Instantly share code, notes, and snippets.

View dns-hijacking-results.md

Measurement: 4454125 - whoami.akamai.net via 8.8.8.8

  • GOOGLE - Google Inc., US: 963 probes
  • OPENDNS - OpenDNS, LLC, US: 4 probes probes: 11104, 20197, 21048, 26519
  • BT-UK-AS BTnet UK Regional network, GB: 3 probes probes: 11036, 12234, 13893
  • INTERLINK-TECH-AS-ID INTERLINK TECHNOLOGY, PT, ID: 1 probe probes: 18850
  • ENTANET ENTANET International Limited, GB: 1 probe probes: 24963
View RIPE Atlas - RFC7050 (ipv4only.arpa).md

Get a list of probes tagged with system-ipv6-works and save it on v6probes.clean:

$ ripe-atlas probes --status 1 --tag system-ipv6-works --limit 3000 > v6probes
$ cat v6probes | grep Connected > v6probes.clean

The --tag argument is part of a PR that has been merged into Magellan but that's not released yet.

Run the parse_probes.py script (you can find it within this gist) to filter probes and to consider only max 5 probes for each source ASN among those whose ASN_v4 and ASN_v6 match [1]. The script prints a list of RIPE Atlas Tools (Magellan) commands to execute in order to start measurements (you need an API key in ~/.atlas/create).

View country-code-to-latlng.py
# Processing of http://opengeocode.org/cude/download.php?file=/home/fashions/public_html/opengeocode.org/download/cow.txt
#
# Used on my blog post http://blog.pierky.com/displaying-pmacct-country-code-on-a-kibana-4-map
#
# Output:
#
# {
# "CC": "lat,lon",
# ...
# }
View blogpost-italian-government-mail-servers-starttls-support
#!/bin/bash
# support script for blog post:
# http://blog.pierky.com/italian-government-mail-servers-starttls-support
# REQUIRES: list of domains on ./domains file, one domain on each line
# ./output directory
rm domains-mx &>/dev/null
View blogpost-dnssec-ecdsa-aware-resolvers-seen-by-ripe-atlas.py
import urllib2
import json
import os.path
import sys
from ripe.atlas.sagan import DnsResult
from pprint import pprint
RIPE_ATLAS_KEY = ""
View blogpost-quick-glance-longer-24-ipv4-prefixes.py
# Python script used to compare RIPE Atlas results for my blog post "A quick glance at longer than /24 IPv4 prefixes"
# http://blog.pierky.com/a-quick-glance-at-longer-than-24-ipv4-prefixes/
import json
import urllib2
from pprint import pprint
import ripe.atlas.sagan
RIPE_ATLAS_KEY = ""
PROPS = [ "packets_received", "packets_sent", "rtt_min", "rtt_max", "rtt_median", "rtt_average" ]
View keybase.md

Keybase proof

I hereby claim:

  • I am pierky on github.
  • I am pierky (https://keybase.io/pierky) on keybase.
  • I have a public key whose fingerprint is 238F 94CD E2D2 2576 394A 36EB D4B3 F369 E0EE 9841

To claim this, I am signing this object: