rootbeer.testing.ns.internet2.edu
October 30, 2025 at 6:10 PM