mathstodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance for maths people. We have LaTeX rendering in the web interface!

Server stats:

2.8K
active users

#rpki

2 posts2 participants0 posts today
ティージェーグレェI submitted a Pull Request to update MacPorts' rpki-client to 9.5 here:<br><br><a href="https://github.com/macports/macports-ports/pull/28128" rel="nofollow noopener noreferrer" target="_blank">https://github.com/macports/macports-ports/pull/28128</a><br><br>GitHub Continuous Integration checks passed!<br><br>Update: Or at least I thought they did?<br><br>Now seeing this error:<br><br>"Creating port index in /Users/runner/work/macports-ports1597/macports-ports1597/ports<br>Adding port net/rpki-client<br>signal interp lost<br>ports/.github/workflows/bootstrap.sh: line 150: 2047 Abort trap: 6 portindex -e<br>Error: Process completed with exit code 134."<br><br>o.O<br><br>From: <a href="https://github.com/artkiver/macports-ports1597/actions/runs/14437970476" rel="nofollow noopener noreferrer" target="_blank">https://github.com/artkiver/macports-ports1597/actions/runs/14437970476</a><br><br>Even though previously in the GitHub UI, it showed all three checks as green. wtfh? I mean, I <i>hate</i> GitHub and have less than no reason to trust it, but that's a new one, even for me.<br><br>If I check: <a href="https://github.com/macports/macports-ports/pull/28128/checks" rel="nofollow noopener noreferrer" target="_blank">https://github.com/macports/macports-ports/pull/28128/checks</a><br><br>All is green there too. I am so confused.<br><br>Regardless, it's up to someone else with commit access to merge it.<br><br>Meanwhile, still no assistance regarding my request for help on the MacPorts' patches for OpenSSH 10.0p1/2 for ssh-agent.c and sshd-session.c, but someone else did open another Trac issue regarding OpenSSH's logging (or lack thereof) here:<br><br><a href="https://trac.macports.org/ticket/72345" rel="nofollow noopener noreferrer" target="_blank">https://trac.macports.org/ticket/72345</a><br><br>Though, they also observe the same behavior with the Apple shipped version, so they pontificate if it may be an issue upstream?<br><br>Ya think?<br><br>Sometimes, I think folks vastly overestimate what "maintainer" means or how much I might be using some of this software or what they expect me to do about it just because it is "assigned" to me.<br><br>For example: I basically do not run sshd on any macOS systems, since I only have Apple laptops which sleep a <i>lot</i> and are absolutely <i>awful</i> as anything that should be a server running daemonized software.<br><br>Did these folks not notice that Apple <i>themselves</i> discontinued their XServe hardware line circa 2004? Or that even their "OS X Server" product was discontinued from the App Store in 2022?<br><br>I guess they missed the memos, couldn't read the room or writing on the wall?<br><br>But then, they observed this in macOS Monterey, which itself is from 2021, so maybe they just prefer livin in the past? I have no idea.<br><br>I am not even sure how to meaningfully reply to that Trac issue.<br><br><a href="https://snac.bsd.cafe?t=rpki" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#RPKI</a> <a href="https://snac.bsd.cafe?t=rpkiーclient" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#rpkiーclient</a> <a href="https://snac.bsd.cafe?t=macports" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#MacPorts</a> <a href="https://snac.bsd.cafe?t=macos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#macOS</a> <a href="https://snac.bsd.cafe?t=bgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#BGP</a> <a href="https://snac.bsd.cafe?t=openbgpd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#OpenBGPD</a> <a href="https://snac.bsd.cafe?t=opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#OpenSource</a><br>
Peter N. M. Hansteen<p>rpki-client 9.5 released <a href="https://www.undeadly.org/cgi?action=article;sid=20250412123402" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">undeadly.org/cgi?action=articl</span><span class="invisible">e;sid=20250412123402</span></a> <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/rpkiclient" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rpkiclient</span></a> <a href="https://mastodon.social/tags/rpki" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rpki</span></a> <a href="https://mastodon.social/tags/bgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bgp</span></a> <a href="https://mastodon.social/tags/pki" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pki</span></a> <a href="https://mastodon.social/tags/crypto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>crypto</span></a> <a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/routing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>routing</span></a> <a href="https://mastodon.social/tags/bgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bgp</span></a> <a href="https://mastodon.social/tags/networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networking</span></a> <a href="https://mastodon.social/tags/freesoftware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freesoftware</span></a> <a href="https://mastodon.social/tags/libresoftware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>libresoftware</span></a></p>
John Kristoff<p>Did you know chrony, the <a href="https://infosec.exchange/tags/NTP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NTP</span></a> implementation, sets up an administrative listener on the loopback interface using UDP/323 by default?</p><p>Unfortunately in the <a href="https://infosec.exchange/tags/RPKI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RPKI</span></a> rpki-rtr has TCP/323 registered with IANA (see IETF RFC 6810). UDP/323 is reserved. Reserving a transport that is unused by the assigned application is common practice these days.</p><p>chrony's choice can probably be chalked up to a historical accident since it came first and presumably picked 323 because it "looked" like 123 and was then unassigned.</p><p>Chrony should probably change their default imo, but maybe it's too late or not worth it now?</p>
NLnet Labs<p>We are pleased to announce the latest release of Routinator, version 0.14.2 ‘Roll Initiative!’ This of our <a href="https://fosstodon.org/tags/RPKI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RPKI</span></a> validator fixes an issue in the bundled UI that caused it to retrieve data from our own test instance rather than the actual Routinator instance. Users of the bundled UI should upgrade. <a href="https://github.com/NLnetLabs/routinator/releases/tag/v0.14.2" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/NLnetLabs/routinato</span><span class="invisible">r/releases/tag/v0.14.2</span></a></p>
Solid Tech<p>Is Your Internet Service Provider (ISP) Secure? Test It Now!</p><p><a href="https://www.byteswifts.com/2025/02/is-your-isp-secure-test-it-now.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">byteswifts.com/2025/02/is-your</span><span class="invisible">-isp-secure-test-it-now.html</span></a></p><p><a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/ISP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ISP</span></a> <a href="https://mastodon.social/tags/BGPHijacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BGPHijacking</span></a> <a href="https://mastodon.social/tags/DataProtection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataProtection</span></a> <a href="https://mastodon.social/tags/OnlineSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OnlineSecurity</span></a> <a href="https://mastodon.social/tags/TechNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechNews</span></a> <a href="https://mastodon.social/tags/CyberThreats" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberThreats</span></a> <a href="https://mastodon.social/tags/InternetPrivacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InternetPrivacy</span></a> <a href="https://mastodon.social/tags/SecureInternet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecureInternet</span></a> <a href="https://mastodon.social/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://mastodon.social/tags/CyberAwareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberAwareness</span></a> <a href="https://mastodon.social/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <a href="https://mastodon.social/tags/TechTips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechTips</span></a> <a href="https://mastodon.social/tags/Cloudflare" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cloudflare</span></a> <a href="https://mastodon.social/tags/BGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BGP</span></a> <a href="https://mastodon.social/tags/RPKI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RPKI</span></a> <a href="https://mastodon.social/tags/ITSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITSecurity</span></a> <a href="https://mastodon.social/tags/CyberAttack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberAttack</span></a> <a href="https://mastodon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://mastodon.social/tags/CyberDefense" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberDefense</span></a> <a href="https://mastodon.social/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> <a href="https://mastodon.social/tags/OnlinePrivacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OnlinePrivacy</span></a> <a href="https://mastodon.social/tags/SecurityTips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityTips</span></a> <a href="https://mastodon.social/tags/CyberSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSec</span></a> <a href="https://mastodon.social/tags/TechUpdates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechUpdates</span></a> <a href="https://mastodon.social/tags/DigitalSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalSecurity</span></a> <a href="https://mastodon.social/tags/Hackers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hackers</span></a> <a href="https://mastodon.social/tags/ITSupport" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITSupport</span></a> <a href="https://mastodon.social/tags/Networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Networking</span></a> <a href="https://mastodon.social/tags/CyberProtection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberProtection</span></a> <a href="https://mastodon.social/tags/SecureYourData" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecureYourData</span></a> <a href="https://mastodon.social/tags/DigitalSafety" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalSafety</span></a> <a href="https://mastodon.social/tags/Tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tech</span></a></p>
Dan York<p>This is great news! I have long been a huge of Internet.nl as a test site for compliance with the latest standards- and now they have added <a href="https://mastodon.social/tags/RPKI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RPKI</span></a> into their scoring. (The RPKI test was there for the last 2 years, but didn’t count toward the score - now it does!) </p><p>This is a way to hopefully get people paying more attention to <a href="https://mastodon.social/tags/RoutingSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RoutingSecurity</span></a> and <a href="https://mastodon.social/tags/MANRS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MANRS</span></a> </p><p>From: <span class="h-card" translate="no"><a href="https://mastodon.nl/@internet_nl" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>internet_nl</span></a></span><br><a href="https://mastodon.nl/@internet_nl/113906271350500646" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.nl/@internet_nl/11390</span><span class="invisible">6271350500646</span></a></p>
Internet.nl<p><span class="h-card" translate="no"><a href="https://noc.social/@namedbird" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>namedbird</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@GuidoKostons" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>GuidoKostons</span></a></span> </p><p>Goed dat je het gefixt hebt! Wel jammer dat je registrar niet helemaal bij de tijd is. </p><p>Voor andere *Europese* <a href="https://mastodon.nl/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a> providers die -voor zover wij weten- allemaal <a href="https://mastodon.nl/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNSSEC</span></a> doen zie trouwens: <a href="https://european-alternatives.eu/category/managed-dns-providers" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">european-alternatives.eu/categ</span><span class="invisible">ory/managed-dns-providers</span></a></p><p>deSEC is zelfs een voor gebruikers kosteloze dienst: <a href="https://desec.io/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">desec.io/</span><span class="invisible"></span></a></p><p>Welke <a href="https://mastodon.nl/tags/RPKI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RPKI</span></a> problemen zie je trouwens bij de mail forwarding via Cloudflare?</p>
Named Bird<p><span class="h-card"><a href="https://mastodon.social/@GuidoKostons" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>GuidoKostons</span></a></span> <span class="h-card"><a href="https://mastodon.nl/@internet_nl" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>internet_nl</span></a></span> Ik ook!<br>Heb <a href="https://noc.social/tags/ipv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv6</span></a> aan en de webserver beveiligd op mijn VPSje.<br>Om DNSSEC werkend te krijgen moest ik cloudflare nameservers gebruiken, aangezien mijn registrar dat niet aan heeft staan op hun eigen servers.<br>Toen direct mail forwarding aangezet en haal daar nu ook ~95% op. (geen 100 wegens <a href="https://noc.social/tags/RPKI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RPKI</span></a> problemen bij <a href="https://noc.social/tags/Cloudflare" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cloudflare</span></a>.)</p>
Clement Cavadore<p>Nous venons d'implémenter un filtrage basé sur "Autonomous System Provider Authorization" (ASPA) sur un des RS de Lillix<br> (RS2).</p><p>Etant donné que ASPA n'est pas encore normalisé, on va attendre que ca soit fait pour l'implémenter sur RS1.<br><a href="https://masto.hivane.net/tags/RPKI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RPKI</span></a> <br>infos sur le blog d'<span class="h-card" translate="no"><a href="https://hostux.social/@alarig" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>alarig</span></a></span> (qui l'a implémenté chez Lillix): <br><a href="https://www.swordarmor.fr/securisation-du-routage-bgp-en-utilisant-aspa-avec-routinator-et-bird-cas-de-breizh-ix.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">swordarmor.fr/securisation-du-</span><span class="invisible">routage-bgp-en-utilisant-aspa-avec-routinator-et-bird-cas-de-breizh-ix.html</span></a></p>
NLnet Labs<p>Routinator offered support for <a href="https://fosstodon.org/tags/RPKI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RPKI</span></a> Autonomous System Provider Authorization (ASPA) as an experimental feature for a number of years already. Standardization has now progressed far enough in the <a href="https://fosstodon.org/tags/IETF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IETF</span></a> that we feel comfortable making <a href="https://fosstodon.org/tags/ASPA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ASPA</span></a> a core feature in Routinator 0.14.1. <a href="https://fosstodon.org/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> <a href="https://fosstodon.org/tags/OpenStandards" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenStandards</span></a> <a href="https://github.com/NLnetLabs/routinator/releases/tag/v0.14.1" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/NLnetLabs/routinato</span><span class="invisible">r/releases/tag/v0.14.1</span></a></p>
NLnet Labs<p>We just released Routinator 0.14.1, fixing CVE-2025-0638, where non-ASCII characters in the file names listed in an <a href="https://fosstodon.org/tags/RPKI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RPKI</span></a> manifest lead to a crash of Routinator:<br><a href="https://nlnetlabs.nl/downloads/routinator/CVE-2025-0638.txt" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nlnetlabs.nl/downloads/routina</span><span class="invisible">tor/CVE-2025-0638.txt</span></a></p><p>You should also be aware of CVE-2024-12084, fixing a heap-based buffer overflow flaw was found in the rsync daemon:<br><a href="https://nvd.nist.gov/vuln/detail/cve-2024-12084" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nvd.nist.gov/vuln/detail/cve-2</span><span class="invisible">024-12084</span></a></p><p>Please make sure you update both Routinator and rsync. Lastly, because gzip is re-enabled, you’ll save up to 50% bandwidth. </p><p><a href="https://nlnetlabs.nl/news/2025/Jan/22/routinator-0.14.1-released/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nlnetlabs.nl/news/2025/Jan/22/</span><span class="invisible">routinator-0.14.1-released/</span></a></p>
NLnet Labs<p>“… require contracted providers of Internet services to agencies to adopt and deploy Internet routing security technologies, including publishing Route Origin Authorizations and performing Route Origin Validation filtering."</p><p>In light of this Executive Order; if you need <a href="https://fosstodon.org/tags/RPKI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RPKI</span></a> solutions that are continually developed, have a proven track record, are trusted by the world’s largest operators and are supported with a service-level agreement, we're here for you. <a href="https://fosstodon.org/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a></p><p><a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2025/01/16/executive-order-on-strengthening-and-promoting-innovation-in-the-nations-cybersecurity/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">whitehouse.gov/briefing-room/p</span><span class="invisible">residential-actions/2025/01/16/executive-order-on-strengthening-and-promoting-innovation-in-the-nations-cybersecurity/</span></a></p>
Bryan Steele :flan_beard:<p>History/backstory in the OpenBSD commit for rpki-client(8), from Job Snijders.</p><p><a href="https://marc.info/?l=openbsd-cvs&amp;m=173707299408526&amp;w=2" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">marc.info/?l=openbsd-cvs&amp;m=173</span><span class="invisible">707299408526&amp;w=2</span></a></p><p><a href="https://bsd.network/tags/BGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BGP</span></a> <a href="https://bsd.network/tags/RPKI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RPKI</span></a></p>
Bryan Steele :flan_beard:<p>The ARIN <a href="https://bsd.network/tags/RPKI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RPKI</span></a> TAL (Trust Anchor Locator) has been updated to include a BSD-like disclaimer comment, making it more widely available.</p><p><a href="https://www.arin.net/announcements/20250116-tal/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">arin.net/announcements/2025011</span><span class="invisible">6-tal/</span></a></p><p>Heads up from Job Snijders on openbsd tech@:</p><p><a href="https://marc.info/?l=openbsd-tech&amp;m=173705588431903&amp;w=2" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">marc.info/?l=openbsd-tech&amp;m=17</span><span class="invisible">3705588431903&amp;w=2</span></a></p>
Jan Schaumann<p>Whoof, this "Executive Order on Strengthening and Promoting Innovation in the Nation’s Cybersecurity" is a lot of words:</p><p><a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2025/01/16/executive-order-on-strengthening-and-promoting-innovation-in-the-nations-cybersecurity/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">whitehouse.gov/briefing-room/p</span><span class="invisible">residential-actions/2025/01/16/executive-order-on-strengthening-and-promoting-innovation-in-the-nations-cybersecurity/</span></a></p><p>Notable:</p><p>"Within 120 days, publish <a href="https://mstdn.social/tags/RPKI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RPKI</span></a> Route Origin Authorizations..."</p><p>"Within 180 days, enable encrypted DNS protocols..."</p><p>"Agencies shall implement PQC key establishment or hybrid key establishment including a PQC algorithm as soon as practicable..."</p><p>"Within 270 days, establish a program to use advanced AI models for cyber defense."</p>
John Kristoff<p><a href="https://infosec.exchange/tags/RPKI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RPKI</span></a>'s 2024 Year in Review by <span class="h-card" translate="no"><a href="https://bsd.network/@job" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>job</span></a></span> <a href="https://mailarchive.ietf.org/arch/msg/sidrops/wI_PqEMsScRh1-jYl8XYPDI-3qE/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mailarchive.ietf.org/arch/msg/</span><span class="invisible">sidrops/wI_PqEMsScRh1-jYl8XYPDI-3qE/</span></a></p>
John Kristoff<p><span class="h-card" translate="no"><a href="https://mstdn.social/@jschauma" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>jschauma</span></a></span> The thing I'd be especially concerned about are <a href="https://infosec.exchange/tags/RPKI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RPKI</span></a> publication points.</p>
Peter N. M. Hansteen<p>rpki-client 9.4 released <a href="https://www.undeadly.org/cgi?action=article;sid=20250108100744" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">undeadly.org/cgi?action=articl</span><span class="invisible">e;sid=20250108100744</span></a> <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/rpki" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rpki</span></a>-client <a href="https://mastodon.social/tags/rpki" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rpki</span></a> <a href="https://mastodon.social/tags/pki" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pki</span></a> <a href="https://mastodon.social/tags/routing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>routing</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networking</span></a></p>
ティージェーグレェI submitted a Pull Request to update MacPorts' rpki-client to 9.4 here:<br><br><a href="https://github.com/macports/macports-ports/pull/27334" rel="nofollow noopener noreferrer" target="_blank">https://github.com/macports/macports-ports/pull/27334</a><br><br>The GitHub Continuous Integration checks passed OK.<br><br>It's up to someone else with commit access to merge it.<br><br>Also, I noticed on <a href="https://rpki-client.org" rel="nofollow noopener noreferrer" target="_blank">https://rpki-client.org</a> that it still references 9.3, even though the URL linked to by the "rpki-client 9.3" text is the release announcement for 9.4.<br><br>I'm prepping a submission for undeadly.org as well, but I thought I would let you know about that version number typo on the website in the meantime.<br><br>Thank you for the continued improvements!<br><br><a href="https://snac.bsd.cafe?t=rpki" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#RPKI</a> <a href="https://snac.bsd.cafe?t=openbgpd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#OpenBGPD</a> <a href="https://snac.bsd.cafe?t=openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#OpenBSD</a> <a href="https://snac.bsd.cafe?t=macports" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#MacPorts</a> <a href="https://snac.bsd.cafe?t=rpkiclient" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#rpkiclient</a> <a href="https://snac.bsd.cafe?t=opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#OpenSource</a> <a href="https://snac.bsd.cafe?t=routing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Routing</a> <a href="https://snac.bsd.cafe?t=bgp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#BGP</a><br>
Vesna Manojlović<p>Today <a href="https://social.v.st/tags/Day3" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Day3</span></a> at <a href="https://social.v.st/tags/38C3" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>38C3</span></a> Stage <a href="https://social.v.st/tags/YELL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>YELL</span></a> 14:42 :: we will talk about <a href="https://social.v.st/tags/RIPE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RIPE</span></a> database, <a href="https://social.v.st/tags/whois" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>whois</span></a> protocol, <a href="https://social.v.st/tags/BGP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BGP</span></a> security, <a href="https://social.v.st/tags/ASN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ASN</span></a> <a href="https://social.v.st/tags/policy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>policy</span></a> , <a href="https://social.v.st/tags/routing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>routing</span></a> <a href="https://social.v.st/tags/registry" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>registry</span></a> , <a href="https://social.v.st/tags/RPSL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RPSL</span></a> , <a href="https://social.v.st/tags/RPKI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RPKI</span></a> , &amp; other <a href="https://social.v.st/tags/Internet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Internet</span></a> <a href="https://social.v.st/tags/infrastructure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infrastructure</span></a> topics (with thanks to <a href="https://social.v.st/tags/xkcd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>xkcd</span></a> who has an illustration for every occasion) <a href="https://events.ccc.de/congress/2024/hub/en/event/the-whois-protocol-for-internet-routing-policy-or-how-plaintext-retrieved-over-tcp-43-ends-up-in-router-configurations/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">events.ccc.de/congress/2024/hu</span><span class="invisible">b/en/event/the-whois-protocol-for-internet-routing-policy-or-how-plaintext-retrieved-over-tcp-43-ends-up-in-router-configurations/</span></a></p>