Post AwKOJd6rnVMjcJGIIi by zash@fosstodon.org
(DIR) More posts by zash@fosstodon.org
(DIR) Post #AwKAEroUItr4PfV3fE by bortzmeyer@mastodon.gougere.fr
2025-07-20T12:13:32Z
0 likes, 0 repeats
At the #IETF123 hackathon, it is now the presentation of the results, by the various groups. https://www.ietf.org/meeting/hackathons/123-hackathon/
(DIR) Post #AwKAuzQiNMqMCKSxFI by bortzmeyer@mastodon.gougere.fr
2025-07-20T12:21:09Z
0 likes, 0 repeats
I2ICF : something about controlling devices, such moving robots (but no demo, alas, just a video on YouTube).#IETF123
(DIR) Post #AwKBGPO93drWmvTec4 by bortzmeyer@mastodon.gougere.fr
2025-07-20T12:25:00Z
0 likes, 0 repeats
NASR : a network that can follow certain policy rules such as "must take this path", "must use PQ encryption", "must use a vetted operator", etc.#IETF123
(DIR) Post #AwKBbGVdGX85KZvOIS by bortzmeyer@mastodon.gougere.fr
2025-07-20T12:28:47Z
0 likes, 0 repeats
Mouseworld: creating a twin network (for testing/evaluation) from the formal description of an actual network.Like many modern projects, se a lot of stuff (GraphDB, Camel, Chimera, Kubernetes, OpenStack...)#IETF123
(DIR) Post #AwKBiqteNPbiDAmCzA by bortzmeyer@mastodon.gougere.fr
2025-07-20T12:30:08Z
0 likes, 0 repeats
On a slide:"Source: trust me"#ReferenceNeeded#IETF123
(DIR) Post #AwKCfDJdBI8qXSl2mm by bortzmeyer@mastodon.gougere.fr
2025-07-20T12:40:41Z
0 likes, 0 repeats
ILNP (location/identifier separation protocol) :Performance tests between IETF in Madrid and the author's home, when the connectivity changes. It works. (On FreeBSD.)#IETF123
(DIR) Post #AwKDSAG1L9b7F9PW1Q by bortzmeyer@mastodon.gougere.fr
2025-07-20T12:49:33Z
0 likes, 0 repeats
First hackathon for the SCONE project. Communication between applications and network elements to learn about ate-limiting and adjust. (With people from, among others, Tiktok and YouTube)#IETF123
(DIR) Post #AwKEL0msFe67ncvlGi by bortzmeyer@mastodon.gougere.fr
2025-07-20T12:59:27Z
0 likes, 0 repeats
A bit of AI at last. Hackathon work on AI agents (AI running free and wild on the Internet) security. (Only the first steps.)#IETF123
(DIR) Post #AwKFRjEU19OrKsbxjs by bortzmeyer@mastodon.gougere.fr
2025-07-20T13:11:52Z
0 likes, 0 repeats
Authenticating a Python scraper. (Two libraries, crawl4ai and scrapy). Adding a signature to the HTTP request send to the browser which will scrape.#IETF123
(DIR) Post #AwKGkSmDWZGdkrt4gi by bortzmeyer@mastodon.gougere.fr
2025-07-20T13:26:28Z
0 likes, 0 repeats
Homomorphic encryption, now, at the #IETF123 hackathon. Always black magic for me.
(DIR) Post #AwKHDfyZWqDN5cb0sK by bortzmeyer@mastodon.gougere.fr
2025-07-20T13:31:45Z
0 likes, 0 repeats
RPP, the future registry<->registrar protocol (after EPP). Because the cool kids no longer know XML and TCP (so, JSON and HTTPS everywhere).Most code during the hackathon was on RPP<->EPP proxies.#IETF123
(DIR) Post #AwKHXwYTb7ECIh3QDQ by bortzmeyer@mastodon.gougere.fr
2025-07-20T13:35:24Z
0 likes, 0 repeats
Demo of using an LLM to generate nginx rules from the description of a DoS….#AI #IETF123
(DIR) Post #AwKHqDs9wzBJDpydhA by bortzmeyer@mastodon.gougere.fr
2025-07-20T13:38:43Z
0 likes, 0 repeats
New authenticated encryption algorithm, HiAE, implemented at the hackathon. Code in C, Zig and Go. Performance measurements.#IETF123 [Note about Zig: it was also used in the RPP project.]
(DIR) Post #AwKI5RfMwprILXFkoq by bortzmeyer@mastodon.gougere.fr
2025-07-20T13:41:28Z
0 likes, 0 repeats
PacketScope, written in eBPF, for performance analysis of traffic.#IETF123
(DIR) Post #AwKIYFfSdZ8rX122vA by bortzmeyer@mastodon.gougere.fr
2025-07-20T13:46:37Z
0 likes, 0 repeats
"Manual enrollment of a huge swarm of tiny robots" This hackathon project looks a bit frightening.#IETF123
(DIR) Post #AwKIyuM7ywrRFjhRmS by bortzmeyer@mastodon.gougere.fr
2025-07-20T13:51:28Z
0 likes, 0 repeats
@neith https://github.com/Internet-Architecture-and-Security/PacketScope
(DIR) Post #AwKJdpkI1md4pLW4AK by bortzmeyer@mastodon.gougere.fr
2025-07-20T13:58:53Z
0 likes, 0 repeats
#DNS over #CoAP because you can always run X over Y at an IETF hackathon.#IETF123
(DIR) Post #AwKK7cQI7p5UCBMfvE by bortzmeyer@mastodon.gougere.fr
2025-07-20T14:04:16Z
0 likes, 0 repeats
"Selfie attack"? It really exists?#cryptography #IETF123
(DIR) Post #AwKKGSu0tMTTH3U9Ka by bituur_esztreym@pouet.chapril.org
2025-07-20T14:05:49Z
0 likes, 0 repeats
@bortzmeyer you mean, in a situation where 'Selfie' ain't the name of your dog?
(DIR) Post #AwKKWb3qKIWHD7m7UG by bortzmeyer@mastodon.gougere.fr
2025-07-20T14:08:47Z
0 likes, 0 repeats
Generating test code for protocols by a LLM reading the RFCs. Cool project. (Unlike what many people claim, AI can be useful.)#IETF123
(DIR) Post #AwKKt7s718D1LI1yee by bortzmeyer@mastodon.gougere.fr
2025-07-20T14:12:51Z
0 likes, 0 repeats
Post-quantum cryptography in X.509 (certificates). More and more code work.#IETF123
(DIR) Post #AwKL6qxAiSuCvPwXBo by lienrag@mastodon.tedomum.net
2025-07-20T14:15:17Z
0 likes, 0 repeats
@bortzmeyer C'est pas franchement caca, l'encryption PQ ?
(DIR) Post #AwKLD4cGpZXb2N8ICW by bortzmeyer@mastodon.gougere.fr
2025-07-20T14:16:28Z
0 likes, 0 repeats
Thread ( no relationship with Meta's Threads) is a mesh protocol for small things.Among the achievements at #IETF123 hackathon, a border router, and delegation of downloads to a machine which stays awake (50 % energy saving).
(DIR) Post #AwKMBo5ssJKHSUwbZY by bortzmeyer@mastodon.gougere.fr
2025-07-20T14:27:26Z
0 likes, 0 repeats
Misc. #DNS work at the #IETF123 hackathon.Implementation of poisonlicious in Unbound. Python code for generalized NOTIFY, DELEG Net::DNS and NS1, signaling of encryption abilities, etc.
(DIR) Post #AwKMjjBxbgki6KxeVs by bortzmeyer@mastodon.gougere.fr
2025-07-20T14:33:33Z
0 likes, 0 repeats
Plus post-quantum crypto. in #DNSSEC :BIND, NSD, Unbound, etc.#IETF123
(DIR) Post #AwKNFl3SDTzj94Ftyq by bortzmeyer@mastodon.gougere.fr
2025-07-20T14:39:19Z
0 likes, 0 repeats
The group GREEN works on the environment. Collecting and using data (while displaying a video to showcase its energy consumption).#IETF123
(DIR) Post #AwKOJd6rnVMjcJGIIi by zash@fosstodon.org
2025-07-20T14:51:13Z
0 likes, 0 repeats
@bortzmeyer /me cries in <xmpp/>
(DIR) Post #AwLsB4YxY8mNwDCJW4 by camille@mastodon.libre-entreprise.com
2025-07-21T08:00:33Z
0 likes, 0 repeats
@bortzmeyer 🤬
(DIR) Post #AwSj2UtSkD1hVvLM1Y by miri64@ohai.social
2025-07-24T15:21:05Z
0 likes, 0 repeats
@bortzmeyer How else would you do confidential DNS ~*~in space~*~ if not with DNS over CoAP over BP? 😜