mastodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance, open to everyone, but mainly English and French speaking.

Administered by:

Server stats:

817
active users

#tcpip

0 posts0 participants0 posts today
David Bombal<p>TCP/IP Model vs OSI Model (FREE CCNA 200-301 Course 2025)</p><p>YouTube video: <a href="https://youtu.be/a0UIbw1MsUM" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/a0UIbw1MsUM</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/ccna" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ccna</span></a> <a href="https://infosec.exchange/tags/osi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>osi</span></a> <a href="https://infosec.exchange/tags/tcpip" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tcpip</span></a> <a href="https://infosec.exchange/tags/tcp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tcp</span></a> <a href="https://infosec.exchange/tags/network" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>network</span></a> <a href="https://infosec.exchange/tags/networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networking</span></a> <a href="https://infosec.exchange/tags/cisco" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cisco</span></a> <a href="https://infosec.exchange/tags/model" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>model</span></a> <a href="https://infosec.exchange/tags/study" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>study</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Will Pettersson<p>Is there a standardised (or vaguely common) hostname akin to localhost that either a) only resolves to the IPv4 127.0.0.1, or only resolves to the IPv6 [::1]? In my experience, whether localhost resolves to an IPv4 or IPv6 address seems to be somewhat OS-dependent (or even system-dependent), I am wondering if there's a standard way to specify that I do want either the IPv4 version or the IPv6 version?</p><p>Why, you ask? I have a service on localhost that only listens on IPv4, but today localhost resolved to [::1] and it broke. Now I fixed it easily by specifying 127.0.0.1 as the server address instead of localhost in the upstream proxy, but it did make me start wondering.</p><p><a href="https://toot.cat/tags/tcpip" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tcpip</span></a> <a href="https://toot.cat/tags/ipv4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv4</span></a> <a href="https://toot.cat/tags/ipv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv6</span></a> <a href="https://toot.cat/tags/localhost" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>localhost</span></a></p>
Phanuel<p><span class="h-card" translate="no"><a href="https://fosstodon.org/@goldfishlaser" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>goldfishlaser</span></a></span> thanks! I am always on the lookout for any decentralizing technologies. </p><p>This <a href="https://mastodon.social/tags/meshtastic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>meshtastic</span></a> looks good, but I'm primarily interested in such platforms or networks which can handle <a href="https://mastodon.social/tags/tcpip" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tcpip</span></a> or <a href="https://mastodon.social/tags/ipfs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipfs</span></a> .</p>
Peter N. M. Hansteen<p><span class="h-card" translate="no"><a href="https://wetdry.world/@nonfedimemes" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>nonfedimemes</span></a></span> Seeing the mention of carrier pigeons has me think that sure, any step towards an independent, interoperable RFC1149 implementation would be welcome (see <a href="https://www.bsdly.net/~peter/rfc1149_ten_years_of_in-flight_internet.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bsdly.net/~peter/rfc1149_ten_y</span><span class="invisible">ears_of_in-flight_internet.html</span></a> for some relevant links), but that would perhaps run the risk of being somewhat distruptive in a school or at least classroom environment <a href="https://mastodon.social/tags/rfc1149" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rfc1149</span></a> <a href="https://mastodon.social/tags/pigeons" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pigeons</span></a> <a href="https://mastodon.social/tags/tcpip" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tcpip</span></a> <a href="https://mastodon.social/tags/cpip" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cpip</span></a></p>
Joaquim Homrighausen<p>If you're not running your own DNS resolver, and/or not running PiHole, changing your DNS from 8.8.8.8 to 9.9.9.9 is a good first step 😉 </p><p><a href="https://mastodon.online/tags/dns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dns</span></a> <a href="https://mastodon.online/tags/infrastructure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infrastructure</span></a> <a href="https://mastodon.online/tags/devops" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>devops</span></a> <a href="https://mastodon.online/tags/quad9" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>quad9</span></a> <a href="https://mastodon.online/tags/google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>google</span></a> <a href="https://mastodon.online/tags/tcpip" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tcpip</span></a> <a href="https://mastodon.online/tags/internet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>internet</span></a> <a href="https://mastodon.online/tags/cybersec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersec</span></a> <a href="https://mastodon.online/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.online/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.online/tags/pihole" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pihole</span></a></p>
Hacker News<p>Let's code a TCP/IP stack, 1: Ethernet and ARP — <a href="https://www.saminiir.com/lets-code-tcp-ip-stack-1-ethernet-arp/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">saminiir.com/lets-code-tcp-ip-</span><span class="invisible">stack-1-ethernet-arp/</span></a><br><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/TCPIP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TCPIP</span></a> <a href="https://mastodon.social/tags/Stack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Stack</span></a> <a href="https://mastodon.social/tags/Ethernet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ethernet</span></a> <a href="https://mastodon.social/tags/ARP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ARP</span></a> <a href="https://mastodon.social/tags/Networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Networking</span></a> <a href="https://mastodon.social/tags/Coding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Coding</span></a></p>
SQLAllFather<p>Blast from the past: I digitized and uploaded a 1993 VHS video tape that was included with my trainer kit for teaching Internetworking with Microsoft Windows NT 3.5. </p><p>I assume the audience for this one is pretty niche, but for me it provided a welcome dose of healthy nostalgia.</p><p><a href="https://www.youtube.com/watch?v=dGiPQBoSSpM" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/watch?v=dGiPQBoSSp</span><span class="invisible">M</span></a></p><p><a href="https://techhub.social/tags/TCPIP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TCPIP</span></a> <a href="https://techhub.social/tags/RetroComputing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RetroComputing</span></a> <a href="https://techhub.social/tags/Retro" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Retro</span></a> <a href="https://techhub.social/tags/VHSRip" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VHSRip</span></a> <a href="https://techhub.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a></p>
Radio Azureus<p>Be like me and go and learn about TCP fundamentals</p><p><a href="https://www.youtube.com/watch?v=xdQ9sgpkrX8" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=xdQ9sgpkrX8</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/bash" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bash</span></a> <a href="https://mastodon.social/tags/sh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sh</span></a> <a href="https://mastodon.social/tags/zsh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zsh</span></a> <a href="https://mastodon.social/tags/ksh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ksh</span></a> <a href="https://mastodon.social/tags/csh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>csh</span></a> <a href="https://mastodon.social/tags/WomenWhoCode" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WomenWhoCode</span></a> <a href="https://mastodon.social/tags/100DaysOfCode" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>100DaysOfCode</span></a> <a href="https://mastodon.social/tags/1000DaysOfCode" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>1000DaysOfCode</span></a> <a href="https://mastodon.social/tags/POSIX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>POSIX</span></a> <a href="https://mastodon.social/tags/Programming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Programming</span></a> <a href="https://mastodon.social/tags/networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networking</span></a> <a href="https://mastodon.social/tags/TCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TCP</span></a> <a href="https://mastodon.social/tags/TCPIP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TCPIP</span></a></p><p><span class="h-card" translate="no"><a href="https://fuzzies.wtf/@altbot" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>altbot</span></a></span></p>
Kosuke Suzuki<p>I'm trying to learn how Happy Eyeballs works. My network is dual-stack (IPv4 / IPv6) and in Japan IPv6 internet is less congested somehow.<br><a href="https://mastodon.social/tags/Network" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Network</span></a> <a href="https://mastodon.social/tags/tcpip" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tcpip</span></a></p>
Diego Cordoba 🇦🇷<p>¿Te interesa <a href="https://mstdn.io/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mstdn.io/tags/flask" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>flask</span></a> <a href="https://mstdn.io/tags/python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>python</span></a> <a href="https://mstdn.io/tags/redes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redes</span></a> <a href="https://mstdn.io/tags/tcpip" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tcpip</span></a> <a href="https://mstdn.io/tags/wireshark" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireshark</span></a> <a href="https://mstdn.io/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> <a href="https://mstdn.io/tags/iptables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iptables</span></a> <a href="https://mstdn.io/tags/firewalling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewalling</span></a> <a href="https://mstdn.io/tags/vim" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vim</span></a> o <a href="https://mstdn.io/tags/bash" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bash</span></a> ?</p><p>Acá te dejo un 🧵 donde van a poder encontrar cupones de descuento para todos los cursos de @juncotic</p><p>Me escriben por otras formas de pago, y no se dejen estar, quedan 2 días!</p><p><a href="https://mstdn.io/@d1cor/113783865137910918" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mstdn.io/@d1cor/11378386513791</span><span class="invisible">0918</span></a></p>
Maikel 🇪🇺 🇪🇸<p>Hahahahaha. Stolen from Reddit</p><p><a href="https://vmst.io/tags/tcpip" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tcpip</span></a> <a href="https://vmst.io/tags/udp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>udp</span></a></p>
Neustradamus :xmpp: :linux:<p><a href="https://mastodon.social/tags/iproute2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iproute2</span></a> 6.11.0 has been released (<a href="https://mastodon.social/tags/iproute" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iproute</span></a> / <a href="https://mastodon.social/tags/ifconfig" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ifconfig</span></a> / <a href="https://mastodon.social/tags/TCPIP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TCPIP</span></a>) <a href="https://wiki.linuxfoundation.org/networking/iproute2" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">wiki.linuxfoundation.org/netwo</span><span class="invisible">rking/iproute2</span></a></p>
Peter N. M. Hansteen<p>There was a "Network Management with the OpenBSD Packet Filter Toolset" tutorial session at <span class="h-card" translate="no"><a href="https://bsd.network/@EuroBSDCon" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>EuroBSDCon</span></a></span> 2024, here are the updated slides: <a href="https://nxdomain.no/~peter/pf_fullday.pdf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nxdomain.no/~peter/pf_fullday.</span><span class="invisible">pdf</span></a> <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/pf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pf</span></a> <a href="https://mastodon.social/tags/networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networking</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/tcpip" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tcpip</span></a> <a href="https://mastodon.social/tags/ipv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv6</span></a> <a href="https://mastodon.social/tags/ipv4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv4</span></a> <a href="https://mastodon.social/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> <a href="https://mastodon.social/tags/spam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spam</span></a> <a href="https://mastodon.social/tags/packetfilter" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>packetfilter</span></a> <a href="https://mastodon.social/tags/eurobsdcon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>eurobsdcon</span></a></p>
Jonas Lejon<p>Kritisk sårbarhet i Windows TCP/IP-stack åtgärdad. Möjliggör fjärrexekvering utan användarinteraktion. Läs mer på bloggen!</p><p><a href="https://kryptera.se/0-klick-rce-i-windows-ipv6-stack-atgardad/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">kryptera.se/0-klick-rce-i-wind</span><span class="invisible">ows-ipv6-stack-atgardad/</span></a></p><p><a href="https://infosec.exchange/tags/cybers%C3%A4kerhet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersäkerhet</span></a> <a href="https://infosec.exchange/tags/PatchTisdag" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PatchTisdag</span></a> <a href="https://infosec.exchange/tags/S%C3%A5rbarhet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sårbarhet</span></a> <a href="https://infosec.exchange/tags/Fj%C3%A4rrk%C3%B6rning" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fjärrkörning</span></a> <a href="https://infosec.exchange/tags/TCPIP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TCPIP</span></a> <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://infosec.exchange/tags/N%C3%A4tverkss%C3%A4kerhet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Nätverkssäkerhet</span></a> <a href="https://infosec.exchange/tags/KunlunLab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KunlunLab</span></a> <a href="https://infosec.exchange/tags/Informationss%C3%A4kerhet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Informationssäkerhet</span></a> <a href="https://infosec.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a></p>
Some Bits: Nelson's Linkblog<p>Illustrated QUIC: Detailed byte by byte explanation of the transport protocol replacing TCP for web communication<br><a href="https://quic.xargs.org/#client-application-packet/annotated" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">quic.xargs.org/#client-applica</span><span class="invisible">tion-packet/annotated</span></a><br> <a href="https://tech.lgbt/tags/protocol" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>protocol</span></a> <a href="https://tech.lgbt/tags/http3" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>http3</span></a> <a href="https://tech.lgbt/tags/tcpip" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tcpip</span></a> <a href="https://tech.lgbt/tags/quic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>quic</span></a> <a href="https://tech.lgbt/tags/udp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>udp</span></a> <a href="https://tech.lgbt/tags/ssl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssl</span></a> #+</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://rubber.social/@dragonarchitect" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>dragonarchitect</span></a></span> <span class="h-card" translate="no"><a href="https://mstdn.social/@DeltaWye" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>DeltaWye</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> But yeah, to offer even simpler <a href="https://rubber.social/@dragonarchitect/112934155131696885" rel="nofollow noopener noreferrer" target="_blank">analogies</a> for and <em>"<a href="https://infosec.space/tags/TechIlliterates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechIlliterates</span></a>"</em>: </p> <p>Consider your Internet connection like driveways or drive-in with in-going (download) and outgoiung (upload) connections.</p><p>The wider (faster) the lane (bandwith) the bigger and heavier vehicles can drive in faster to reach the loading bay (device).</p><p>And data doesn't get mixed up because every data packet - like a real life package - has it's own shipping label that enshures your router and any device using the same internet connection knows this if from/to said device and even application.</p><p>All one can do is make things slow down due to parallel use - just like when multiple delivery companies arrive at the same house or even same person and they've to stand in line delivering their packages: The Amazon package won't <em>fuse together</em> with the eBay package or Newegg package... They all are comparmentalized to the point that like with an Apartment complex, the tennant on the top floor won't even know that someone rang the bell at the 2nd floor and now someone's getting a fridge delivered: They may only see the "slowdown" in that the delivery will likely occupy the elevator or staircase for a few mins <em>if</em> they happen to use them at the same time.</p><p>It's like a set of escalators with asymetric speeds being more escalators down (load) than up (load): Worst-case people stand in line to get on the stairs or wheelchair users wait in line for the elevator...</p><p>And TCP/IP even has automatic measures in place to enshure packages arrive at their desination intact and complete, and if in doubt will resend a package upon request.</p><p>That's why even *unstable and slow+ internet connections just feel slower, not broken unless they loose the majority of packages.</p><p>Which is my <a href="https://infosec.space/@kkarhan/112934304628230438" rel="nofollow noopener noreferrer" target="_blank">mobile networks tend to throttle customers</a> not by negotiating a slower bandwith but merely dropping <em>"excess packets"</em> and <a href="https://en.wikipedia.org/wiki/TCP_congestion_control" rel="nofollow noopener noreferrer" target="_blank">avoid congestion</a> down to literal <a href="https://en.wikipedia.org/wiki/TCP_congestion_control#Slow_start" rel="nofollow noopener noreferrer" target="_blank">traffic managment</a>...</p><p>So yeah, <a href="https://infosec.space/tags/TCPIP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TCPIP</span></a> is very rugged and stable and designed to handle said speed issues just fine - kinda like a small residential road will merely experience a slowdown when a big truck parks on the roadside to unload a ton of furniture for a move-in: It doesn't result in the bypassers having chairs loged into their widscreens or their passengers end up inside the boxtruck, and unlike the real-life analogy they can't even purposefully attempt that.</p><p>In fact, most CPEs aka. "Routers" offered by ISPs do even go so far as to prioritize traffic and prevent a single device from occupying all the bandwith, going as far as to actively reduce lower-priority traffic bandwith in favour of VoIP and IPTV streaming: Kinda like intelligent traffic lights or a traffic warden / traffic police officer will deliberately slow down if not stop traffic to let emergency vehicles with lights and sirens pass through...</p><p>And that all happens transparently in the background: Just like any postal / parcel delivery service will automatically prioritize express / overnight / airmail deliveries and expedite them over regular shipments.</p> <p>Feel free to pick whatever feels the most appropriate analogy, because the Internet isn't like domestic water piping where one shared heater can result in someone flushing the toilet causing the sower to get hot, but instead only reduce the output of water at the showerhead.</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://rubber.social/@dragonarchitect" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>dragonarchitect</span></a></span> <span class="h-card" translate="no"><a href="https://mstdn.social/@DeltaWye" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>DeltaWye</span></a></span> this also is the advantage of <a href="https://infosec.space/tags/TCPIP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TCPIP</span></a>: Only the <a href="https://infosec.space/tags/endpoints" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>endpoints</span></a> need to be able to reach each other: All the complicated <a href="https://infosec.space/tags/Routing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Routing</span></a> is transparent and thus changing routes don't result in lost connections.</p><ul><li>You can see this with <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> / <a href="https://infosec.space/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a> traffic using <a href="https://infosec.space/tags/webtunnel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webtunnel</span></a> <a href="https://infosec.space/tags/bridges" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bridges</span></a>: It smoothly shifts between <a href="https://infosec.space/tags/WiFi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WiFi</span></a> &amp; <a href="https://infosec.space/tags/WWAN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WWAN</span></a> and back...</li></ul>
Peter N. M. Hansteen<p>Friends, I have a problem with the ISP that operates the fiber line to our house. </p><p>Pretty much every time they need to reconfigure their CGNAT they for some reason kill IPv6 and our autoconfig'd gear end up with "Unique Local" (fc/7) addresses. </p><p>Is this a common problem, seen elsewhere? </p><p>I suspect Cisco gear but have no way to check. </p><p><a href="https://mastodon.social/tags/ipv6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipv6</span></a> <a href="https://mastodon.social/tags/ula" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ula</span></a> <a href="https://mastodon.social/tags/internet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>internet</span></a> <a href="https://mastodon.social/tags/tcpip" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tcpip</span></a> <a href="https://mastodon.social/tags/cgnat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cgnat</span></a></p>
Peter N. M. Hansteen<p>Enable local-to-anchors tables in PF rules <a href="https://www.undeadly.org/cgi?action=article;sid=20240714154257" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">undeadly.org/cgi?action=articl</span><span class="invisible">e;sid=20240714154257</span></a> <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/pf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pf</span></a> <a href="https://mastodon.social/tags/packetfilter" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>packetfilter</span></a> <a href="https://mastodon.social/tags/anchors" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>anchors</span></a> <a href="https://mastodon.social/tags/tables" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tables</span></a> <a href="https://mastodon.social/tags/tcpip" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tcpip</span></a> <a href="https://mastodon.social/tags/filtering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>filtering</span></a> <a href="https://mastodon.social/tags/networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networking</span></a></p>
:mastodon: Mike Amundsen<p>50 Years Later, Vint Cerf and Bob Kahn Remember the Birth of TCP/IP</p><p><a href="https://thenewstack.io/50-years-later-vint-cerf-and-bob-kahn-remember-the-birth-of-tcp-ip/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thenewstack.io/50-years-later-</span><span class="invisible">vint-cerf-and-bob-kahn-remember-the-birth-of-tcp-ip/</span></a></p><p>"Kahn had a communications perspective, Cerf came with a computing perspective, and together they worked on connecting diverse computing networks — up to 256 of them." -- <a href="https://mastodon.social/tags/DavidCassel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DavidCassel</span></a></p><p><a href="https://mastodon.social/tags/tcpIP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tcpIP</span></a> <a href="https://mastodon.social/tags/computingHistory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>computingHistory</span></a> <a href="https://mastodon.social/tags/internet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>internet</span></a></p>