Hacker Newsnew | past | comments | ask | show | jobs | submit | bc569a80a344f9c's commentslogin

The shit people tell you about themselves for free, unprompted. It’s unreal.

That that doesn't break my heart? I guess my heart is just tougher than yours.

Kind of but not really.

The whole point of BGP is to influence your routing tables. This fundamentally makes very little sense to do when you have a bunch of routers whose routing policy you don't control between you and whoever you're speaking BGP to. eBGP is just TCP and supports knobs to run over multiple hops (so up to 255), but at that point you can't really do anything with the routing information you exchange because the moment you hand the traffic off, the other party can do with it how it pleases. Also, very few people have enough public IP addresses for this, and on the Internet you obviously can't route RFC1918 space. Therefore, you need tunnels, so that you can be one hop away even if the tunneled traffic is traversing the Internet, and so that you can reach peers that let you announce whatever IP space you want.

The other thing you can do, of course, is to just do the same thing internal to your lab. You can absolutely stand up multiple ASN at home. I'd even argue that if you really want to learn BGP, this is a great way to do it, especially if you use two different platforms (say, FRR on FreeBSD peering with a cheap Mikrotik running RouterOS). That way you learn the underlying protocol and not a specific implementation, which is something that is very hard to undo in junior network engineers that have only ever been exposed to one way of doing things.

That's different from some of the goals outlined in the article, but if your goal is to learn this stuff rather than have provider-independent IP space (which even for home labs isn't very valuable to most people), doing it all yourself works fine.


You can use who you're physically connected to. If you have a physical or point–to–point connection to iFog and Lagrange Cloud, you don't need tunnels to reach them. Both these companies offer VPS services.

If your goal is to learn this stuff join dn42, the global networking lab, instead of wasting money with real allocations.


Even if yawning in public affected sexual fitness: how long has it been socially impolite to yawn in public? Evolution takes a rather long time in species with long reproductive cycles. Almost all mammals yawn, it would take significant genetic changes to breed that out of us. That doesn't happen overnight.


400-500 years minimum (15-20 generations), although point taken


> it would be just nice to quickly change (or even better: have access to multiple at once!) networks.

Accessing multiple corporate networks simultaneously from the same endpoint violates all sorts of access policies. If it doesn’t, the access policy is lacking. Even for startups.

And no, unless you build it and enforce it from the start, no one ever succeeds in bolting on a reasonably security posture after implementing all their other processes no one will dare touch.


It's fine if all you need is a packet filter, but in 2026 I question that many production use cases can get away with just packet filter.

As a host firewall, it's obviously fine, I assume your question is about using pf as a network firewall. Given the threat landscape, you usually want threat protection. At the very least that means close-to-real-time updates from reputation lists. You can script that with pf, but it's not fun. Really, you want protocol dissection and - quite possibly - the ability to decrypt on the box and do payload analysis. Just doing packet filtering doesn't buy you all that much anymore these days, and anything production that requires compliance or that you genuinely care about should be behind what you might also call IPS or layer 7 firewall capabilities.

pf doesn't do any of that. You don't have to use Palo Alto or Cisco for this, either.

If all you need is packet filtering, it's a good option, though.


> almost all humans use computers but only 0.1% or so can program them.

This is nitpicking but I was curious: there are 4.4 million software developers in the US (https://www.griddynamics.com/blog/number-software-developers...). The population is 340 million, 0.1% would be 340,000. You’re off by over one order of magnitude.


there are 45 million devs in the world (out of which probably 10 can actually program) and 8.5 billion people

we could say 0.5%?


It’s misleading to use the entire world’s population. A very large proportion of that hasn’t ever had the opportunity to learn to write code.


https://clarkesworldmagazine.com/kim_02_24/

Why Don’t We Just Kill The Kid In The Omelas Hole by Isabel Kim. My favorite short story of 2024, and very much worth reading if you’re at all familiar with LeGuin’s original story.


Thank you for sharing this! Having just read it now, it's quite short (~5 minute read) and I also recommend it.


I haven’t read any of this work. Where would you start?


They’re both short stories, less than 10 minutes to read.

If you’d like to read novel length LeGuin, “The Left Hand Of Darkness” and “The Dispossessed” are excellent. Much of her most lauded work shares a universe, but each novel stands alone and doesn’t share relevant characters, let alone protagonists.

Edit: „The Ones Who Walk Away From Omelas“ can be read at https://shsdavisapes.pbworks.com/f/Omelas.pdf


That’s a great way of explaining why this was historically done.


> The previous diagram absolutely does not have positive and negative for each transaction!

But it does. The $500 transaction for furniture is an edge from the bank to the furniture asset account. This edge is outgoing from the bank account (-$500) and incoming to the furniture asset account (+$500). That’s it, that’s double entry bookkeeping. Each edge represents both entries.


It’s not _that_ different. Larger address space, more emphasis on multicast for some basic functions. If you understand those functions in IPv4, learning IPv6 is very straightforward. There’s some footguns once you get to enterprise scale deployments but that’s just as true of IPv4.


Lol! IPv4 uses zero multicast (I know, I know, technically there's multicast, but we all just understand broadcast). The parts of an IPv4 address and their meaning have almost no correlation to the parts of an IPv6 address and their meaning. Those are pretty fundamental differences.


IP addresses in both protocols are just a sequence of bits. Combined with a subnet mask (or prefix length, the more modern term for the same concept) they divide into a network portion and a host portion. The former tells you what network the host is on, the latter uniquely identifies the host on that network. This is exactly the same for both protocols.

Or what do you mean by “parts of an IPv4 address and their meaning”?

That multicast on IPv4 isn’t used as much is irrelevant. It functions the same way in both protocols.


IPv4 uses ARP which is just a half baked multicast. IPv6 is much better designed.


The biggest difference is often overlooked because it's not part of the packet format or anything: IPv4 /32s were not carried over to IPv6. If you owned 1.1.1.1 on ipv4, and you switch to ipv6, you get an entirely different address instead of 1.1.1.1::. Maaybe you get an ipv6-mapped-ipv4 ::ffff:1.1.1.1, but that's temporary and isn't divisible into like 1.1.1.1.2.

And then all the defaults about how basically everything works are different. Home router in v6 mode means no DHCP, no NAT, and hopefully yes firewall. In theory you can make it work a lot like v4, but by default it's not.


multicast has been dead for years


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: