Author Archives: Russ
Author Archives: Russ
According to ScadaFence, as quoted by Computer Weekly, industrial control systems are up next on hacker’s lists as a prime malware target. Apparently, they’ve grown tired of just defacing web sites and the like, and are moving to hard targets in meat space. What kind of damage could they do? Well, consider this attack, by way of Bruce Schneier:
Bruce Schneier moves the needle a little farther, discussing the current security model of confidentiality, integrity, and availability, and how it won’t work in the world that we’re building. Instead, he argues that it’s time to rethink our Continue reading
Disaggregation has been on the top of my mind a good bit recently, partially because of our work at LinkedIn around this topic. Zaid has just posted a piece on the LinkedIn Engineering Blog about Project Falco, which is our internal disaggregation project for our data centers. Just a little taste to convince you to jump over there and read this one, because I think this sort of thing will have a major impact in the networking industry over the next three to five years.
The post Worth Reading: Disaggregation at LinkedIn appeared first on 'net work.
One of the great things about APNIC is the amount of information about the state of the Internet Geoff Huston puts out each year. He’s recently posted two studies on the state of BGP and the state of IPv4 addresses as of 2015; they’re both well worth reading in full, but here are several key takeaways of particular interest.
BGP in 2015
Addressing in 2015
First, the size of the global (DFZ) table has crossed 512,000 routes. While the actual table size varies by your view of the network (BGP is a path vector protocol, which has many of the same attributes as a distance-vector protocol, including multiple views of the network), this is the first time the route view servers have actually crossed that number. Why is 512,000 a magic number? If there are 512,000 routes, there are likely 512,000 FIB entries (unless there’s some sort of FIB compression involved), and there are a number of older boxes that cannot support 512,000 routes in their FIB.
Second, the DFZ has been growing at a rate of about 7%-8% per year for a number of years. Given the number of new devices being added to the Internet, how can this Continue reading
The post Worth Reading: Standardized Models For Networking appeared first on 'net work.
In part 1 of this series, I pointed out that there are three interesting questions we can ask about BGP security. The third question I outlined there was this: What is it we can actually prove in a packet switched network? This is the first question I want dive in too—this is a deep dive, so be prepared for a long series. This question feels like it is actually asking three different things, what we might call “subquestions,” or perhaps “supporting points.” These three questions are:
These are the things I can try to prove, or would like to know, in a packet switched network. Note that I want to intentionally focus on the data plane and then transfer these questions to the control plane (BGP). This is the crucial point to remember: If I Continue reading
The post Worth Reading: Inside the Internet Archive appeared first on 'net work.
The post Worth Reading: History as big data appeared first on 'net work.
The post Worth Reading: IPv6 address allocation on hosts appeared first on 'net work.
Quite a lot seems to be going on on the technology side of things—as the morning paper points out, everything seems to be changing at once right now. Ever feel like you’re sipping from a firehose? Maybe there’s a reason… Let’s discuss just a few of these in a little more detail.
First, there has been a lot of discussion around IPv6 in the last year or so. The folks within the IETF who designed IPv6 decided to do “more than just” adding more address space, instead deciding to change some fundamental things about the way IP works in the process of developing a new protocol. For instance, fragmentation by network devices is gone in IPv6, and the option headers are much richer. These kind of fundamental changes in protocol design invariably lead to the question—what impact do these things have on performance? A recent series of tests set out to answer this question. The results are pretty clear; over time, as IPv6 has been deployed natively, the protocol’s performance has moved closer to the performance of IPv4. There are still some gaps, but they are narrowing. Those gaps may never be gone, but IPv6 may come close enough, over Continue reading
The post Worth Reading: Intel becomes irrelevant appeared first on 'net work.
The world of digital copyright is somewhat tangential to “real” security, but it’s a culture issue that impacts every network engineer in myriad ways. For instance, suppose you buy a small home router, and then decide you really want to run your own software on it. For instance, let’s say you really want to build your own router because you know what you can build will outperform what’s commercially available (which, by the way, it will). But rather than using an off box wireless adapter, like the folks at ARS, you really want to have the wireless on board.
Believe it or not, this would be considered, by some folks, as a pretty large act of copyright infringement. For instance, the hardware manufacturer may object to you replacing their software. Or the FCC or some other regulatory agency might even object because they think you’re trying to hog wireless spectrum, or because you don’t like what the wireless providers are doing. The EFF has a good piece up arguing that just such tinkering as replacing the operating system on a commercially purchased device is at the heart of digital freedom.
One of the most crucial issues in the fight for Continue reading
The post Worth Reading: Light at the end of the silicon appeared first on 'net work.
What would it take to secure BGP? Let’s begin where any engineering problem should begin: what problem are we trying to solve?
In this network—in any collection of BGP autonomous systems—there are three sorts of problems that can occur at the AS level. For the purposes of this explanation, assume AS65000 is advertising 2001:db8:0:1::/64. While I’ve covered this ground before, it’s still useful to outline them:
The post QOTW: Don’t keep your eye on the clock appeared first on 'net work.
The post Worth Reading: The IETF turns 30 appeared first on 'net work.