Amateur Radio Services of:
Amateur Radio Services of:
The network-44 has been subnetted. You can have a look on the allocation on Brian Kantors “AMPRNet IP address coordinators” list at http://noh.ucsd.edu/~brian/amprnets.txt.
There's a central router at the university of california, san diego announcing the network-44 by BGP. Traffic from the internet will be routed to this central server. Further announcements are unwanted by the network owner Brian Kantor, WB6CYT.
To debug routingproblems I double checked whether there are really no other announcements active, but there are. Try telnet://route-server.belwue.de and type “show ip route 18.104.22.168”.
route-server>show ip route 22.214.171.124
Routing entry for 126.96.36.199/8, 3 known subnets
Variably subnetted with 2 masks
B 188.8.131.52/8 [160/0] via 184.108.40.206, 01:23:11
B 220.127.116.11/24 [160/0] via 18.104.22.168, 2w2d
B 22.214.171.124/24 [160/0] via 126.96.36.199, 2w2d
The border router will tunnel incoming packages with IP-ENCAP protocol 4 (/etc/protocols) to corresponding gateways. There is some documentation how gateways can take part: http://www.ampr-gateways.org. Traffic to IP-addresses without DNS-entry is blocked as well as port 135-139, 435 and 1025-1028 (TCP/UDP).
You can check current routes by ipencap at the Linux shell of DB0FHN with “cat /opt/encap/encap.txt”. DB0FHN is the central router for germany 188.8.131.52/16, austria 184.108.40.206/16, switzerland 220.127.116.11/16, france 18.104.22.168/16 and luxembourg 22.214.171.124/16.
To debug routingproblems I double checked whether there are no other gateways active, but there are:
db0fhn:~# grep 44.130 /opt/encap/encap.txt |grep -v 126.96.36.199
route addprivate 44.130.12/24 encap 188.8.131.52
route addprivate 44.130.98/24 encap 184.108.40.206
route addprivate 44.130.99/24 encap 220.127.116.11
route addprivate 18.104.22.168/29 encap 22.214.171.124
route addprivate 126.96.36.199/32 encap 188.8.131.52
route addprivate 44.130.146/24 encap 184.108.40.206
route addprivate 44.130.18/24 encap 220.127.116.11
db0fhn:~# grep 44.142 /opt/encap/encap.txt |grep -v 18.104.22.168
db0fhn:~# grep 44.143 /opt/encap/encap.txt |grep -v 22.214.171.124
db0fhn:~# grep 44.151 /opt/encap/encap.txt |grep -v 126.96.36.199
db0fhn:~# grep 44.161 /opt/encap/encap.txt |grep -v 188.8.131.52
IP-Routing at DB0FHN is complex but I try to explain it. DB0FHN uses iproute2 for all the routing stuff. There are some rules and tables at DB0FHN:
db0fhn:~# ip rule
0: from all lookup 255
210: from all lookup funk
220: from 184.108.40.206/8 lookup ampr2inet
230: from all lookup amprtun
32766: from all lookup main
32767: from all lookup default
Every table has some entries. DB0FHN-10 runs an patched ax25rtd. ax25rtd will learn IP-hostroutes on incoming AX.25 connections and pass the routes to the kernel. Our ax25rtd writes these routes into the table “funk”. Assume the kernel has to route an IP-package: The kernel will start with table 0 to 32767 until it will find a match and route the package. So highest priority have routes learned by ax25rtd. Our border node DB0FHN-0 (Xnet) could do this job also, but at DB0FHN are the developers of ax25-apps and ax25-tools working on this piece of software.
db0fhn:~# ip route show table funk
220.127.116.11 dev ax0 proto ax25rtd scope link
18.104.22.168 dev ax0 proto ax25rtd scope link
22.214.171.124 dev ax0 proto ax25rtd scope link
126.96.36.199 dev ax0 proto ax25rtd scope link
188.8.131.52 dev ax0 proto ax25rtd scope link
The next table “ampr2inet” will only route packages from the network-44 back to the internet. The border gateway at university of california, san diego doesn't support reverse routing. I did find a partner in sweden (Pontus Falk) who can transport IP-packages with source-IP from 184.108.40.206/8 to the internet (I'm source route filtered at the provider). I like to route all packages from 220.127.116.11/8 to NOT 18.104.22.168/8 and this was a bit tricky to add into the table:
db0fhn:~# ip route show table ampr2inet
22.214.171.124/8 via 126.96.36.199 dev tunl0 onlink
188.8.131.52/7 via 184.108.40.206 dev tunl0 onlink
220.127.116.11/6 via 18.104.22.168 dev tunl0 onlink
22.214.171.124/5 via 126.96.36.199 dev tunl0 onlink
188.8.131.52/4 via 184.108.40.206 dev tunl0 onlink
0.0.0.0/3 via 220.127.116.11 dev tunl0 onlink
18.104.22.168/2 via 22.214.171.124 dev tunl0 onlink
126.96.36.199/1 via 188.8.131.52 dev tunl0 onlink
The next table is filled with IP-ENCAP routes from the gateways-project. Every night this table will be automatically updated using a cronjob. I deleted listed iproutes to 44.130.x.x as I prefer to deliver IP-packages by IP over AX.25 through our AX.25 network. The reason is easy. The ax25rtd will learn host routes to be able to answer incoming packages, but I don't have a routing daemon on the tunneling interface running which could do this job. This of course could be improved.
db0fhn:~# ip route show table amprtun
184.108.40.206 via 220.127.116.11 dev tunl0 onlink
18.104.22.168 via 22.214.171.124 dev tunl0 onlink
126.96.36.199 via 188.8.131.52 dev tunl0 onlink
184.108.40.206 via 220.127.116.11 dev tunl0 onlink
18.104.22.168 via 22.214.171.124 dev tunl0 onlink
126.96.36.199 via 188.8.131.52 dev tunl0 onlink
DB0FHN is connected to the european rf radio network and its central IGATE-server. We do have the route for 184.108.40.206/8 via 220.127.116.11 in the default table which will be routed by IP over AX.25 to IGATE. IGATE is a patched Xnet AX.25 router (see IGATE-project on mainpage) which supports IP over AX.25. Users will be able to use IGATE as their default IP-router as described at “Basics with Windows and PC/Flexnet”.