|Description||An internet exchange point. Kinda.|
|Self-organized Sessions||create self-organized session|
|Subvillage of||Dragon Sleep Pwn Sector|
|Tags||bgp, wtf, ixp|
|Location for self-organized sessions||No|
bgp.wtf will be present at CCCamp2019. As part of our mission to do weird useless shit with networks, we'll be setting up an exclusive, one-in-a-kind (kinda - yes Benjojo, we know about EMF-IX!) four day Internet Exchange Programme^WPoint.
- 1 What is it?
- 2 Where is it?
- 3 Status
- 4 How do I join?
What is it?
An Internet Exchange Point is a place where Internet Service Providers exchange traffic. If you're an ISP (have an AS), join us! If you're not one yet, come by and say hi!
Where is it?
We're part of Dragon Sleep Pwn Sector. Look for the network equipment next to the bar.
Not there yet. Next change: August 18th.
Action items for member ASs: configure your IRR and RPKI entries as per the guide below. Make sure you have a PeeringDB account, but don't join the IXP yet!
Add yourself! Especially if you want to colo some equipment or need a switch port.
|AS204480 / q3k||Routeservers, switches, automation.|
|AS206924 / Benjojo||Some orange Pis, Cursed ethernet speaking hardware|
|AS208707 / jof||EX-2200C. Maybe Fitlet PC. I would like to peer over the Datenklo/participant network and run my AS in my tent.|
|AS209673 / Sammy8806||Probably Raspberries or so. Would probably also like to peer from my tent.|
|AS203478 / Manawyrm||1x Raspberry Pi 4, needs 1 Schuko power outlet and 1Gbase-T ethernet. Colocation would be nice, peering via Datenklo also possible.|
|AS396507 / W||Mac Mini. Ok with either Colo or Datenklo.|
|??? / need||A procurve switch for cutting limes.|
|??? / need||A power-efficient SFP+ switch for more ports.|
How do I join?
The three things to bring to Camp are:
- A BGP router. BIRD is fine. We use 32-bit ASNs, so keep your antiques at home.
- An AS you control. We currently have automation to support RIPE and ARIN ASs out-of-the-box, but if you are from another RIR, we'll arrange something as well.
- Some address space, v4 or v6. Someone can probably lease you some v6 off hand if you need that.
Keep in mind, that while you're more than welcome to join us electronically, our tent is not super huge - so you might have to squeeze in to fit if you wanna hang out for longer.
Once you're at Camp, you'll then have to reach our IXP. There's a few possibilities.
Connecting via c3noc / a datenklo
Run a dedicated 1GBase-T ethernet cable from your tent/village to your nearest datenklo, following standard operating procedures. Connect the other end to your router directly. Tell c3noc the MAC address of the interface on your router and that you want to be in the IXP Peering LAN (VLAN 3513). The port on the switch you connected two will be then configured to be part of the Peering LAN.
You can probably also get higher port speeds - ask c3noc.
Connecting to our PoP directly
You can also run fibre directly to our Tent^WPoint of Presence. We have a handful of SFP+ ports available. Bring your own optics and fibre, and run your fibre safely. When in doubt, coordinate with camp orga.
Colocate hardware at our PoP
If you have rackable equipment, we might have a few rack units available. Come and ask!
After you successfully connect to the Peering LAN, come to us and tell us what MAC address your router has. We will then serve you an IPv4 (in 22.214.171.124/24) and IPv6 (in 2a0d:eb02:4242:4242::/64) address via DHCP. There might or might not be Internet connectivity from this network :).
Joining the Exchange
First, join the PeeringDB IXP with your Network/ASN. Be sure to specify the IP addresses you got. Please don't join if you're not physically connected yet!
Second, please set up the following IRR entries in your
export: to AS208521 announce AS<your-as>
import: from AS208521 accept AS-CCCAMP19-IX
remarks: CCCAMP19-IX PGP: DEAD BEEF CAFE DEAD BEEF DEAD BEEF CAFE DEAD BEEF, with the key pointing to a PGP key that you can decrypt messages for, available on SKS keyservers. Spaces between hex bytes, and hex byte capitalization are ignored.
To get the PGP fingerprint:
$ gpg --fingerprint DEADBEEF # your short PGP fingerprint
Third, please set up valid RPKI entries for the prefixes you will be announcing.
You can check the status of your setup on
TODO(q3k): actually write this automation.
Connecting to the Route Servers
Getting upstream connectivity