The network-44 has been subnetted. You can have a look on the allocation on Brian Kantors "AMPRNet IP address coordinators" list at http://noh.ucsd.edu/~brian/amprnets.txt. There's a central router at the university of california, san diego announcing the network-44 by BGP. Traffic from the internet will be routed to this central server. Further announcements are unwanted by the network owner Brian Kantor, WB6CYT. To debug routingproblems I double checked whether there are really no other announcements active, but there are. Try telnet://route-server.belwue.de and type "show ip route 44.0.0.0". > route-server>show ip route 44.0.0.0 > Routing entry for 44.0.0.0/8, 3 known subnets > Variably subnetted with 2 masks > > B 44.0.0.0/8 [160/0] via 188.1.38.205, 01:23:11 > B 44.16.15.0/24 [160/0] via 188.1.38.205, 2w2d > B 44.130.99.0/24 [160/0] via 80.81.192.74, 2w2d The border router will tunnel incoming packages with IP-ENCAP protocol 4 (/etc/protocols) to corresponding gateways. There is some documentation how gateways can take part: http://www.ampr-gateways.org. Traffic to IP-addresses without DNS-entry is blocked as well as port 135-139, 435 and 1025-1028 (TCP/UDP). You can check current routes by ipencap at the Linux shell of DB0FHN with "cat /opt/encap/encap.txt". DB0FHN is the central router for germany 44.130.0.0/16, austria 44.143.0.0/16, switzerland 44.142.0.0/16, france 44.151.0.0/16 and luxembourg 44.161.0.0/16. To debug routingproblems I double checked whether there are no other gateways active, but there are: > db0fhn:~# grep 44.130 /opt/encap/encap.txt |grep -v 141.75.245.225 > route addprivate 44.130.12/24 encap 139.13.100.33 > route addprivate 44.130.98/24 encap 193.22.2.254 > route addprivate 44.130.99/24 encap 193.22.2.254 > route addprivate 44.130.176.120/29 encap 213.239.233.155 > route addprivate 44.130.177.135/32 encap 213.239.233.155 > route addprivate 44.130.146/24 encap 87.139.127.97 > route addprivate 44.130.18/24 encap 87.139.127.97 > db0fhn:~# grep 44.142 /opt/encap/encap.txt |grep -v 141.75.245.225 > db0fhn:~# grep 44.143 /opt/encap/encap.txt |grep -v 141.75.245.225 > db0fhn:~# grep 44.151 /opt/encap/encap.txt |grep -v 141.75.245.225 > db0fhn:~# grep 44.161 /opt/encap/encap.txt |grep -v 141.75.245.225 IP-Routing at DB0FHN is complex but I try to explain it. DB0FHN uses iproute2 for all the routing stuff. There are some rules and tables at DB0FHN: > db0fhn:~# ip rule > 0: from all lookup 255 > 210: from all lookup funk > 220: from 44.0.0.0/8 lookup ampr2inet > 230: from all lookup amprtun > 32766: from all lookup main > 32767: from all lookup default Every table has some entries. DB0FHN-10 runs an patched ax25rtd. ax25rtd will learn IP-hostroutes on incoming AX.25 connections and pass the routes to the kernel. Our ax25rtd writes these routes into the table "funk". Assume the kernel has to route an IP-package: The kernel will start with table 0 to 32767 until it will find a match and route the package. So highest priority have routes learned by ax25rtd. Our border node DB0FHN-0 (Xnet) could do this job also, but at DB0FHN are the developers of ax25-apps and ax25-tools working on this piece of software. > db0fhn:~# ip route show table funk > 44.143.144.160 dev ax0 proto ax25rtd scope link > 44.130.18.200 dev ax0 proto ax25rtd scope link > 44.130.18.203 dev ax0 proto ax25rtd scope link > 44.130.42.3 dev ax0 proto ax25rtd scope link > 44.130.60.180 dev ax0 proto ax25rtd scope link > ... The next table "ampr2inet" will only route packages from the network-44 back to the internet. The border gateway at university of california, san diego doesn't support reverse routing. I did find a partner in sweden (Pontus Falk) who can transport IP-packages with source-IP from 44.0.0.0/8 to the internet (I'm source route filtered at the provider). I like to route all packages from 44.0.0.0/8 to NOT 44.0.0.0/8 and this was a bit tricky to add into the table: > db0fhn:~# ip route show table ampr2inet > 45.0.0.0/8 via 130.237.41.44 dev tunl0 onlink > 46.0.0.0/7 via 130.237.41.44 dev tunl0 onlink > 40.0.0.0/6 via 130.237.41.44 dev tunl0 onlink > 32.0.0.0/5 via 130.237.41.44 dev tunl0 onlink > 48.0.0.0/4 via 130.237.41.44 dev tunl0 onlink > 0.0.0.0/3 via 130.237.41.44 dev tunl0 onlink > 64.0.0.0/2 via 130.237.41.44 dev tunl0 onlink > 128.0.0.0/1 via 130.237.41.44 dev tunl0 onlink The next table is filled with IP-ENCAP routes from the gateways-project. Every night this table will be automatically updated using a cronjob. I deleted listed iproutes to 44.130.x.x as I prefer to deliver IP-packages by IP over AX.25 through our AX.25 network. The reason is easy. The ax25rtd will learn host routes to be able to answer incoming packages, but I don't have a routing daemon on the tunneling interface running which could do this job. This of course could be improved. > db0fhn:~# ip route show table amprtun > 44.131.94.240 via 82.33.62.185 dev tunl0 onlink > 44.4.28.50 via 66.134.69.212 dev tunl0 onlink > 44.131.93.240 via 82.33.62.185 dev tunl0 onlink > 44.134.208.241 via 146.48.126.28 dev tunl0 onlink > 44.135.96.17 via 132.213.22.244 dev tunl0 onlink > 44.4.92.50 via 66.134.69.212 dev tunl0 onlink > ... DB0FHN is connected to the european rf radio network and its central IGATE-server. We do have the route for 44.0.0.0/8 via 44.130.254.254 in the default table which will be routed by IP over AX.25 to IGATE. IGATE is a patched Xnet AX.25 router (see IGATE-project on mainpage) which supports IP over AX.25. Users will be able to use IGATE as their default IP-router as described at "Basics with Windows and PC/Flexnet".