mastodon.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
The original server operated by the Mastodon gGmbH non-profit

Administered by:

Server stats:

351K
active users

#rpki

0 posts0 participants0 posts today
Adrian Offerman<p>also available in English:<br>Adoption of RPKI/ROV security protocol progressing very quickly -- Next step is implementation of ASPA</p><p>Although RPKI/ROV is being adopted very quickly, it's still early days for the other two RPKI-based protocols. Anyone now running RPKI with ROV will be able to take the next step to ASPA in the next few years. Where BGPsec is concerned, it's a question of waiting for the next generation of routing systems.</p><p><a href="https://mastodon.offerman.com/tags/RPKI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RPKI</span></a> <a href="https://mastodon.offerman.com/tags/ASPA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ASPA</span></a> <a href="https://mastodon.offerman.com/tags/BGPsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BGPsec</span></a> <a href="https://mastodon.offerman.com/tags/BGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BGP</span></a> <a href="https://mastodon.offerman.com/tags/IPv6" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPv6</span></a> <a href="https://mastodon.offerman.com/tags/InternetSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InternetSecurity</span></a></p>
Adrian Offerman<p>op SIDN.nl:<br>RPKI/ROV-beveiligingsprotocol maakt razendsnelle adoptie door -- Volgende stap is implementatie van ASPA<br><a href="https://www.sidn.nl/nieuws-en-blogs/rpki-rov-beveiligingsprotocol-maakt-razendsnelle-adoptie-door" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">sidn.nl/nieuws-en-blogs/rpki-r</span><span class="invisible">ov-beveiligingsprotocol-maakt-razendsnelle-adoptie-door</span></a></p><p>Waar RPKI/ROV een heel snelle adoptie heeft doorgemaakt, is het voor de andere twee RPKI-gebaseerde protocollen nog net te vroeg. Wie nu RPKI met ROV heeft draaien, zal een dezer jaren de vervolgstap naar ASPA kunnen maken. Voor BGPsec is het wachten op de volgende generatie routersystemen.</p><p><a href="https://mastodon.offerman.com/tags/RPKI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RPKI</span></a> <a href="https://mastodon.offerman.com/tags/ASPA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ASPA</span></a> <a href="https://mastodon.offerman.com/tags/BGPsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BGPsec</span></a> <a href="https://mastodon.offerman.com/tags/BGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BGP</span></a> <a href="https://mastodon.offerman.com/tags/IPv6" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPv6</span></a> <a href="https://mastodon.offerman.com/tags/InternetSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InternetSecurity</span></a></p>
John Kristoff<p>Did you know chrony, the <a href="https://infosec.exchange/tags/NTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NTP</span></a> implementation, sets up an administrative listener on the loopback interface using UDP/323 by default?</p><p>Unfortunately in the <a href="https://infosec.exchange/tags/RPKI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RPKI</span></a> rpki-rtr has TCP/323 registered with IANA (see IETF RFC 6810). UDP/323 is reserved. Reserving a transport that is unused by the assigned application is common practice these days.</p><p>chrony's choice can probably be chalked up to a historical accident since it came first and presumably picked 323 because it "looked" like 123 and was then unassigned.</p><p>Chrony should probably change their default imo, but maybe it's too late or not worth it now?</p>
NLnet Labs<p>We are pleased to announce the latest release of Routinator, version 0.14.2 ‘Roll Initiative!’ This of our <a href="https://fosstodon.org/tags/RPKI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RPKI</span></a> validator fixes an issue in the bundled UI that caused it to retrieve data from our own test instance rather than the actual Routinator instance. Users of the bundled UI should upgrade. <a href="https://github.com/NLnetLabs/routinator/releases/tag/v0.14.2" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/NLnetLabs/routinato</span><span class="invisible">r/releases/tag/v0.14.2</span></a></p>
Solid Tech<p>Is Your Internet Service Provider (ISP) Secure? Test It Now!</p><p><a href="https://www.byteswifts.com/2025/02/is-your-isp-secure-test-it-now.html" target="_blank" rel="nofollow noopener" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">byteswifts.com/2025/02/is-your</span><span class="invisible">-isp-secure-test-it-now.html</span></a></p><p><a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="tag">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/ISP" class="mention hashtag" rel="tag">#<span>ISP</span></a> <a href="https://mastodon.social/tags/BGPHijacking" class="mention hashtag" rel="tag">#<span>BGPHijacking</span></a> <a href="https://mastodon.social/tags/DataProtection" class="mention hashtag" rel="tag">#<span>DataProtection</span></a> <a href="https://mastodon.social/tags/OnlineSecurity" class="mention hashtag" rel="tag">#<span>OnlineSecurity</span></a> <a href="https://mastodon.social/tags/TechNews" class="mention hashtag" rel="tag">#<span>TechNews</span></a> <a href="https://mastodon.social/tags/CyberThreats" class="mention hashtag" rel="tag">#<span>CyberThreats</span></a> <a href="https://mastodon.social/tags/InternetPrivacy" class="mention hashtag" rel="tag">#<span>InternetPrivacy</span></a> <a href="https://mastodon.social/tags/SecureInternet" class="mention hashtag" rel="tag">#<span>SecureInternet</span></a> <a href="https://mastodon.social/tags/NetworkSecurity" class="mention hashtag" rel="tag">#<span>NetworkSecurity</span></a> <a href="https://mastodon.social/tags/CyberAwareness" class="mention hashtag" rel="tag">#<span>CyberAwareness</span></a> <a href="https://mastodon.social/tags/Hacking" class="mention hashtag" rel="tag">#<span>Hacking</span></a> <a href="https://mastodon.social/tags/TechTips" class="mention hashtag" rel="tag">#<span>TechTips</span></a> <a href="https://mastodon.social/tags/Cloudflare" class="mention hashtag" rel="tag">#<span>Cloudflare</span></a> <a href="https://mastodon.social/tags/BGP" class="mention hashtag" rel="tag">#<span>BGP</span></a> <a href="https://mastodon.social/tags/RPKI" class="mention hashtag" rel="tag">#<span>RPKI</span></a> <a href="https://mastodon.social/tags/ITSecurity" class="mention hashtag" rel="tag">#<span>ITSecurity</span></a> <a href="https://mastodon.social/tags/CyberAttack" class="mention hashtag" rel="tag">#<span>CyberAttack</span></a> <a href="https://mastodon.social/tags/InfoSec" class="mention hashtag" rel="tag">#<span>InfoSec</span></a> <a href="https://mastodon.social/tags/CyberDefense" class="mention hashtag" rel="tag">#<span>CyberDefense</span></a> <a href="https://mastodon.social/tags/VPN" class="mention hashtag" rel="tag">#<span>VPN</span></a> <a href="https://mastodon.social/tags/OnlinePrivacy" class="mention hashtag" rel="tag">#<span>OnlinePrivacy</span></a> <a href="https://mastodon.social/tags/SecurityTips" class="mention hashtag" rel="tag">#<span>SecurityTips</span></a> <a href="https://mastodon.social/tags/CyberSec" class="mention hashtag" rel="tag">#<span>CyberSec</span></a> <a href="https://mastodon.social/tags/TechUpdates" class="mention hashtag" rel="tag">#<span>TechUpdates</span></a> <a href="https://mastodon.social/tags/DigitalSecurity" class="mention hashtag" rel="tag">#<span>DigitalSecurity</span></a> <a href="https://mastodon.social/tags/Hackers" class="mention hashtag" rel="tag">#<span>Hackers</span></a> <a href="https://mastodon.social/tags/ITSupport" class="mention hashtag" rel="tag">#<span>ITSupport</span></a> <a href="https://mastodon.social/tags/Networking" class="mention hashtag" rel="tag">#<span>Networking</span></a> <a href="https://mastodon.social/tags/CyberProtection" class="mention hashtag" rel="tag">#<span>CyberProtection</span></a> <a href="https://mastodon.social/tags/SecureYourData" class="mention hashtag" rel="tag">#<span>SecureYourData</span></a> <a href="https://mastodon.social/tags/DigitalSafety" class="mention hashtag" rel="tag">#<span>DigitalSafety</span></a> <a href="https://mastodon.social/tags/Tech" class="mention hashtag" rel="tag">#<span>Tech</span></a></p>
Dan York<p>This is great news! I have long been a huge of Internet.nl as a test site for compliance with the latest standards- and now they have added <a href="https://mastodon.social/tags/RPKI" class="mention hashtag" rel="tag">#<span>RPKI</span></a> into their scoring. (The RPKI test was there for the last 2 years, but didn’t count toward the score - now it does!) </p><p>This is a way to hopefully get people paying more attention to <a href="https://mastodon.social/tags/RoutingSecurity" class="mention hashtag" rel="tag">#<span>RoutingSecurity</span></a> and <a href="https://mastodon.social/tags/MANRS" class="mention hashtag" rel="tag">#<span>MANRS</span></a> </p><p>From: <span class="h-card" translate="no"><a href="https://mastodon.nl/@internet_nl" class="u-url mention">@<span>internet_nl</span></a></span><br /><a href="https://mastodon.nl/@internet_nl/113906271350500646" target="_blank" rel="nofollow noopener" translate="no"><span class="invisible">https://</span><span class="ellipsis">mastodon.nl/@internet_nl/11390</span><span class="invisible">6271350500646</span></a></p>
John Kristoff<p><span class="h-card" translate="no"><a href="https://bsd.network/@job" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>job</span></a></span> again dropping some knowledge and insight with current <a href="https://infosec.exchange/tags/RPKI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RPKI</span></a> operations. Worth a read: <a href="https://mailman.nanog.org/pipermail/nanog/2025-January/227206.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mailman.nanog.org/pipermail/na</span><span class="invisible">nog/2025-January/227206.html</span></a></p>
Internet.nl<p><span class="h-card" translate="no"><a href="https://noc.social/@namedbird" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>namedbird</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@GuidoKostons" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>GuidoKostons</span></a></span> </p><p>Goed dat je het gefixt hebt! Wel jammer dat je registrar niet helemaal bij de tijd is. </p><p>Voor andere *Europese* <a href="https://mastodon.nl/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a> providers die -voor zover wij weten- allemaal <a href="https://mastodon.nl/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNSSEC</span></a> doen zie trouwens: <a href="https://european-alternatives.eu/category/managed-dns-providers" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">european-alternatives.eu/categ</span><span class="invisible">ory/managed-dns-providers</span></a></p><p>deSEC is zelfs een voor gebruikers kosteloze dienst: <a href="https://desec.io/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">desec.io/</span><span class="invisible"></span></a></p><p>Welke <a href="https://mastodon.nl/tags/RPKI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RPKI</span></a> problemen zie je trouwens bij de mail forwarding via Cloudflare?</p>
Named Bird<p><span class="h-card"><a href="https://mastodon.social/@GuidoKostons" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>GuidoKostons</span></a></span> <span class="h-card"><a href="https://mastodon.nl/@internet_nl" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>internet_nl</span></a></span> Ik ook!<br>Heb <a href="https://noc.social/tags/ipv6" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ipv6</span></a> aan en de webserver beveiligd op mijn VPSje.<br>Om DNSSEC werkend te krijgen moest ik cloudflare nameservers gebruiken, aangezien mijn registrar dat niet aan heeft staan op hun eigen servers.<br>Toen direct mail forwarding aangezet en haal daar nu ook ~95% op. (geen 100 wegens <a href="https://noc.social/tags/RPKI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RPKI</span></a> problemen bij <a href="https://noc.social/tags/Cloudflare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cloudflare</span></a>.)</p>
Clement Cavadore<p>Nous venons d'implémenter un filtrage basé sur "Autonomous System Provider Authorization" (ASPA) sur un des RS de Lillix<br> (RS2).</p><p>Etant donné que ASPA n'est pas encore normalisé, on va attendre que ca soit fait pour l'implémenter sur RS1.<br><a href="https://masto.hivane.net/tags/RPKI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RPKI</span></a> <br>infos sur le blog d'<span class="h-card" translate="no"><a href="https://hostux.social/@alarig" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>alarig</span></a></span> (qui l'a implémenté chez Lillix): <br><a href="https://www.swordarmor.fr/securisation-du-routage-bgp-en-utilisant-aspa-avec-routinator-et-bird-cas-de-breizh-ix.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">swordarmor.fr/securisation-du-</span><span class="invisible">routage-bgp-en-utilisant-aspa-avec-routinator-et-bird-cas-de-breizh-ix.html</span></a></p>
NLnet Labs<p>Routinator offered support for <a href="https://fosstodon.org/tags/RPKI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RPKI</span></a> Autonomous System Provider Authorization (ASPA) as an experimental feature for a number of years already. Standardization has now progressed far enough in the <a href="https://fosstodon.org/tags/IETF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IETF</span></a> that we feel comfortable making <a href="https://fosstodon.org/tags/ASPA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ASPA</span></a> a core feature in Routinator 0.14.1. <a href="https://fosstodon.org/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://fosstodon.org/tags/OpenStandards" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenStandards</span></a> <a href="https://github.com/NLnetLabs/routinator/releases/tag/v0.14.1" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/NLnetLabs/routinato</span><span class="invisible">r/releases/tag/v0.14.1</span></a></p>
NLnet Labs<p>We just released Routinator 0.14.1, fixing CVE-2025-0638, where non-ASCII characters in the file names listed in an <a href="https://fosstodon.org/tags/RPKI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RPKI</span></a> manifest lead to a crash of Routinator:<br><a href="https://nlnetlabs.nl/downloads/routinator/CVE-2025-0638.txt" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nlnetlabs.nl/downloads/routina</span><span class="invisible">tor/CVE-2025-0638.txt</span></a></p><p>You should also be aware of CVE-2024-12084, fixing a heap-based buffer overflow flaw was found in the rsync daemon:<br><a href="https://nvd.nist.gov/vuln/detail/cve-2024-12084" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nvd.nist.gov/vuln/detail/cve-2</span><span class="invisible">024-12084</span></a></p><p>Please make sure you update both Routinator and rsync. Lastly, because gzip is re-enabled, you’ll save up to 50% bandwidth. </p><p><a href="https://nlnetlabs.nl/news/2025/Jan/22/routinator-0.14.1-released/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nlnetlabs.nl/news/2025/Jan/22/</span><span class="invisible">routinator-0.14.1-released/</span></a></p>
NLnet Labs<p>“… require contracted providers of Internet services to agencies to adopt and deploy Internet routing security technologies, including publishing Route Origin Authorizations and performing Route Origin Validation filtering."</p><p>In light of this Executive Order; if you need <a href="https://fosstodon.org/tags/RPKI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RPKI</span></a> solutions that are continually developed, have a proven track record, are trusted by the world’s largest operators and are supported with a service-level agreement, we're here for you. <a href="https://fosstodon.org/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a></p><p><a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2025/01/16/executive-order-on-strengthening-and-promoting-innovation-in-the-nations-cybersecurity/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">whitehouse.gov/briefing-room/p</span><span class="invisible">residential-actions/2025/01/16/executive-order-on-strengthening-and-promoting-innovation-in-the-nations-cybersecurity/</span></a></p>
Bryan Steele :flan_beard:<p>History/backstory in the OpenBSD commit for rpki-client(8), from Job Snijders.</p><p><a href="https://marc.info/?l=openbsd-cvs&amp;m=173707299408526&amp;w=2" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">marc.info/?l=openbsd-cvs&amp;m=173</span><span class="invisible">707299408526&amp;w=2</span></a></p><p><a href="https://bsd.network/tags/BGP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BGP</span></a> <a href="https://bsd.network/tags/RPKI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RPKI</span></a></p>
Bryan Steele :flan_beard:<p>The ARIN <a href="https://bsd.network/tags/RPKI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RPKI</span></a> TAL (Trust Anchor Locator) has been updated to include a BSD-like disclaimer comment, making it more widely available.</p><p><a href="https://www.arin.net/announcements/20250116-tal/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">arin.net/announcements/2025011</span><span class="invisible">6-tal/</span></a></p><p>Heads up from Job Snijders on openbsd tech@:</p><p><a href="https://marc.info/?l=openbsd-tech&amp;m=173705588431903&amp;w=2" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">marc.info/?l=openbsd-tech&amp;m=17</span><span class="invisible">3705588431903&amp;w=2</span></a></p>
Jan Schaumann<p>Whoof, this "Executive Order on Strengthening and Promoting Innovation in the Nation’s Cybersecurity" is a lot of words:</p><p><a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2025/01/16/executive-order-on-strengthening-and-promoting-innovation-in-the-nations-cybersecurity/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">whitehouse.gov/briefing-room/p</span><span class="invisible">residential-actions/2025/01/16/executive-order-on-strengthening-and-promoting-innovation-in-the-nations-cybersecurity/</span></a></p><p>Notable:</p><p>"Within 120 days, publish <a href="https://mstdn.social/tags/RPKI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RPKI</span></a> Route Origin Authorizations..."</p><p>"Within 180 days, enable encrypted DNS protocols..."</p><p>"Agencies shall implement PQC key establishment or hybrid key establishment including a PQC algorithm as soon as practicable..."</p><p>"Within 270 days, establish a program to use advanced AI models for cyber defense."</p>
John Kristoff<p><a href="https://infosec.exchange/tags/RPKI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RPKI</span></a>'s 2024 Year in Review by <span class="h-card" translate="no"><a href="https://bsd.network/@job" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>job</span></a></span> <a href="https://mailarchive.ietf.org/arch/msg/sidrops/wI_PqEMsScRh1-jYl8XYPDI-3qE/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mailarchive.ietf.org/arch/msg/</span><span class="invisible">sidrops/wI_PqEMsScRh1-jYl8XYPDI-3qE/</span></a></p>
John Kristoff<p><span class="h-card" translate="no"><a href="https://mstdn.social/@jschauma" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>jschauma</span></a></span> The thing I'd be especially concerned about are <a href="https://infosec.exchange/tags/RPKI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RPKI</span></a> publication points.</p>
Peter N. M. Hansteen<p>rpki-client 9.4 released <a href="https://www.undeadly.org/cgi?action=article;sid=20250108100744" target="_blank" rel="nofollow noopener" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">undeadly.org/cgi?action=articl</span><span class="invisible">e;sid=20250108100744</span></a> <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="tag">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/rpki" class="mention hashtag" rel="tag">#<span>rpki</span></a>-client <a href="https://mastodon.social/tags/rpki" class="mention hashtag" rel="tag">#<span>rpki</span></a> <a href="https://mastodon.social/tags/pki" class="mention hashtag" rel="tag">#<span>pki</span></a> <a href="https://mastodon.social/tags/routing" class="mention hashtag" rel="tag">#<span>routing</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="tag">#<span>security</span></a> <a href="https://mastodon.social/tags/networking" class="mention hashtag" rel="tag">#<span>networking</span></a></p>
ティージェーグレェI submitted a Pull Request to update MacPorts' rpki-client to 9.4 here:<br><br><a href="https://github.com/macports/macports-ports/pull/27334" rel="nofollow noopener" target="_blank">https://github.com/macports/macports-ports/pull/27334</a><br><br>The GitHub Continuous Integration checks passed OK.<br><br>It's up to someone else with commit access to merge it.<br><br>Also, I noticed on <a href="https://rpki-client.org" rel="nofollow noopener" target="_blank">https://rpki-client.org</a> that it still references 9.3, even though the URL linked to by the "rpki-client 9.3" text is the release announcement for 9.4.<br><br>I'm prepping a submission for undeadly.org as well, but I thought I would let you know about that version number typo on the website in the meantime.<br><br>Thank you for the continued improvements!<br><br><a href="https://snac.bsd.cafe?t=rpki" class="mention hashtag" rel="nofollow noopener" target="_blank">#RPKI</a> <a href="https://snac.bsd.cafe?t=openbgpd" class="mention hashtag" rel="nofollow noopener" target="_blank">#OpenBGPD</a> <a href="https://snac.bsd.cafe?t=openbsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#OpenBSD</a> <a href="https://snac.bsd.cafe?t=macports" class="mention hashtag" rel="nofollow noopener" target="_blank">#MacPorts</a> <a href="https://snac.bsd.cafe?t=rpkiclient" class="mention hashtag" rel="nofollow noopener" target="_blank">#rpkiclient</a> <a href="https://snac.bsd.cafe?t=opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#OpenSource</a> <a href="https://snac.bsd.cafe?t=routing" class="mention hashtag" rel="nofollow noopener" target="_blank">#Routing</a> <a href="https://snac.bsd.cafe?t=bgp" class="mention hashtag" rel="nofollow noopener" target="_blank">#BGP</a><br>