Author Archives: Russ White
Author Archives: Russ White
A model is a tool to help you think about something. The 'Four Things' model described here helps me ask questions about networking protocols, how they work, and how to solve problems.
The post Beyond OSI: The ‘Four Things’ Model Of Networking appeared first on Packet Pushers.
When writing an IETF draft you need to delve into the security considerations of your proposal and contact the IANA--these are mandatory sections. You also need to be precise and clear with your language.
The post Writing An IETF Draft: Mandatory Sections And Language appeared first on Packet Pushers.
Looking back at my career in network engineering, beyond some basic concepts and naming conventions, I cannot remember using the OSI model once. Not for troubleshooting, not for protocol design. I have used the concept of layering, but never the OSI model specifically.
The post Is The OSI Model Good For Understanding How Networks Work? Not Really appeared first on Packet Pushers.
So far in this series we’ve discussed the history of the IETF, some of the tools you might want to use when building an IETF submission, and document formatting. There are other seemingly mystical concepts in the IETF process as well—for instance, what is a “document stream,” and what is a document’s “status?” Let’s look […]
The post Writing An IETF Draft: Document Streams And Document Status appeared first on Packet Pushers.
One of the biggest advantages of IPv6 is the ease of renumbering thanks to SLAAC and DHCPv6. Easy renumbering of IPv6 addresses should, in theory, make some privacy protection methods easy to implement. Here's how it works, and and how it doesn't solve all privacy problems.
The post Privacy And Networking Part 8: IPv6 Addresses And Privacy appeared first on Packet Pushers.
With the release of ChatGPT as a product, Microsoft brought Machine Learning (ML) and Artificial Intelligence (AI) back into focus for millions of users—including network operators, coders, and other folks in information technology. People are once against asking if this technology will make them redundant or how it might change their day-to-day jobs. As always, […]
The post Chatbot Attack Vectors And Failure Modes In Networking And IT appeared first on Packet Pushers.
This series started by discussing the history of the IETF and some of the tools you might use to build submissions to the IETF process. This, the second, post, will consider document formatting and two of the (sometimes) more difficult sections of an IETF draft to fill in. Formatting Just using one of the acceptable […]
The post Writing An IETF Draft: Formatting, Authorship, And Submissions appeared first on Packet Pushers.
What can we learn from a Microsoft study of switch failures in its data centers? Hardware failures are more common that software failures, the law of large numbers can overwhelm your resiliency and redundancy planning, and open-source software can be admirably robust.
The post Thoughts On Switch Failures appeared first on Packet Pushers.
In this first blog in a new series, Russ White demystifies the IETF and the process of how ideas move through the process to a Request for Comment (RFC). He also discusses the IETF itself, its culture and it how works, and how anyone, including you, can submit an idea for comments and consideration.
The post How To Submit Your Ideas To The IETF appeared first on Packet Pushers.
In the final post in this privacy series, Russ White looks at privacy information that can be gleaned from DNS queries, and outlines essential steps in developing your breach plan. Don't have a breach plan? Here's your opportunity to start one.
The post Privacy And Networking Part 7: DNS Queries And Having A Breach Plan appeared first on Packet Pushers.
Thus far, I’ve concluded that IP addresses and other information network operators handle is personally identifiable (PII) and covered under privacy and security regulations. I’ve also looked at the data lifecycle and user rights related to private data. What are some best practices network operators can follow to reduce their risk? The simplest way to […]
The post Privacy and Networking Part 6: Essential Questions For Privacy Best Practices appeared first on Packet Pushers.
In the previous posts in this series, I concluded that privacy is everyone’s responsibility, that IP addresses (and a lot of other information network engineers handle) are protected information, and while processing packets probably doesn’t trigger any privacy warnings, network logging should and does. In this post, I want to start answering the question—okay, what […]
The post Privacy And Networking Part 5: The Data Lifecycle appeared first on Packet Pushers.
In the last post on this topic, I concluded that IP addresses are protected information—operators should handle users’ IP addresses according to privacy best practices. But I also concluded that because IP addresses used for forwarding— Are collected (or carried through the network) only for forwarding The user cannot reasonably expect the network to forward […]
The post Privacy And Networking Part 4: Logging appeared first on Packet Pushers.
Does an IP address need to be treated like other Personally Indentifiable Information (PII)?
The post Privacy And Networking Part 3: Is An IP Address Protected Information For Privacy? appeared first on Packet Pushers.
Given the arguments from the first article in this series, if privacy should be and is essential—what does the average network engineer do with this information? How does privacy impact network design and operations? To answer this question, we need to look at two other questions. First, what is private information, precisely? The network carries […]
The post Privacy And Networking Part 2: Legal And Ethical Privacy appeared first on Packet Pushers.
In the first post on a series on privacy and networking, Russ White makes the case that privacy matters not just for infosec, risk management, or compliance, but as a human right.
The post Privacy And Networking: Part 1 – Why Privacy? appeared first on Packet Pushers.