Revision as of 00:34, 7 August 2019 by W (talk | contribs) (Members)

Description An internet exchange point. Kinda.
Members Q3k
Projects IXP
Self-organized Sessions create self-organized session
Subvillage of Dragon Sleep Pwn Sector
Tags bgp, wtf, ixp
Registered on
Location for self-organized sessions No will be present at CCCamp2019. As part of our mission to do weird useless shit with networks, we'll be setting up an exclusive, one-in-a-kind (kinda - yes Benjojo, we know about EMF-IX!) four day Internet Exchange Programme^WPoint.

What is it?

An Internet Exchange Point is a place where Internet Service Providers exchange traffic. If you're an ISP (have an AS), join us! If you're not one yet, come by and say hi!

Where is it?

We're part of Dragon Sleep Pwn Sector. Look for the network equipment next to the bar.


Not there yet. Next change: August 18th.

Action items for member ASs: configure your IRR and RPKI entries as per the guide below. Make sure you have a PeeringDB account, but don't join the IXP yet!


Add yourself! Especially if you want to colo some equipment or need a switch port.

Who Brings what
AS204480 / q3k Routeservers, switches, automation.
AS206924 / Benjojo Some orange Pis, Cursed ethernet speaking hardware
AS208707 / jof EX-2200C. Maybe Fitlet PC. I would like to peer over the Datenklo/participant network and run my AS in my tent.
AS209673 / Sammy8806 Probably Raspberries or so. Would probably also like to peer from my tent.
AS203478 / Manawyrm 1x Raspberry Pi 4, needs 1 Schuko power outlet and 1Gbase-T ethernet. Colocation would be nice, peering via Datenklo also possible.
AS396507 / W Mac Mini. Ok with either Colo or Datenklo.
??? / need A procurve switch for cutting limes.
??? / need A power-efficient SFP+ switch for more ports.

How do I join?

The three things to bring to Camp are:

  • A BGP router. BIRD is fine. We use 32-bit ASNs, so keep your antiques at home.
  • An AS you control. We currently have automation to support RIPE and ARIN ASs out-of-the-box, but if you are from another RIR, we'll arrange something as well.
  • Some address space, v4 or v6. Someone can probably lease you some v6 off hand if you need that.

Keep in mind, that while you're more than welcome to join us electronically, our tent is not super huge - so you might have to squeeze in to fit if you wanna hang out for longer.

Connecting L1/L2

Once you're at Camp, you'll then have to reach our IXP. There's a few possibilities.

Connecting via c3noc / a datenklo

Run a dedicated 1GBase-T ethernet cable from your tent/village to your nearest datenklo, following standard operating procedures. Connect the other end to your router directly. Tell c3noc the MAC address of the interface on your router and that you want to be in the IXP Peering LAN (VLAN 3513). The port on the switch you connected two will be then configured to be part of the Peering LAN.

You can probably also get higher port speeds - ask c3noc.

Connecting to our PoP directly

You can also run fibre directly to our Tent^WPoint of Presence. We have a handful of SFP+ ports available. Bring your own optics and fibre, and run your fibre safely. When in doubt, coordinate with camp orga.

Colocate hardware at our PoP

If you have rackable equipment, we might have a few rack units available. Come and ask!


After you successfully connect to the Peering LAN, come to us and tell us what MAC address your router has. We will then serve you an IPv4 (in and IPv6 (in 2a0d:eb02:4242:4242::/64) address via DHCP. There might or might not be Internet connectivity from this network :).

Joining the Exchange

First, join the PeeringDB IXP with your Network/ASN. Be sure to specify the IP addresses you got. Please don't join if you're not physically connected yet!

Second, please set up the following IRR entries in your aut-num:

  • export: to AS208521 announce AS<your-as>
  • import: from AS208521 accept AS-CCCAMP19-IX
  • remarks: CCCAMP19-IX PGP: DEAD BEEF CAFE DEAD BEEF DEAD BEEF CAFE DEAD BEEF, with the key pointing to a PGP key that you can decrypt messages for, available on SKS keyservers. Spaces between hex bytes, and hex byte capitalization are ignored.

To get the PGP fingerprint:

   $ gpg --fingerprint DEADBEEF # your short PGP fingerprint

Third, please set up valid RPKI entries for the prefixes you will be announcing.

You can check the status of your setup on TODO(q3k): actually write this automation.

Connecting to the Route Servers

 TODO(q3k): document

Getting upstream connectivity

 TODO(q3k): document