Re: Strange traceroute result to VM in EC2, Singapore
Traceroute on Linux/Unix boxes is generally using UDP by default. Try using ICMP, by adding the -I (capital i) option to traceroute: traceroute -I 52.74.124.136 On Fri, Aug 7, 2015 at 2:05 AM, Glen Kent wrote: > I find this bizzare because even when the traceroute doesnt work, I am > actually able to ping and access the machine. > > I know that the VM responds to traceroutes, since it did respond to my > traceroute when i was on the other broadband network. > > So i really fail to understand why the traceroute on the other network > failed. > > Any pointers on this would be very helpful. > > Thanks, GLen > > On Thu, Aug 6, 2015 at 8:53 PM, Glen Kent wrote: > >> Really sorry. Didnt realize that this is a text-only forum. >> >> When my traceroute to 52.74.124.136 works: >> >> ~$ traceroute 52.74.124.136 >> traceroute to 52.74.124.136 (52.74.124.136), 30 hops max, 60 byte packets >> 1 xxx xxx 0.412 ms 0.472 ms 0.439 ms >> 2 xxx xxx 2.98 ms 2.971 ms 2.999 ms >> 3 xxx xxx 5.345 ms 5.546 ms 5.519 ms >> 4 xxx xxx 3.172 ms 3.051 ms 3.010 ms >> 5 if-6-2.tcore2.SVW-Singapore.as6543.net (180.87.37.14) 56.751 ms 56.285 >> ms 54.592 ms >> 6 180.87.15.206 (180.87.15.206) 73.468ms 66.993 ms 66.734 ms >> 7 203.83.223.58 (203.83.223.58) 43.737 ms 43.513 ms 44.029 ms >> 8 203.83.223.15 (203.83.223.15) 47.239 ms 46.382 ms 203.83.223.74 >> (203.83.223.74) 44.144 ms >> 9 203.83.223.231 (203.83.223.231) 44.431 ms 203.83.223.233 >> (203.83.223.233) 45.699 ms 46.158 ms >> 10 ec2-52-74-124-136.ap-southeast-1.compute.amazon.com (52.74.124.136) >> 44.067 ms 43.492 ms 43.499 ms >> >> When it doesnt: >> >> ~$ traceroute 52.74.124.136 >> traceroute to 52.74.124.136 (52.74.124.136), 30 hops max, 60 byte packets >> 1 xxx xxx 23.272 ms 25.011 ms 26.072 ms >> 2 xxx xxx 27.058 ms 28.971 ms 29.999 ms >> 3 xxx xxx 33.025 ms 33.996 ms 38.822 ms >> 4 p38895.sgw.equinix.com (202.79.197.87) 78.964 ms 60.051 ms 83.010 ms >> 5 203.83.223.4 (203.83.223.4) 63.682 ms 64.610 ms 65.837 ms >> 6 203.83.223.17 (203.83.223.17) 67.271 ms 203.83.223.23 (203.83.223.23) >> 68.521 ms 203.83.223.17 (203.83.223.17) 70.526 ms >> 7 203.83.223.233 (203.83.223.233) 71.624 ms 72.805 ms 74.471 ms >> 8 * * * >> 9 * * * >> 10 * * * >> 11 * * * >> 12 * * * >> 13 * * * >> 14 * * * >> 15 * * * >> 16 * * * >> 17 * * * >> 18 * * * >> 19 * * * >> 20 * * * >> 21 * * * >> 22 * * * >> 23 * * * >> 24 * * * >> 25 * * * >> 26 * * * >> 27 * * * >> 28 * * * >> 29 * * * >> 30 * * * >> >>
Re: Super Core Hardware suggestions
Alcatel lucent 7750 Thank You Bob Evans CTO > Hey All > > We are looking for suggestions for a device to act as a super Core Device > / MPLS P router only. > There seems to be plenty of Chassis based solutions out there that also > cater for a lot more. > We ideally would like a 1RU or 2RU device - Handling MPLS / IGP only > > * Ideally 16 to 48 ports of 10Gig - SFP > > * Non-blocking line rate capable on all ports. > > * MPLS / OSPF /BFD / ISIS / RSVP-TE capably. > > * Deep buffers on the ports would also be nice > > * With a possible option of 40Gig uplinks.. > > Thanks >
Re: Super Core Hardware suggestions
The Juniper PTX1000 is worth a look. http://www.juniper.net/us/en/products-services/routing/ptx-series/ptx1000/ Regards, Tim Raphael > On 7 Aug 2015, at 10:10 am, Ben Cornish wrote: > > Hey All > > We are looking for suggestions for a device to act as a super Core Device / > MPLS P router only. > There seems to be plenty of Chassis based solutions out there that also cater > for a lot more. > We ideally would like a 1RU or 2RU device - Handling MPLS / IGP only > > * Ideally 16 to 48 ports of 10Gig - SFP > > * Non-blocking line rate capable on all ports. > > * MPLS / OSPF /BFD / ISIS / RSVP-TE capably. > > * Deep buffers on the ports would also be nice > > * With a possible option of 40Gig uplinks.. > > Thanks
Super Core Hardware suggestions
Hey All We are looking for suggestions for a device to act as a super Core Device / MPLS P router only. There seems to be plenty of Chassis based solutions out there that also cater for a lot more. We ideally would like a 1RU or 2RU device - Handling MPLS / IGP only * Ideally 16 to 48 ports of 10Gig - SFP * Non-blocking line rate capable on all ports. * MPLS / OSPF /BFD / ISIS / RSVP-TE capably. * Deep buffers on the ports would also be nice * With a possible option of 40Gig uplinks.. Thanks
BGP Update Report
BGP Update Report Interval: 30-Jul-15 -to- 06-Aug-15 (7 days) Observation Point: BGP Peering with AS131072 TOP 20 Unstable Origin AS Rank ASNUpds % Upds/PfxAS-Name 1 - AS38197 28 6.5% 251.0 -- SUNHK-DATA-AS-AP Sun Network (Hong Kong) Limited,HK 2 - AS9829 286617 6.5% 210.4 -- BSNL-NIB National Internet Backbone,IN 3 - AS16637 234574 5.3%2039.8 -- MTNNS-AS,ZA 4 - AS12091 131056 3.0%2730.3 -- MTNNS-AS,ZA 5 - AS22059 129571 2.9% 64785.5 -- -Reserved AS-,ZZ 6 - AS21669 123297 2.8% 123297.0 -- NJ-STATEWIDE-LIBRARY-NETWORK - New Jersey State Library,US 7 - AS11056 119768 2.7% 119768.0 -- BERGERMONTAGUE - Berger & Montague, P.C,US 8 - AS36947 85482 1.9%1055.3 -- ALGTEL-AS,DZ 9 - AS22773 67145 1.5% 177.2 -- ASN-CXA-ALL-CCI-22773-RDC - Cox Communications Inc.,US 10 - AS54169 59907 1.4% 19969.0 -- MGH-ION-1 - Marin General Hospital,US 11 - AS370953471 1.2%1980.4 -- NET-CITY-SA - City of San Antonio,US 12 - AS19429 38885 0.9% 31.6 -- ETB - Colombia,CO 13 - AS24560 38255 0.9% 33.6 -- AIRTELBROADBAND-AS-AP Bharti Airtel Ltd., Telemedia Services,IN 14 - AS754536399 0.8% 19.8 -- TPG-INTERNET-AP TPG Telecom Limited,AU 15 - AS25563 34264 0.8% 11421.3 -- WEBLAND-AS Webland AG,CH 16 - AS30295 32571 0.7% 10857.0 -- 2ICSYSTEMSINC - 2iC Systems Inc.,CA 17 - AS840229385 0.7% 99.3 -- CORBINA-AS OJSC "Vimpelcom",RU 18 - AS755225573 0.6% 23.1 -- VIETEL-AS-AP Viettel Corporation,VN 19 - AS56636 24024 0.5% 24024.0 -- ASVEDARU VEDA Ltd.,RU 20 - AS131090 23575 0.5%1178.8 -- CAT-IDC-4BYTENET-AS-AP CAT TELECOM Public Company Ltd,CAT ,TH TOP 20 Unstable Origin AS (Updates per announced prefix) Rank ASNUpds % Upds/PfxAS-Name 1 - AS21669 123297 2.8% 123297.0 -- NJ-STATEWIDE-LIBRARY-NETWORK - New Jersey State Library,US 2 - AS11056 119768 2.7% 119768.0 -- BERGERMONTAGUE - Berger & Montague, P.C,US 3 - AS22059 129571 2.9% 64785.5 -- -Reserved AS-,ZZ 4 - AS56636 24024 0.5% 24024.0 -- ASVEDARU VEDA Ltd.,RU 5 - AS54169 59907 1.4% 19969.0 -- MGH-ION-1 - Marin General Hospital,US 6 - AS25563 34264 0.8% 11421.3 -- WEBLAND-AS Webland AG,CH 7 - AS40493 10920 0.2% 10920.0 -- FACILITYSOURCEINC - FacilitySource,US 8 - AS30295 32571 0.7% 10857.0 -- 2ICSYSTEMSINC - 2iC Systems Inc.,CA 9 - AS3935889654 0.2%9654.0 -- MUBEA-FLO - Mubea,US 10 - AS31357 13591 0.3%6795.5 -- TOMICA-AS Tomsk Information and Consulting Agency,RU 11 - AS476806667 0.1%6667.0 -- NHCS EOBO Limited,IE 12 - AS375906061 0.1%6061.0 -- BCA-ASN,AO 13 - AS59943 22734 0.5%5683.5 -- RADAR-AS Radar LLC,RU 14 - AS1979143652 0.1%3652.0 -- STOCKHO-AS Stockho Hosting SARL,FR 15 - AS380006001 0.1%3000.5 -- CRISIL-AS [CRISIL Limited.Autonomous System],IN 16 - AS371218622 0.2%2874.0 -- ARIVIAKOM,ZA 17 - AS65600 19751 0.5%2821.6 -- 18 - AS12091 131056 3.0%2730.3 -- MTNNS-AS,ZA 19 - AS316682401 0.1%2401.0 -- RAPPAPORT EDV-Dienstleistungen Rappaport GmbH & Co KG,AT 20 - AS1967424288 0.1%2144.0 -- EKRAN-AS CJSC "Ekran",RU TOP 20 Unstable Prefixes Rank Prefix Upds % Origin AS -- AS Name 1 - 209.212.8.0/24 123297 2.6% AS21669 -- NJ-STATEWIDE-LIBRARY-NETWORK - New Jersey State Library,US 2 - 50.202.59.0/24 119768 2.5% AS11056 -- BERGERMONTAGUE - Berger & Montague, P.C,US 3 - 105.96.0.0/22 84282 1.8% AS36947 -- ALGTEL-AS,DZ 4 - 64.34.125.0/2465170 1.4% AS22059 -- -Reserved AS-,ZZ 5 - 76.191.107.0/24 64401 1.4% AS22059 -- -Reserved AS-,ZZ 6 - 204.80.242.0/24 59901 1.3% AS54169 -- MGH-ION-1 - Marin General Hospital,US 7 - 185.65.148.0/24 28066 0.6% AS197068 -- QRATOR HLL LLC,RU AS59943 -- RADAR-AS Radar LLC,RU 8 - 195.128.159.0/24 24024 0.5% AS56636 -- ASVEDARU VEDA Ltd.,RU 9 - 61.7.155.0/24 23422 0.5% AS131090 -- CAT-IDC-4BYTENET-AS-AP CAT TELECOM Public Company Ltd,CAT ,TH 10 - 78.140.0.0/18 13589 0.3% AS31357 -- TOMICA-AS Tomsk Information and Consulting Agency,RU 11 - 92.43.216.0/2111894 0.2% AS25563 -- WEBLAND-AS Webland AG,CH 12 - 178.174.96.0/19 11482 0.2% AS25563 -- WEBLAND-AS Webland AG,CH 13 - 199.60.236.0/24 11286 0.2% AS30295 -- 2ICSYSTEMSINC - 2iC Systems Inc.,CA 14 - 130.44.210.0/24 11222 0.2% AS22773 -- ASN-CXA-ALL-CCI-22773-RDC - Cox Communications Inc.,US 15 - 130.44.194.0/24 10985 0.2% AS22773 -- ASN-CXA-ALL-CCI-22773-RDC - Cox Communications Inc.,US 16 - 130.44.10.
The Cidr Report
This report has been generated at Fri Aug 7 21:14:53 2015 AEST. The report analyses the BGP Routing Table of AS2.0 router and generates a report on aggregation potential within the table. Check http://www.cidr-report.org/2.0 for a current version of this report. Recent Table History Date PrefixesCIDR Agg 31-07-15561435 308644 01-08-15561684 308740 02-08-15561746 308892 03-08-15562091 308517 04-08-15561867 308741 05-08-15562055 308891 06-08-15562130 308225 07-08-15560808 308901 AS Summary 51374 Number of ASes in routing system 20389 Number of ASes announcing only one prefix 3347 Largest number of prefixes announced by an AS AS10620: Telmex Colombia S.A.,CO 120757504 Largest address span announced by an AS (/32s) AS4134 : CHINANET-BACKBONE No.31,Jin-rong Street,CN Aggregation Summary The algorithm used in this report proposes aggregation only when there is a precise match using the AS path, so as to preserve traffic transit policies. Aggregation is also proposed across non-advertised address space ('holes'). --- 07Aug15 --- ASnumNetsNow NetsAggr NetGain % Gain Description Table 563102 308981 25412145.1% All ASes AS22773 3183 168 301594.7% ASN-CXA-ALL-CCI-22773-RDC - Cox Communications Inc.,US AS17974 2705 80 262597.0% TELKOMNET-AS2-AP PT Telekomunikasi Indonesia,ID AS39891 2473 35 243898.6% ALJAWWALSTC-AS Saudi Telecom Company JSC,SA AS28573 2303 118 218594.9% NET Serviços de Comunicação S.A.,BR AS6389 2734 709 202574.1% BELLSOUTH-NET-BLK - BellSouth.net Inc.,US AS9394 2285 318 196786.1% CTTNET China TieTong Telecommunications Corporation,CN AS3356 2564 630 193475.4% LEVEL3 - Level 3 Communications, Inc.,US AS7545 2730 995 173563.6% TPG-INTERNET-AP TPG Telecom Limited,AU AS10620 3347 1691 165649.5% Telmex Colombia S.A.,CO AS4766 2991 1448 154351.6% KIXS-AS-KR Korea Telecom,KR AS9808 1587 65 152295.9% CMNET-GD Guangdong Mobile Communication Co.Ltd.,CN AS6983 1752 248 150485.8% ITCDELTA - Earthlink, Inc.,US AS20115 1873 419 145477.6% CHARTER-NET-HKY-NC - Charter Communications,US AS4755 2027 706 132165.2% TATACOMM-AS TATA Communications formerly VSNL is Leading ISP,IN AS9498 1370 114 125691.7% BBIL-AP BHARTI Airtel Ltd.,IN AS4323 1602 416 118674.0% TWTC - tw telecom holdings, inc.,US AS18566 2073 903 117056.4% MEGAPATH5-US - MegaPath Corporation,US AS6147 1388 281 110779.8% Telefonica del Peru S.A.A.,PE AS7303 1603 526 107767.2% Telecom Argentina S.A.,AR AS22561 1374 311 106377.4% CENTURYLINK-LEGACY-LIGHTCORE - CenturyTel Internet Holdings, Inc.,US AS4808 1537 509 102866.9% CHINA169-BJ CNCGROUP IP network China169 Beijing Province Network,CN AS7552 1135 140 99587.7% VIETEL-AS-AP Viettel Corporation,VN AS26615 1105 150 95586.4% Tim Celular S.A.,BR AS8151 1686 732 95456.6% Uninet S.A. de C.V.,MX AS7738 995 75 92092.5% Telemar Norte Leste S.A.,BR AS8402 921 21 90097.7% CORBINA-AS OJSC "Vimpelcom",RU AS6849 1206 318 88873.6% UKRTELNET JSC UKRTELECOM,UA AS38285 977 130 84786.7% M2TELECOMMUNICATIONS-AU M2 Telecommunications Group Ltd,AU AS8551 1191 350 84170.6% BEZEQ-INTERNATIONAL-AS Bezeq International-Ltd,IL AS55430 857
Re: A simple perl script to convert Cisco IOS configuration to HTML with internal links for easier comprehension
CSS? Tests? Ha ha ha ha ha This is quick and dirty. That being said, I'd love to see some tests for it, more advanced HTML output, and also make it a module suitable for using as the back-end of a web page. I just wanted to get something basic working for my original purposes. As for disorganized: what you're seeing in that repository is a bunch of separate small utilities, it's not all for this one script. This particular script was split out into 4 separate files so the regexes are separate from the actual code, otherwise it was a bit too much. Check it out on your configs and let me know what you think -Jesse On 08/07/2015 12:15 PM, Robert Drake wrote: I was going to look at this because it sounded interesting. Maybe some extra things it could do would be to set div/classes in some parts of the config to denote what it is so that the user could apply css to style it. That would allow user-defined color syntax highlighting of a sort. Another nice thing would be collapsible sections so if you're only interested in BGP you can skip interfaces, or if you want to look at route-maps, access-lists, etc. The project looks a bit disorganized, but I only took a quick glance at it so perhaps it does everything exactly as you intend. Are you thinking of making any of it into modules, or defining tests? I like the idea of running this as part of a post-rancid process, but it might also be nice if it was a module that could be run in real-time on a config. Then I could have a mojo wrapper daemon that called it when users accessed /configs/*-confg, or whatever and returned the parsed version. Anyway, I don't want to create any more work for you, I just wanted to kick out some ideas. If I have time I will contribute what I can, but I'm already neck deep in some random projects. I don't mind starting another one, but I don't want to say I'm doing something and then never deliver. :)
Weekly Routing Table Report
This is an automated weekly mailing describing the state of the Internet Routing Table as seen from APNIC's router in Japan. The posting is sent to APOPS, NANOG, AfNOG, AusNOG, SANOG, PacNOG, CaribNOG and the RIPE Routing Working Group. Daily listings are sent to bgp-st...@lists.apnic.net For historical data, please see http://thyme.rand.apnic.net. If you have any comments please contact Philip Smith . Routing Table Report 04:00 +10GMT Sat 08 Aug, 2015 Report Website: http://thyme.rand.apnic.net Detailed Analysis: http://thyme.rand.apnic.net/current/ Analysis Summary BGP routing table entries examined: 554366 Prefixes after maximum aggregation (per Origin AS): 209671 Deaggregation factor: 2.64 Unique aggregates announced (without unneeded subnets): 270945 Total ASes present in the Internet Routing Table: 51105 Prefixes per ASN: 10.85 Origin-only ASes present in the Internet Routing Table: 36680 Origin ASes announcing only one prefix: 16160 Transit ASes present in the Internet Routing Table:6359 Transit-only ASes present in the Internet Routing Table:173 Average AS path length visible in the Internet Routing Table: 4.5 Max AS path length visible: 45 Max AS path prepend of ASN ( 55644) 41 Prefixes from unregistered ASNs in the Routing Table: 1200 Unregistered ASNs in the Routing Table: 434 Number of 32-bit ASNs allocated by the RIRs: 10499 Number of 32-bit ASNs visible in the Routing Table:8066 Prefixes from 32-bit ASNs in the Routing Table: 29903 Number of bogon 32-bit ASNs visible in the Routing Table:16 Special use prefixes present in the Routing Table:1 Prefixes being announced from unallocated address space:417 Number of addresses announced to Internet: 2791482880 Equivalent to 166 /8s, 98 /16s and 166 /24s Percentage of available address space announced: 75.4 Percentage of allocated address space announced: 75.4 Percentage of available address space allocated: 100.0 Percentage of address space in use by end-sites: 97.6 Total number of prefixes smaller than registry allocations: 185457 APNIC Region Analysis Summary - Prefixes being announced by APNIC Region ASes: 137012 Total APNIC prefixes after maximum aggregation: 39879 APNIC Deaggregation factor:3.44 Prefixes being announced from the APNIC address blocks: 144078 Unique aggregates announced from the APNIC address blocks:58813 APNIC Region origin ASes present in the Internet Routing Table:5080 APNIC Prefixes per ASN: 28.36 APNIC Region origin ASes announcing only one prefix: 1192 APNIC Region transit ASes present in the Internet Routing Table:883 Average APNIC Region AS path length visible:4.5 Max APNIC Region AS path length visible: 45 Number of APNIC region 32-bit ASNs visible in the Routing Table: 1583 Number of APNIC addresses announced to Internet: 750929984 Equivalent to 44 /8s, 194 /16s and 72 /24s Percentage of available APNIC address space announced: 87.8 APNIC AS Blocks4608-4864, 7467-7722, 9216-10239, 17408-18431 (pre-ERX allocations) 23552-24575, 37888-38911, 45056-46079, 55296-56319, 58368-59391, 63488-64098, 131072-135580 APNIC Address Blocks 1/8, 14/8, 27/8, 36/8, 39/8, 42/8, 43/8, 49/8, 58/8, 59/8, 60/8, 61/8, 101/8, 103/8, 106/8, 110/8, 111/8, 112/8, 113/8, 114/8, 115/8, 116/8, 117/8, 118/8, 119/8, 120/8, 121/8, 122/8, 123/8, 124/8, 125/8, 126/8, 133/8, 150/8, 153/8, 163/8, 171/8, 175/8, 180/8, 182/8, 183/8, 202/8, 203/8, 210/8, 211/8, 218/8, 219/8, 220/8, 221/8, 222/8, 223/8, ARIN Region Analysis Summary Prefixes being announced by ARIN Region ASes:179763 Total ARIN prefixes after maximum aggregation:88015 ARIN Deaggregation factor: 2.04 Prefixes being announced from the ARIN address blocks: 182518 Unique aggregates announced from the ARIN address blocks: 85471 ARIN Region origin ASes present in the Internet Routing Table:16589 ARIN Prefixes per ASN:
Re: A simple perl script to convert Cisco IOS configuration to HTML with internal links for easier comprehension
I was going to look at this because it sounded interesting. Maybe some extra things it could do would be to set div/classes in some parts of the config to denote what it is so that the user could apply css to style it. That would allow user-defined color syntax highlighting of a sort. Another nice thing would be collapsible sections so if you're only interested in BGP you can skip interfaces, or if you want to look at route-maps, access-lists, etc. The project looks a bit disorganized, but I only took a quick glance at it so perhaps it does everything exactly as you intend. Are you thinking of making any of it into modules, or defining tests? I like the idea of running this as part of a post-rancid process, but it might also be nice if it was a module that could be run in real-time on a config. Then I could have a mojo wrapper daemon that called it when users accessed /configs/*-confg, or whatever and returned the parsed version. Anyway, I don't want to create any more work for you, I just wanted to kick out some ideas. If I have time I will contribute what I can, but I'm already neck deep in some random projects. I don't mind starting another one, but I don't want to say I'm doing something and then never deliver. :)
Re: Yet Another BGP (Border Gateway Protocol) Python Implementation
Nice! On Friday, August 7, 2015, Alistair Mackenzie wrote: > "As our priority, we will do MPLS VPN, IPv6, *Flowspec* firstly. In the > future, we will consider multicast and EVPN. > Thanks." > > On 7 August 2015 at 10:05, Pavel Odintsov > wrote: > >> Hi! >> >> Thanks for your code! I have used ExaBGP for one year and will try your >> tool too! >> >> Do you have any plans about BGP Flow Spec? >> >> On Friday, August 7, 2015, Bjørn Mork > > wrote: >> >> > Randy Bush > > writes: >> > >> > > perhaps dissing someone for their free code is even ruder than not >> doing >> > > ipv6 in 2015? you don't have to use either. >> > >> > Definitely. In any case, one advantage of open sourcing stuff is that >> > you can always answer such comments with a simple >> > >> > "Patches welcome!" >> > >> > which tends to silence critics :-) >> > >> > >> > Bjørn >> > >> >> >> -- >> Sincerely yours, Pavel Odintsov >> > > -- Sincerely yours, Pavel Odintsov
Re: Yet Another BGP (Border Gateway Protocol) Python Implementation
"As our priority, we will do MPLS VPN, IPv6, *Flowspec* firstly. In the future, we will consider multicast and EVPN. Thanks." On 7 August 2015 at 10:05, Pavel Odintsov wrote: > Hi! > > Thanks for your code! I have used ExaBGP for one year and will try your > tool too! > > Do you have any plans about BGP Flow Spec? > > On Friday, August 7, 2015, Bjørn Mork wrote: > > > Randy Bush > writes: > > > > > perhaps dissing someone for their free code is even ruder than not > doing > > > ipv6 in 2015? you don't have to use either. > > > > Definitely. In any case, one advantage of open sourcing stuff is that > > you can always answer such comments with a simple > > > > "Patches welcome!" > > > > which tends to silence critics :-) > > > > > > Bjørn > > > > > -- > Sincerely yours, Pavel Odintsov >
Re: Yet Another BGP (Border Gateway Protocol) Python Implementation
Hi! Thanks for your code! I have used ExaBGP for one year and will try your tool too! Do you have any plans about BGP Flow Spec? On Friday, August 7, 2015, Bjørn Mork wrote: > Randy Bush > writes: > > > perhaps dissing someone for their free code is even ruder than not doing > > ipv6 in 2015? you don't have to use either. > > Definitely. In any case, one advantage of open sourcing stuff is that > you can always answer such comments with a simple > > "Patches welcome!" > > which tends to silence critics :-) > > > Bjørn > -- Sincerely yours, Pavel Odintsov
Re: Yet Another BGP (Border Gateway Protocol) Python Implementation
Randy Bush writes: > perhaps dissing someone for their free code is even ruder than not doing > ipv6 in 2015? you don't have to use either. Definitely. In any case, one advantage of open sourcing stuff is that you can always answer such comments with a simple "Patches welcome!" which tends to silence critics :-) Bjørn