Events in room H.1302 (Depage)

Sat

 "The Fast and the Spurious: Congestion Control Experimentation in Firefox's QUIC stack" ( 2026 )

Saturday at 10:30, 20 minutes, H.1302 (Depage), H.1302 (Depage), Network Oskar Mansfeld , slides , video

This talk gives a rundown of various potential improvements being thought about and experimented on for the CUBIC Congestion Control implementation in Neqo, Firefox's QUIC stack. Detecting and recovering from Spurious Congestion Events -- network hiccups mistaken as congestion signal. Reacting differently to Explicit Congestion Notifications (ECN) than to packet loss. Optimizing the Slow Start exit point to avoid unnecessary loss through various heuristics.

While many of these make sense on paper and produce good results in simulations the reality of the internet is much more complicated. One ongoing challenge is designing metrics that measure impact of change in the real world without getting lost in the noise of wildly varying network conditions across millions of internet users to validate that those improvements genuinely make Firefox quic(k)er.

 "Building QUIC Multipath" ( 2026 )

Saturday at 10:55, 20 minutes, H.1302 (Depage), H.1302 (Depage), Network Floris Bruynooghe , slides , video

iroh is a library to establish peer-to-peer QUIC connections assisted by relay servers. It needs to route UDP datagrams carrying QUIC payloads over relayed and holepunched network paths. While this used to be done outside of QUIC's knowledge, over the past year we have worked to adopt the QUIC multipath proposed standard so that QUIC itself is aware of multiple paths.

This talk will cover iroh's experience of adding QUIC multipath to the Quinn library and the challenges of adopting it. The multipath draft does only cover how to send packets over the wire, and does not specify how path selection works, consequently we'll also cover iroh's choices for path selection as well as changes we will still be experimenting with.

Finally iroh has also moved holepunching into a QUIC extension, which integrates tightly with multipath. The mechanism of how holepunching with multipath support works in iroh will covered as well.

 "Modern Network Protocols — What’s Next for Firefox and the Web?" ( 2026 )

Saturday at 11:20, 20 minutes, H.1302 (Depage), H.1302 (Depage), Network Max Inden Andrew Creskey , slides , video

The Web’s transport stack is changing rapidly, with QUIC, HTTP/3, and encrypted DNS seeing broad adoption. This talk gives an overview of the modern network protocols Firefox already deploys and invests in, including QUIC and HTTP/3’s growing share of Web traffic. It will highlight what Firefox actually sends on the wire today, what benefits we observe in practice, and where the Web’s protocol landscape stands in early 2026.

The session will also offer an outlook on what’s likely to land in Firefox and across the Web in 2026 and beyond. This includes emerging mechanisms like Happy Eyeballs v3 to manage increasingly complex protocol selection, WebTransport as a modern WebSocket primitive, MASQUE-based proxying for new tunneling use cases, and ongoing work around encrypted DNS, resolver discovery, and Encrypted Client Hello. Together these protocols form the foundation of a faster and more private Web.

 "Harnessing Hardware for High-Performance Traffic Management in FD.io/VPP" ( 2026 )

Saturday at 11:45, 20 minutes, H.1302 (Depage), H.1302 (Depage), Network Venkata Ravichandra Mynidi Alok Mishra , slides , video

Harnessing Hardware for High-Performance Traffic Management in VPP

Traffic Management (TM) is critical for predictable network performance. It controls packet priority, shapes transmission rates, and allocates bandwidth to meet SLAs in large-scale deployments such as ISPs, telecom networks, and data centers.

FD.io Vector Packet Processing (VPP), a widely adopted high-performance networking stack across these environments, currently relies on software-based TM. This introduces bottlenecks at scale: CPU overhead grows with traffic classes, latency spikes under load, and token bucket waste cycles. At 100G/200G and beyond, these limitations pose a critical risk of SLA violations.

The new TM framework addresses these challenges by offloading shaping and scheduling to hardware through a vendor-neutral architecture and a unified API that works across all platforms supporting traffic management in silicon.

Overview

The proposed TM framework integrates VPP with hardware traffic management engines in supported NICs, SmartNICs, and DPUs. It detects hardware capabilities, classifies flows in software, and steers them to hardware queues where TM policies are enforced at line rate—eliminating software-based per-packet arbitration.

Key Features

Hierarchical Scheduling: Organizes traffic into multi-level queues to prioritize critical services while preserving fairness across remaining traffic. Dual-Rate Shaping: Applies committed and peak rate control with burst handling, compliant with RFC 2698, to prevent congestion and maintain predictable performance. Priority and Fairness: Combines strict priority for latency-sensitive traffic with weighted sharing for bulk flows to balance resources. Policing: Enforces traffic limits at line rate by dropping or marking packets appropriately.

Advantages of Traffic Management in Hardware

Performance: Delivers line-rate Traffic Management with high accuracy and low latency. Scalability: Supports thousands of queues at line rates without proportional CPU costs. Efficiency: Shifts workload to hardware, enabling CPUs to focus on application logic while reducing energy usage Reliability: Ensures stable Quality of Service under peak load conditions.

Conclusion

Hardware-assisted TM is no longer optional—it is mission-critical for networks scaling toward 400G/800G with diverse traffic and tight latency budgets. The VPP TM framework delivers this through a vendor-neutral API, making VPP ready for demanding telecom and data center workloads while preserving its modular design. For open-source stacks like VPP, this is not just an enhancement—it’s a long-overdue capability.

 "From HAR to OpenTelemetry Trace: Redefining Browser Observability" ( 2026 )

Saturday at 12:10, 20 minutes, H.1302 (Depage), H.1302 (Depage), Network Antonio Jimenez , slides , video

Have you heard about HTTP Archive (HAR) files and wondered how you could leverage this data for deeper insights into your web applications?

Imagine analyzing your page load request data as OpenTelemetry traces in your favorite observability backend. This talk will explore the lessons learned from transforming HAR into an OpenTelemetry trace and streaming it to Jaeger. Learn how to convert HAR data into spans following OpenTelemetry semantic conventions.

 "Suricata 8 - shaping the future of network detection and prevention" ( 2026 )

Saturday at 12:35, 20 minutes, H.1302 (Depage), H.1302 (Depage), Network Eric Leblond Peter Manev , slides , video

Suricata is a high performance, open source network analysis and threat detection software used by most private and public organizations, and embedded by major vendors to protect their assets. Suricata provides network protocol, flow, alert, anomaly logs, file extraction and PCAP capture at very high speeds and provides a wide range of deployment options - IDS/IPS/FW/NSM.

Suricata 8 is the latest stable edition that has been in development for 2 years, powered by collaborative work of the OISF team, Suricata community and consortium members. This talk will highlight the new and groundbreaking features available in the latest Suricata 8 edition. The new additions include runmodes, deployment options, detection, logging and protocol parsing that empower the cyber defenders with improved capabilities for network security monitoring in terms of efficiency, detection, accuracy, performance and flexibility. Don't miss this opportunity to get a firsthand overview at how Suricata 8 is shaping the future of network detection and prevention.

 "Beyond MCP Servers: Why Network Automation Agents Need Knowledge Graphs" ( 2026 )

Saturday at 13:00, 20 minutes, H.1302 (Depage), H.1302 (Depage), Network Shereen Bellamy , slides , video

Everyone's building MCP servers for network automation. Your agents can finally talk to each other and share context about your infrastructure. But what context are they actually sharing?

If your agent's understanding of the network comes from vector embeddings and RAG, MCP is just helping you share incomplete topology understanding and missed policy dependencies faster. Vector similarity can't represent "which devices are upstream of this link" or "what routing policies affect this prefix."

MCP makes context sharing easy. Knowledge graphs make that context actually correct.

This talk will discuss lessons learned as a developer advocate maintaining coffeeAGNTCY, an open-source multi-agent system. Mainly, sharing the discovery of why knowledge graphs with LangGraph are essential for network automation agents.

We'll cover:

-What MCP servers can't fix (the context representation problem) -Knowledge graphs for network topology, routing, and policy dependencies -LangGraph for reasoning over graph-structured network data -Real patterns from coffeeAGNTCY project (lungo) . Code: https://github.com/agntcy/coffeeAgntcy/tree/main/coffeeAGNTCY/coffee_agents/lungo

 "Drag, Drop, and Deploy: Low-Code AI Agents for Network Ops" ( 2026 )

Saturday at 13:25, 20 minutes, H.1302 (Depage), H.1302 (Depage), Network Alfonso Sandoval Rosas , video

Network operations still depend heavily on manual workflows. Engineers move between CLIs, dashboards, and scripts to answer operational questions, validate configurations, and enforce compliance across diverse network platforms. These tasks are repetitive, error-prone, and hard to scale.

This talk presents a practical AgenticOps architecture for network operations built with open source tools. It shows how low-code visual orchestration can be combined with LLM-based reasoning to automate both interactive and scheduled tasks while preserving native CLI access.

The system uses n8n for workflow orchestration, Model Context Protocol servers written in Python with FastMCP to expose network capabilities, and Cisco pyATS to execute platform-aware CLI commands across multiple device families. Operators interact through a chat interface using natural language. The LLM classifies intent, discovers device type, selects the correct commands, executes them via pyATS, and returns structured results.

The same workflows also handle automated compliance checks, report generation, and scheduled validations. The session includes a live demonstration and a GitHub repository with MCP servers, n8n workflows, and deployment examples ready to adapt to real environments.

 "Terabits without Tall Tales: Reproducible Packet & Session Benchmarks in FD.io (CSIT + VPP)" ( 2026 )

Saturday at 13:50, 10 minutes, H.1302 (Depage), H.1302 (Depage), Network Maciek Konstantynowicz , slides , video

"For better or worse, benchmarks shape a field." FD.io's approach to the better: open, reproducible benchmarks-as-code that guide development and guard against regressions in the VPP data plane, via CSIT. Problem: a race-track number doesn't translate to production deployments. CSIT's approach: MLRsearch (IETF BMWG, RFC in publication) for conditional throughput (NDR/PDR) with explicit stopping rules and inspectable artifacts; a continuous open-source benchmarking pipeline spanning packets and sessions; and a test matrix covering IMIX, QUIC/TLS, NAT, IPsec, ACL, SRv6, and NGFW/proxy use cases. This methodology drives terabit-class packet and session performance on commodity x86/Arm - reliably and repeatably. Takeaways: a replicable recipe (tools, configs, artifacts) for your lab; why benchmarks-as-code beat ad-hoc testing; and concrete contribution paths across CSIT and VPP (tests, profiles, analysers, data visualisation).

Relevant links: https://fd.io/ https://csit.fd.io/ https://wiki.fd.io/ https://github.com/FDio/

 "Scaling Secure Network Functions: High-Performance IPsec with FD.io VPP for VNFs and CNFs" ( 2026 )

Saturday at 14:05, 20 minutes, H.1302 (Depage), H.1302 (Depage), Network Benoît Ganne , slides , video

As enterprises and service providers transition to virtualized and cloud-native infrastructures, the need for scalable, high-performance security becomes critical. FD.io's Vector Packet Processing (VPP) platform has emerged as a leading open-source framework for fast packet processing, but how well does it handle modern IPsec workloads in Virtual Network Functions (VNFs) and Cloud-Native Network Functions (CNFs)?

In this talk, we dive deep into the architecture and implementation of IPsec within FD.io VPP. We'll explore real-world performance benchmarks, discuss recent improvements, and present best practices for deploying secure, high-throughput IPsec tunnels in containerized and virtualized environments. Attendees will see how VPP's modular pipeline enables flexible integration with orchestration systems, and how it can be tuned for different network function scenarios-from high-density edge sites to large-scale data centers.

Whether you're building secure SD-WAN, 5G core, or edge networking solutions, this session will provide actionable insights on leveraging open-source VPP to deliver robust, scalable, and efficient IPsec-powered VNFs and CNFs.

Key Takeaways: - How FD.io VPP implements and accelerates IPsec for virtualized and cloud-native deployments - Tuning and scaling techniques for maximizing IPsec throughput and minimizing latency - Integration patterns for orchestration and real-world deployment considerations - Lessons learned from operational use cases and performance testing

Join us to learn how open-source innovation is redefining secure, high-performance networking for the next generation of infrastructure!

 "So you want to do RDMA programming? RTRS: An easy to use, reliable high speed transport library over RDMA" ( 2026 )

Saturday at 14:30, 20 minutes, H.1302 (Depage), H.1302 (Depage), Network Haris Jinpu Wang , slides , video

Description

  • RDMA programming is comparatively complex to something like sockets.
  • RDMA is the industry standard for data centers and high-performance computing (HPC) environments.
  • RTRS is a reliable high speed transport library, which provides a simple interface to perform RDMA. It is a stable, and proven transport library, running on more than 5000 servers across our data centers.
  • RTRS establishes a stateful session which provides features like multipath, heartbeats, reusability, etc.
  • It creates an optimal number of connections based on the number of CPUs, and uses IRQ pinning for data transfers.
  • It allows users to send and receive data in the form of sg lists.
  • RTRS is multipath capable (with different policies to choose from) and provides I/O fail-over and load-balancing functionality.
  • RTRS pre-allocates and pre-maps DMA buffers on the server side to speed up data paths.

Benefit to the ecosystem

  • An easy to use, reliable and stable RDMA transport library to build any kind of module upon. RTRS will provide an entry point for newcomers to RDMA.
  • The pre mapping abilities have use-cases in high performance use cases like ML and AI training.

Link to the module

https://elixir.bootlin.com/linux/v6.17.7/source/drivers/infiniband/ulp/rtrs

 "The Russian Censorship Circumvention, Tom’s Traps, and Jerry’s VPN: A 5-Year Journey" ( 2026 )

Saturday at 14:55, 20 minutes, H.1302 (Depage), H.1302 (Depage), Network Vitaly Repin , slides , video

This presentation traces a five-year cat-and-mouse chase between a small VPN provider — more than 150 servers worldwide, millions of users, available on all major platforms — and the Russian state censorship machine. A real-world “Tom and Jerry” scenario where survival hinges on constant adaptation.

I’ll walk through the evolving technical and non-technical tactics used by Russian authorities to block VPN access for ordinary users. Every story comes from real, first-hand experience. The methods used five years ago and the methods used today are on entirely different levels; Tom keeps learning new tricks, and Jerry’s struggle to stay alive only gets harder.

This talk aims to be useful and insightful for network security engineers, business decision-makers, and human rights activists. Russia is not the only dictatorship experimenting with these techniques — and we expect more dictators to learn from the Russian playbook and adopt similar methods.

 "Boring filter: The anatomy of a network sandbox for Android" ( 2026 )

Saturday at 15:20, 20 minutes, H.1302 (Depage), H.1302 (Depage), Network Murtaza , slides , video

Rethink Firewall is the most downloaded FOSS network security tool on F-Droid for Android devices. For seemingly always-on, always-connected smartphones, on-device firewalls are notoriously hard to implement and maintain. This talk is about how 3 unsuspecting developers frustrated by digital surveillance and internet censorship got together, using the $12k in grant awarded by Mozilla in 2020, to build the missing "network sandbox" for 3B+ Android users, and the financial, technical, systemic challenges they faced along the way: From fighting the networking gods to make IPv6 work across a garden variety of topologies, to pushing the limits of SQLite for real-time stats & capturing network flows, to using Rethink itself to monitor & block its own egress, to testing the frontier of packet manipulation (for Deep Packet Inspection censorship resistance) and IP/domain filtering (supporting over 12 million entries) an Android app can achieve consuming limited resources (battery, processor, and memory), all the while supporting multiple WireGuard upstreams at once through open source virtualization layer (gVisor) Google built for its cloud servers! With a stream of recommendations from GrapheneOS, CalyxOS, DivestOS, the Guardian Project developers, and the varied feature-set Rethink packs, has made it the most downloaded (and probably the most confusing) WireGuard client on F-Droid.

Since Aug 2020, we've also been operating Rethink DNS, an anycast, public, censorship-resistant, highly-available DNS resolver serving 40bn requests per month & 400 TB / month in traffic at peak. It has been subject to DDoS attempts & bans by state actors. It is used in the default configuration by some popular anti-censorship projects like VLess, Hiddify, and I2P. The costs for Rethink DNS is paid for by its lead developers and partially by grants from FOSS United, an Indian non-profit. Besides discussing the software optimizations on both the client and server to bring down the costs, an unexpected lending hand from Cloudflare played a major role in handling traffic surges and keeping bad actors in check.

An anti-censorship and anti-surveillance tool for non-rooted Android devices is something we wished existed. We thought we'd be done in a year, but it is year #5 and we've so much left to do, as new users bring in newer feature requests, which mean more bugs and higher costs, too. To give a sense of our strong purpose, the toll of having drawn no salary for 5 years yet feeding our kids, living a frugal lifestyle just so this thing that we're building would exist, is not something our wives take very lightly!

Code: https://github.com/celzero/rethink-app (the UI) https://github.com/celzero/firestack (the network engine) https://github.com/serverless-dns/serverless-dns (the resolver)

 "OpenPERouter: Turning Your Kubernetes Nodes into a Provide Edge Router" ( 2026 )

Saturday at 15:45, 20 minutes, H.1302 (Depage), H.1302 (Depage), Network Miguel Duarte Federico Paolinelli , slides , video

OpenPERouter is a lightweight, open-source Provider Edge (PE) router designed to bridge traditional networking with the cloud-native ecosystem. By running directly on Linux hosts and Kubernetes nodes, it terminates VPN protocols and exposes a standard BGP interface, simplifying complex network topologies. In this session, we will explore the architecture of OpenPERouter and demonstrate how to deploy and interact with host-level Layer 3 protocols and Layer 2 interfaces. We will showcase its seamless integration with the cloud-native ecosystem, specifically enabling L3 EVPN tunneling to common Kubernetes network components like Calico and MetalLB. Additionally, we will demonstrate how OpenPERouter naturally extends to virtual machine networks by achieving a cross-cluster Layer 2 overlay using EVPN, VXLAN, and KubeVirt. Finally, we will share the project roadmap, highlighting upcoming support for new VPN protocols and standalone deployment methods outside of Kubernetes. Join us to discover how to transform your nodes into advanced network endpoints and simplify fabric connectivity.

 "Scaling GoBGP: Lessons from Building a Dynamic, API‑Driven BGP Control Plane" ( 2026 )

Saturday at 16:10, 20 minutes, H.1302 (Depage), H.1302 (Depage), Network Maxime Peim , slides , video

Border Gateway Protocol (BGP) has traditionally been associated with hardware routers and static configurations, but modern networks increasingly demand software‑defined, programmable control planes. GoBGP, an open source BGP implementation written in Go, offers a rich API surface that enables dynamic policy changes, on‑the‑fly route injection, and tight integration with automation systems and controllers. This talk explores the practical challenges and solutions involved in turning GoBGP into a multi‑tenant, production‑grade BGP control plane. We will start with a brief overview of GoBGP's architecture and its gRPC/HTTP APIs, then dive into how those APIs can be leveraged to build a flexible control plane that reacts in real time to external events (for example, service discovery, telemetry feedback, or orchestration workflows).

The core of the session focuses on multi‑tenancy and operational aspects: - Building logical separation between tenants while sharing the same GoBGP control plane. - Mapping tenants to their own BGP server, route policies, and address families, and keeping configuration manageable as the number of tenants grows. - Handling dynamic tenant lifecycle events (creation, updates, deletion) through the API without disrupting existing sessions.

 "STUNMESH-go: Building P2P WireGuard Mesh Without Self-Hosted Infrastructure" ( 2026 )

Saturday at 16:35, 20 minutes, H.1302 (Depage), H.1302 (Depage), Network Date (Yu-Chiang) Huang , video

Building site-to-site VPNs over LTE/5G or behind NAT and stateful firewalls has always been painful. You either need a central relay server with a public IP, or spend hours configuring port forwarding and STUN. STUNMESH-go takes a different approach. It helps WireGuard peers find each other and establish direct P2P connections without running your own infrastructure.

The key idea is simple. Reuse existing public services instead of running your own. STUNMESH-go uses STUN servers to discover NAT endpoints, encrypts peer information with Curve25519, and stores it using flexible plugins, whether that's Cloudflare DNS, a shell script, or any custom key-value storage backend. Peers fetch each other's information and WireGuard handles the rest.

This session will cover:

  • Cross-platform packet capture (Linux raw sockets vs BSD BPF)
  • The plugin system and bringing your own storage without running servers
  • Compatibility with WireGuard kernel module (no wireguard-go embedding needed)
  • Minimizing binary size for embedded systems
  • Real deployments (SD-WAN over LTE and site-to-site VPN mesh)
  • Future IPv6 support for stateful firewall traversal

This talk shares experience from building P2P networking that works across Linux, FreeBSD, macOS, and embedded routers like VyOS, EdgeOS, and OpenWrt.

Github: https://github.com/tjjh89017/stunmesh-go/

 "Going full IPv6 in Kubernetes: No limits, just 128 bits!" ( 2026 )

Saturday at 17:00, 20 minutes, H.1302 (Depage), H.1302 (Depage), Network Ole Mathias Heggem , slides , video

IPv6 is nothing new yet IPv4 remains the default for the majority, despite IPv6 being ideal for containerized workloads. This talk covers the current state of IPv6 support in Kubernetes.

Discover why an IPv6 only Kubernetes environment can be a good idea. Potential challenges to anticipate, and valuable lessons from doing it in production using Cilium as CNI.

 "A Toolset for the Internet of Threads (IoTh): Fine-Grained IPv6 Networking in User Space" ( 2026 )

Saturday at 17:25, 20 minutes, H.1302 (Depage), H.1302 (Depage), Network Renzo Davoli , slides

The Internet of Threads (IoTh) is an experimental networking model that assigns full IPv6 identities—addresses, routing behavior, and protocol stacks—to processes or even individual threads. Instead of containers or VMs, IoTh leverages user-space TCP/IP stacks.

This talk presents the open IoTh toolchain and its networking architecture: * libioth: the core IoTh library: a pluggable TCP/IP stack framework for user-space nodes. * nlinline: A quick and clean API for NetLink networking configuring (implemented in a header file). * libnlq: Netlink configuration library (for netlink clients and servers). * iothconf – Simple and expressive configuration for IoTh stacks. Common network setups can be defined with a single character string. * iothdns + iothnamed: DNS services supporting hash-based addressing and OTIP (One-Time IP) models * namedhcp: a DNS-driven DHCPv6/4 server for stateful, reproducible address assignment * otip-utils: tooling for ephemeral, privacy-oriented IPv6 addressing * iothradvd: an embeddable RA daemon for user-space IPv6 configuration

 "Building an Open Source Private 5G Network: A Practical Blueprint" ( 2026 )

Saturday at 17:50, 20 minutes, H.1302 (Depage), H.1302 (Depage), Network Alfonso Carrillo Aspiazu , slides , video

Deploying a Private 5G network has traditionally been the domain of proprietary vendors with complex, closed hardware. However, the maturity of open-source projects now allows engineers to build fully functional networks using standard servers and open software. Using purely open-source components requires precise orchestration of the hardware and software stack. This session aims to demonstrate a complete, end-to-end O-RAN deployment blueprint on top of OpenNebula. We will explain how to orchestrate the srsRAN suite (providing the centralized and distributed units) and Open5GS (the 5G Core). We will dive into the specific infrastructure requirements for running latency-sensitive telco workloads, focusing on Enhanced Platform Awareness (EPA) features. Attendees will learn how to configure SR-IOV and Passthrough for optimized network throughput, implement CPU Pinning and NUMA awareness for performance isolation, and manage Precision Time Protocol (PTP) synchronization from the host to the guest VM. The session will include a walkthrough of the automation blueprints used to configure 5G-ready edge nodes and instantiate verified telco appliances from the OpenNebula Marketplace.

 "Making Tunnels So Light They Might Actually Float Away with Nftables" ( 2026 )

Saturday at 18:15, 20 minutes, H.1302 (Depage), H.1302 (Depage), Network Fernando Fernandez Mancera , slides , video

Lightweight tunneling (LWT) has been supported on linux kernel since almost 10 years ago. It enables virtual environments to scale up their tunneling infrastructure, especially when containers are involved and container-to-container communication is needed.

Nftables now allows to scale up with tunnel expression, combining it with the infrastructure existing ruleset and other powerful features like maps, sets and stateful objects. During this talk, we will get a good understanding of what is the lightweight tunneling, when it can be useful and how to use it together with Nftables.

 "Automating BGP peerings in the dn42 environment" ( 2026 )

Saturday at 18:40, 20 minutes, H.1302 (Depage), H.1302 (Depage), Network Hyacinthe Cartiaux , slides , video

dn42 (decentralized network 42) is a community-driven overlay network over the Internet, it provides a testbed aimed at experimenting with Internet protocols such as BGP, IPv4 and v6, DNS, that can be used to skill-up, develop new ideas, or interconnect your local hackerspace(s) in a proper network without NAT.

Think of it as a real-world lab where you can break things without taking down the Internet, with over a thousand routes, traffic exchanged, real-life links and latencies and actual peers around the world.

This talk covers:

Developed in Python under MIT license, this service has permitted my network to grow to the top 25 of dn42 networks by number of BGP peers and graph centrality.

Sun

 "Welcome to the Gaming and VR Devroom" ( 2026 )

Sunday at 09:00, 15 minutes, H.1302 (Depage), H.1302 (Depage), Gaming and VR devroom Vadim Troshchinskiy Shmelev , video

Welcome and setup time

 "Beyond Git: Collaborative Version Control for Godot" ( 2026 )

Sunday at 09:15, 25 minutes, H.1302 (Depage), H.1302 (Depage), Gaming and VR devroom Paul Sonnentag , video

Version control remains one of the biggest barriers to open source contribution—especially in game development, where programmers, artists, and designers must collaborate using tools like Git which are designed for code, not creative assets or interdisciplinary teams. At Ink & Switch, we're prototyping a new collaboration system built directly into the Godot editor, supporting real-time co-editing, branching, and visual review of changes. In partnership with the Endless Foundation, we're evaluating this system with students in introductory Godot classes. This talk will demo our progress, explore why version control poses unique challenges for game development, and share early lessons from bringing these tools to students.

 "Keeping Games Alive: The Role of Open Source in the Netrunner Revival" ( 2026 )

Sunday at 09:40, 25 minutes, H.1302 (Depage), H.1302 (Depage), Gaming and VR devroom Ruben Pieters , video

When a beloved game loses its publisher, its community often fades with it. Android: Netrunner was one such casualty, it was a deeply strategic card game released in 2012 that built a passionate global following before its official cancellation in 2018. Rather than let it disappear, a volunteer collective called Null Signal Games stepped in almost immediately after to keep on supporting the game. Null Signal Games has since regularly released new cards, organized tournaments, and kept the game going for over 7 years. The world championship in 2025 had over 360 players, the second largest ever Netrunner tournament since its entire lifespan.

A key part of this revival is due to the use of open source software. Platforms like Jinteki.net, NetrunnerDB, and AlwaysBeRunning.net provide the digital backbone. They enable online play, deck-building, and community/tournament scheduling. On top of that there are also a bunch of smaller projects that help with a variety of small tasks, such as the online comprehensive rules or an implementation to play vs AI.

This talk explores how open source infrastructure and community involvement has sustained Netrunner beyond corporate support. We’ll look at how technical and creative volunteers coordinate across continents on such a variety of projects and what lessons other fan communities and developers can learn from this model.

Null Signal Games: https://nullsignal.games/ Jinteki.net: https://github.com/mtgred/netrunner Netrunnerdb: https://github.com/Null-Signal-Games/netrunnerdb Alwaysberunning: https://github.com/madarasz/always-be-running

 "Breaking architecture barriers: Running x86 games on ARM" ( 2026 )

Sunday at 10:05, 30 minutes, H.1302 (Depage), H.1302 (Depage), Gaming and VR devroom Tony Wasserka , video

I'm presenting FEX, a translation layer to run x86 software on ARM devices, and the challenges it brings to the table: The design a high-performance binary recompiler, translation of Linux system calls across architectures, and forwarding of library calls to their ARM counterparts.

Gaming in particular poses extreme demands on FEX and raises further questions: How do we enable GPU acceleration in an emulated environment? How can we integrate Wine to run Windows games on Linux ARM? Why is Steam itself the ultimate boss battle for x86 emulation? And why in the world do we care more about page sizes than German standardization institutes?

Learn why x86 is such a pain to emulate and what tricks and techniques make your games fly with minimal translation overhead. Be prepared to learn cursed knowledge you won't be able to forget!

 "Porting game engine renderer to Vulkan as an absolute beginner" ( 2026 )

Sunday at 10:35, 25 minutes, H.1302 (Depage), H.1302 (Depage), Gaming and VR devroom dr Karol Suprynowicz , video

Overte (https://overte.org/) is a free and open source social virtual worlds platform with VR support. It uses custom renderer and OpenGL. In this talk I will present workflow I used for porting Overte to Vulkan. I will also present resources for learning Vulkan and development tools necessary for porting a game renderer to Vulkan.

 "The state of Open Source XR: Monado and beyond" ( 2026 )

Sunday at 11:00, 25 minutes, H.1302 (Depage), H.1302 (Depage), Gaming and VR devroom Christoph Haag , slides , video

This talk provides an introduction and overview over the state of open source XR. It focuses on the Monado runtime and its current state when it comes to OpenXR extensions and hardware drivers, but also covers the context of the wider ecosystem: How does it relate to OpenHMD, OpenComposite, xrizer, wlx-overlay-s, Electric Maple, WiVRn, Godot, and a variety of other projects?

https://monado.dev/ https://github.com/WiVRn/WiVRn https://gitlab.freedesktop.org/monado/electric-maple https://gitlab.com/znixian/OpenOVR https://github.com/Supreeeme/xrizer https://github.com/galister/wlx-overlay-s https://github.com/godotengine/godot

 "SlimeVR Full Body Tracking" ( 2026 )

Sunday at 11:25, 25 minutes, H.1302 (Depage), H.1302 (Depage), Gaming and VR devroom SlimeVR , video

SlimeVR is a fully open source hardware and software project turned company that produces both he required hardware and software for IMU based Full Body Tracking for VR, Motion Capture and VTubing. Over the last 4 years we have grown from a team of 2 and a desire to make cool stuff to an industry leading company with over 10 full time employees, 29.000+ customers and an active community over on discord with 69.000+ members!

In short, SlimeVR uses IMU's (Inertial Measurement Unit) to estimate a virtual skeleton that can then be used for various purposes such as: Virtual Reality games, Motion capture through VMC or with BVH files and Vtubing which has become more and more popular over the years. Whilst we sell the hardware needed, people can also fully build their own hardware with off the shelf components!

We have a huge passion for open source and we love sharing our ideas and mindset with the rest of the world. On top of that, we would love to hear from everyone else as well! That's why we would love to attend the Gaming and VR Devroom at fosdem 2026.

We would love to showcase and share how we came to be, and show off some of the hardware and software that we have developed over the years. Including our latest and greatest recently announced Butterfly trackers. http://slimevr.dev/smol Our software has seen tremendous strides in recent years and has been embraced by names such as Sony for their motion capture product (Mocopi).

We would also love to show off some of the hardware in action! If possible we could set up a demo where the avatar on screen is tracked off of the speaker in real time!

 "Leveling Up OpenXR: New Extensions, Better Workflows, and Advances in Open-Source Gaming" ( 2026 )

Sunday at 11:50, 30 minutes, H.1302 (Depage), H.1302 (Depage), Gaming and VR devroom Frederic Plourde , video

OpenXR continues to gain traction as the cross-platform standard for XR, but gaming introduces unique challenges that often require specialized extensions. This talk will explore the recent advances in OpenXR, with a focus on gaming-relevant extensions, and how an open source runtime like Monado makes these capabilities accessible to developers.

We will cover: * The latest OpenXR extensions for hand-tracking, body-tracking, haptics, and spatial entities. * Latest updates in Monado that introduce and simplify access to gaming-oriented XR features. * Practical examples of how Khronos and the OpenXR standard have simplified developer workflows, reducing integration overhead, and making it easier to implement XR features consistently across hardware and platforms.

Attendees will gain insight into how open standards and open source implementations are driving the next generation of interoperable AR/VR gaming experiences.

 "20 Years of Eurobattle.net: A Retrospective on the PvPGN Server and Its Open Source Ecosystem" ( 2026 )

Sunday at 12:20, 30 minutes, H.1302 (Depage), H.1302 (Depage), Gaming and VR devroom Klemen , slides , video

In 2003, a group of Warcraft III enthusiasts built a free community server using the open-source PvPGN project. Over twenty years and a million games later, Eurobattle.net remains one of the longest-running unofficial Warcraft III servers in existence. This talk traces its evolution from early bnetd and PvPGN roots through the rise of GHost++ and GProxy projects, which fundamentally transformed Warcraft III map hosting, to our own project forks and extensions that keep the ecosystem alive today. Attendees will learn about the architecture behind Eurobattle.net, challenges maintaining decades-old C++ stack, learn about the community aspects, and see a short live demo.

 "Crunching code like it is 1982" ( 2026 )

Sunday at 13:15, 10 minutes, H.1302 (Depage), H.1302 (Depage), Retrocomputing Sebastian Eggermont , video

Introduction & Welcome to the Retrocomputing devroom

 "Eliza: Rewriting the original AI chatbot from 60 years BC (Before ChatGPT)" ( 2026 )

Sunday at 13:25, 20 minutes, H.1302 (Depage), H.1302 (Depage), Retrocomputing Steven Goodwin , video

When the Eliza psychotherapist chatbot was released by Joseph Weizenbaum, in 1966, people believed it real. Even the secretary of its creator thought the machine had feelings, as they discussed relationships and personal issues. But why? How could a simple computer text interface act so human?

In this session our speaker, a computer historian and associate at the Centre for Computer History, uncovers the workings of Eliza, the Eliza effect, and its impact in the modern world and films like "THX 1138" and "Her." From the computer hardware to the programming language, and the scripts used to simulate the human traits of empathy and comprehension, we look at how 233 lines of code was convincing enough to change the world... and then how that code was transmogrified into JavaScript so that anyone can read and understand it.

 "Charming Gray Buttons of the XX century: how widget toolkits evolved with computer architectures" ( 2026 )

Sunday at 13:45, 20 minutes, H.1302 (Depage), H.1302 (Depage), Retrocomputing Dmitriy Kostiuk , video

The talk covers an evolution of widget toolkits, which have been started 40 years ago along with the historical changes in a desktop GUI. Widget toolkits are reviewed from three points of view: architecture, user experience, and programming principles. More than 90% of historically significant widget toolkits have open source licenses: some are opensourced after decrease of their commercial demand (like OpenLook and Motif), others are developed as a part of FLOSS world (Tcl/Tk, GTK+, Qt) or in systems cloned by the open source community (GNUStep, Haiku OS, etc.).

Reviewed toolkits of 1980s include early Unix GUI of Andrew Toolkit and Project Athena, followed by OpenLook and Motif, and main non-Unix toolkits: WinAPI and NeXTSTEP GUI. Significant toolkits of 1990s include Tcl/Tk, wide range of wrapper toolkits including MFC and Java AWT and Swing, and the appearance of two main Linux widget libraries, GTK+ and Qt. Also the burst of visual theming occurred in the second half of 1990s is examined for Unix and Windows platforms (as in their artistic styles, so in used architectural approaches). The list of milestones is finished with the Apple Cocoa style, closing the XX century experiments (but theming efforts had 10 more years of boiling). From the architecture point of view, the talk covers the recurring efforts in the event processing techniques, targeting at hiding callbacks from a GUI developer with available object-style metaphors.

 "MEP2, a Simple Mail Transfer Protocol (but not that one)" ( 2026 )

Sunday at 14:05, 25 minutes, H.1302 (Depage), H.1302 (Depage), Retrocomputing HP van Braam , video

About one month after I was born in 1983 a company called MCI introduced their "Electronic mail" system. Originally a BBS-style system, where users dialed into MCI to edit, send, and receive mail. Users could send electronic mail to each other, send a physical letters, and even manage their telexes without ever leaving the comfort of whatever room they had with a telephone and an acoustic coupler.

It became necessary to have offline email clients. Rather than use SMTP or POP they came up with MEP2 (Message Exchange Protocol 2). MEP2 combines the functionality of SMTP, POP, and some LDAP features together.

In this talk I will discuss the history of MCI, MEP2 protocol, and the mail server I implemented that can speak it.

 "ngdevkit: Free and Open Source C/C++ development on the Neo Geo in 2026" ( 2026 )

Sunday at 14:30, 20 minutes, H.1302 (Depage), H.1302 (Depage), Retrocomputing Damien Ciabrini , video

The Neo Geo, the classic cartridge-based arcade and home video game system turned 35 in 2025. By now, it has been thoroughly reverse-engineered and documented online. Recently, there has been a surge in homebrew demos and newly published homebrew games for the Neo Geo. And although development in 2026 is way easier than it was in the 90's, too many available tools are still GUI-only, closed-source or Windows-only binaries, which leaves a lot to be desired. ngdevkit [1] was born out of this observation. The ambition of this project is twofold: first, to be a fully open source, easy to use development kit; second, to prove that your entire game development workflow can rely exclusively on open source software for compiling code, creating graphics, composing chiptunes, designing sound FX...

This talk will give an overview of C programming for the Neo Geo with ngdevkit, and will discuss the main components of this open source development kit. ngdevkit provides a toolchain that leverages binutils, GCC, newlib and SDCC for code compilation, GnGeo or Mame for code execution, and GDB for source-level debugging. It also comes with an open source reimplementation of the original Neo Geo BIOS, with full ABI compatibility. In addition, this development kit provides the necessary crt0 and runtime to boot the game processor (68k) and the sound processor (Z80), and uses a custom linkscript to expose hardware features (video RAM, backup RAM, memory mapped registers, I/O state) as regular C variables. At last, it provides the first fully open source sound driver and chiptune player on the Neo Geo hardware. Throughout the talk, we will discuss how ngdevkit was made possible thanks to a vast trove of public domain documentation and a vast collection of open source software.

[1] https://ngdevkit.dev

 "The joys and horrors of NES dynamic recompilation" ( 2026 )

Sunday at 14:50, 20 minutes, H.1302 (Depage), H.1302 (Depage), Retrocomputing Alex Andreba , video

In this talk we'll explore the fascinating world of emulators and recompilation, by building together a dynamic recompiler for NES games, which will translate in real time code written for the game system into machine code directly executable by our host computer.

 "Hacking the last Z80 computer ever made" ( 2026 )

Sunday at 15:10, 20 minutes, H.1302 (Depage), H.1302 (Depage), Retrocomputing Michal Pleban , video

The Z80 CPU has been extremely popular in home computers of the eighties, but as 16-bit and 32-bit processors became more popular, the only new computers built using the Z80 were continuations of some legacy lines (like the Amstrad PCW).

And yet, in 1999 a company named Cidco unveiled a completely new computer line named the MailStation. with a Z80 CPU clocked at 12 MHz and 128 kB of RAM. It was a specialized machine for sending and receiving emails, addressed at people for whom configuring Web access on a PC was too complicated. Yet it was still a computer, with a screen, keyboard, means of communicating with the outside world and possibility of running user apps. Most likely the last new Z80 computer ever designed.

In my talk I would like to present this machine, show how it can be hacked to run custom software, and encourage the audience to join me in documenting the machine and writing custom firmware for it.

MailStation emulator: https://github.com/MichalPleban/mailstation-msemu

Host appliation to transfer software to the MailStation: https://github.com/MichalPleban/mailstation-mailtransfer

MailStation hardware documentation: https://github.com/MichalPleban/mailstation-hardware

 "Early Electronic Computing in Belgium: Analysis and Simulation of the IRSIA FNRS Mathematical Machine" ( 2026 )

Sunday at 15:30, 25 minutes, H.1302 (Depage), H.1302 (Depage), Retrocomputing Christophe Ponsard , slides , video

The first generation of computers (vacuum tube-based) emerged from WWII for scientific, military, or business purposes. In this pioneering time, the term “mathematical machines” was also used to distinguish them from human computers. This talk presents a working software simulator of the Belgian Mathematical Machine (MMIF), a little-known computer funded after WWII by IRSIA-FNRS and inaugurated 70 years ago at the Bell Company in Antwerp. We will show, including using the stepping mode, how it deals with programs and data using separate "RAM" drums (Harvard-style) and carries out computations with a high-precision floating-point calculation unit. You will discover the not-so-odd instruction set, coding style and how complex functions required for applications in ballistics and thermodynamics were implemented as a specific library. In addition to releasing the simulator as Open Source, the NAM-IP museum also publicly archived the available technical documentation.

 "Why build an 8-bit homebrew computer in 2026" ( 2026 )

Sunday at 15:55, 20 minutes, H.1302 (Depage), H.1302 (Depage), Retrocomputing Benoit Aveline , slides , video

Who needs to build their very own 8-bit homebrew computer in 2026? I'd say everyone should, especially if you work in IT! The Memo-1 is my personal attempt at understanding computers from the transistor up to the UI: a complete 6502-based system built from scratch, using a French Minitel as a smart terminal, with sound, joystick ports and an extension slot for expansions. In this talk, I'll share what I learned from building the Memo-1, from wiring the CPU and designing a simple bus architecture to writing a Minitel library in 6502 assembly. Beyond the nostalgia, it's been a fantastic hands-on way to rediscover and demystify how computers really work.

 "Dial-up revisited: Why it's needed and how to run an oldschool ISP" ( 2026 )

Sunday at 16:15, 25 minutes, H.1302 (Depage), H.1302 (Depage), Retrocomputing Özcan Oğuz , slides , video

Dial-up was the main way to connect to the Internet back in the 90s. Unfortunately, within the time almost all of the dial-up service providers are shut down, because of obvious reasons. It used to connect our living room to the world via 56 kbps (or less) bandwidth rate, in comparison, modern broadband global mean is two thousand times faster. But sometimes we still need it to connect our legacy hardware to the world, retro (or lowres) computing purposes, sometimes even to circumvent censorship.

In this talk, after a brief on the dial-up connection and it's nature, notes and methods on running a personal dial-up ISP and connecting to it will be covered; starting from hardware requirements for both ISP and client side and the software stack for GNU/Linux operating system to run a dial-up system, using only free/libre software.