Monday, April 27, 2026
[Transparency Report #003][OPERATIONS] The start of a WHOIS Server…
What are Transparency Reports?
As a community operated and governed virtual internet exchange, FurrIX has
to maintain and foster open and honest communication with our exchange
members. This means that from time to time, there will be items that come
up during our operations that could or do affect the exchange and our team
will publish notices in order to keep everyone in the know. As a community
internet exchange, FurrIX aims to have fully open communication standards
as best as possible.
What Happened?
As part of FurrIX going forward and rebuilding itself in a better documented and
run exchange, we have been working in the background on getting a simple but
custom WHOIS server up in running in its own isolated space, meaning it has no
access to critical routing gear or management planes in case our custom tooling
has bugs that we are not aware of. This server is to allow our exchange members
and outside network operators to be able to query various bits of information
about our network, domains and services using a brain dead just answer kind of
protocol. It is simple, easy to interface and just works.
At the moment, our WHOIS is running on sample data until we start doing the
actual rebuild of the FurrIX exchange, but it is usable. After the rebuild, the WHOIS
server will contain actual exchange data such as our network information, host
information, router notes, domain information, service info and who is responsible
for that gear and so on. For the WHOIS server, because it faces the public, member
emails will get replaced with a generic FurrIX address. Nickname and PTR will still
be published as is.
Also, while I am here making this post, just for the nitty gritty tech guys to wince
at a bit- the WHOIS server is built on Python using a flat YAML data store. Its
kinda crummy, catches fire sometimes with formatting, but thats all failsafe modules
we built in to the server. Hopefully, with us being a very small vIX, this service
last us for a bit of time to come.
To make a query, use your system terminal and run:
whois -h ns1.marbledfennec.net dwagon and you should hear a response
back from our snarky mascot, Marble. You can also query the domains
rsd.232.gay, marbledfennec.net and furrix.zone.
What this means for members of the exchange:
- Our WHOIS server will be the central authority on information about
our network, domain, service and membership census. If it exist on the
the exchange, it will have an entry in the WHOIS server - When adding entries, our WHOIS server is customized to help our
volunteers by also generating reverse, or PTR, name server zones! - Marble can actually be poked at by our members now, lovely!
Are exchange operations affected?
This is a feature addon, it does not affect core operations.
Monday, April 20, 2026
[Transparency Report #001][UPSTREAM CONTACT][EXT CONTACT] SSL based abuse complaint?
What are Transparency Reports?
As a community operated and governed virtual internet exchange, FurrIX has
to maintain and foster open and honest communication with our exchange
members. This means that from time to time, there will be items that come
up during our operations that could or do affect the exchange and our team
will publish notices in order to keep everyone in the know. As a community
internet exchange, FurrIX aims to have fully open communication standards
as best as possible.
What Happened?
Today at 1610EST, we received notification of an abuse complain from the data
center that FurrIX’s network is hosted within. Upon logging in to their customer
portal, we were greeted with an email to their abuse department specifying a
notice about SSL certs expiring on our primary web host. Oddly enough, this
email list a phone number from another state and a link to the KCPD website.
We are also verifying whether the external contact was legitimate through a bit
of research and external guidance, as we have been told that fusion centers
typically do not issue SSL‑expiry notices and we have not seen this interaction
before.
Honestly, this seems off and like a bogus report, but the FurrIX vIX did respond
with the following information:
- Our SSL certs are manually updated by hand and not automated
- The domain in question has been renewed before the email arrived
because of DoH and DoT requirements
What this means for members of the exchange:
- FurrIX RX’d a fishy looking abuse complaint
- FurrIX is reaching out to our datacenter for assistance
Are exchange operations affected?
At this time, we do not expect our exchange operations to be affected in
any meaningful way and will be keeping an eye on the situation. We will post
updates to this page as we gain more information. Something to keep in the
back of our member’s mind, for clarity, is that SSL certificate expiration is not
considered an abuse category under our network‑operations practice and that
we do run into SSL issues here and there due to the human operator stance
of the vIX. Members do not need to worry about this, we will get certs renewed
ASAP and we have internal alerting just for this.
Report Status: Worked with data center to mark issue as resolved.
Saturday, March 28, 2026
Ongoing Name Server Attacks
FurrIX is seeing attacks on our name servers that have not let
up for a few hours now and as a result we have had to tighten
our rate limits and start dropping excessive traffic.
The way things are going, we will not be letting up on our rate
limits any time soon.
If you are being affected by these changes, you can send an
email off to ‘nameservers at marbledfennec dot net’ and request
a whitelisting that will bypass the limits. We will require knowing
you use case, however.
Wednesday, March 25, 2026
Agreement Reached with MFN
We’ve been working on our agreement with Marbled Fennec Networks
in the background and have reached what we deem to be an acceptable
way of moving forward and ensuring the survival of both projects, as
well as allowing us both to do our own thing on the same hardware.
This new version is what is being used to govern interactions and
responsibilities between both of our projects as of March 25th, 2026.
You can review the agreement at:
This page…
Tuesday, March 24, 2026
[Incident Report #031][NET] Connectivity Issues with 2602:F992:EC::/46
Update:
Appears our static route did not get migrated to the new hardware
at the data center. This has been resolved and our services should
be back online momentarily!
What Happened?
Our upstream provider performed some upkeep on the data center on
Mar 20th and since then our routed subnet has not be working properly.
We are looking into this as it affect our IPAM, NMS, PBS and a few other
services that assist us with managing our network.
This is also affects our secondary name server, as it currently does not
have IPv6 service.
We are seeing the following issues:
- No IPv6 connectivity for NS2, affecting private and public resolution request
- No PBS backups for either MFN, FurrIX or Maows.Gay
- No NMS accounting or error tracking
- No status graphs on our website are updating
What are we doing to work on this?
- We have performed internal and external networking checks
- We have reached out to our upstream provider with our findings
At the moment, we will have to wait to hear back from the data center.