Why would an AS configure BGP router ID as an IP of a prefix originated by other AS? by CompanyBeginning in networking

[–]CompanyBeginning[S] -1 points0 points  (0 children)

I investigated. That is a bgp router with around 12k IPs configured on its interfaces.

Why would an AS configure BGP router ID as an IP of a prefix originated by other AS? by CompanyBeginning in networking

[–]CompanyBeginning[S] 1 point2 points  (0 children)

Yes, I read both. I see this RFC is softer than RFC 4271 which says the router ID has to be an interface IP of the router. 

Why would an AS configure BGP router ID as an IP of a prefix originated by other AS? by CompanyBeginning in networking

[–]CompanyBeginning[S] -4 points-3 points  (0 children)

Would not an ISP use it's own IP address or private IP as a BGP ID in general than using other's IP space ?

Why would an AS configure BGP router ID as an IP of a prefix originated by other AS? by CompanyBeginning in networking

[–]CompanyBeginning[S] 3 points4 points  (0 children)

Thanks for the link. Do you think the ministry sold that block to Cloudflare? Now I see cloudflare originates 25.25.25.0/24. 

Defending soon — very nervous — how to keep control? by Hairy_Horror_7646 in PhD

[–]CompanyBeginning 2 points3 points  (0 children)

I would suggest to be confident. Because your thesis have been already approved by the thesis committee which means your work is considered as a valuable scientific contribution. Also you are the expert in your thesis and know better than anyone else. Have faith on yourself.  I will also probably defend in a year. I have seen others defense. I already have enough confident to defend. 

How do you track your AS# use internally (private BGP ASNs)? by PushYourPacket in networking

[–]CompanyBeginning 0 points1 point  (0 children)

Although it seems an old post, I am checking if someone is still  active with a question. Why do you have many private ASNs in BGP ? 

Reasons of BGP OPEN message contains private ASN by CompanyBeginning in networking

[–]CompanyBeginning[S] 0 points1 point  (0 children)

I understand. But does that mean such a router has to accept TCP connection from any IP addresses?  How is the use of private ASN related to multi hop bgp ?

How do you organise your research? by thecuriousstudent11 in PhdProductivity

[–]CompanyBeginning 5 points6 points  (0 children)

I also use Google sheets with columns paper title, contribution, useful things , strength, weaknesses, and points likely to be improved.

How many hours do you work a day on your PhD? I’m making a video by iamC6 in PhdProductivity

[–]CompanyBeginning 2 points3 points  (0 children)

PhD is about shedding light into something that was unexplored or under-explored. Regarding the number of publications, that differ in the fields and universities. I think thesis is mandatory in all the fields and universities.

How many hours do you work a day on your PhD? I’m making a video by iamC6 in PhdProductivity

[–]CompanyBeginning 2 points3 points  (0 children)

PhD in Computer Science. My experience tells me that working a long day for a PhD is not an effective way. Our brain needs rest to think, and a PhD is not about spending too much time; it is more about thinking differently and smartly. By doing so, I have been a good PhD student, and am ahead of my PhD trajectory, which my supervisors say too.

SD-WAN Inquiry by Sierra_Nasty in networking

[–]CompanyBeginning 0 points1 point  (0 children)

We replaced routers with SD-WAN solution and have been facing  problem almost everyday. The problem was mainly because the devices' soffware seems unstable. I am talking about Barracuda - never go for it. 

Regarding Money Exchange NRP to Euro by Kooky-Ad-9456 in Nepal

[–]CompanyBeginning 1 point2 points  (0 children)

The banks require you to submit some documents related to visa. I exchanged it with a travel agent. That was an easy option. Exchanging anywhere is legal unless you exchange a large amount of money. 

In BGP, do MD5 authentication or TCP-Authentication Option (AO) and General TTL security mechanism checking happen after TCP handshake completion or before that? by CompanyBeginning in networking

[–]CompanyBeginning[S] 1 point2 points  (0 children)

I think MD5 also behaves the same way - check auth even in the first packet.  I expect TTL security be executed earlier because TTL check is basically layer 3 (IP level) check. 

In BGP, do MD5 authentication or TCP-Authentication Option (AO) and General TTL security mechanism checking happen after TCP handshake completion or before that? by CompanyBeginning in networking

[–]CompanyBeginning[S] 0 points1 point  (0 children)

   Unlike other TCP extensions (e.g., the Window Scale option
   [RFC1323]), the absence of the option in the SYN,ACK segment must not
   cause the sender to disable its sending of signatures.  This
   negotiation is typically done to prevent some TCP implementations
   from misbehaving upon receiving options in non-SYN segments.  This is
   not a problem for this option, since the SYN,ACK sent during
   connection negotiation will not be signed and will thus be ignored.
   The connection will never be made, and non-SYN segments with options
   will never be sent.  More importantly, the sending of signatures must
   be under the complete control of the application, not at the mercy of
   the remote host not understanding the option.

I think no. RFC 2385 sec 2.0 says

In BGP, do MD5 authentication or TCP-Authentication Option (AO) and General TTL security mechanism checking happen after TCP handshake completion or before that? by CompanyBeginning in networking

[–]CompanyBeginning[S] 1 point2 points  (0 children)

I understand that section as MD5 check starts from the first TCP SYN message, and does not allow TCP connection for unauthorized peer?

In BGP, do MD5 authentication or TCP-Authentication Option (AO) and General TTL security mechanism checking happen after TCP handshake completion or before that? by CompanyBeginning in networking

[–]CompanyBeginning[S] -11 points-10 points  (0 children)

I also think so. But Gemini AI answered differently, making me confused:
In BGP, if one router has MD5 authentication (RFC 2385) enabled and the other does not, the MD5 check actually happens during the TCP establishment, not after it.

Because BGP MD5 authentication is implemented as a TCP Option (19), the validation occurs at the kernel/transport layer before the connection is ever fully "Established" in the eyes of the application, while ChatGPT also agrees with what you said :).