
Our servers process a lot of network packets, be it legitimate traffic or large denial of service attacks. To do so efficiently, we’ve embraced eXpress Data Path (XDP), a Linux kernel technology that provides a high performance mechanism for low level packet processing. We’re using it to drop DoS attack packets with L4Drop, and also in our new layer 4 load balancer. But there’s a downside to XDP: because it processes packets before the normal Linux network stack sees them, packets redirected or dropped are invisible to regular debugging tools such as tcpdump.
To address this, we built a tcpdump replacement for XDP, xdpcap. We are open sourcing this tool: the code and documentation are available on GitHub.
xdpcap uses our classic BPF (cBPF) to eBPF or C compiler, cbpfc, which we are also open sourcing: the code and documentation are available on GitHub.

Tcpdump provides an easy way to dump specific packets of interest. For example, to capture all IPv4 DNS packets, one could:
$ tcpdump ip and udp port 53
xdpcap reuses the same syntax! xdpcap can write packets to a pcap file:
$ xdpcap /path/to/hook capture.pcap Continue reading

Storing passwords in clear text is a bonanza for insider threats. Who knows what they got ?
The post Insider Threats and Facebook’s Poor Password Management appeared first on EtherealMind.
AT&T pushed back its self-imposed deadline to provide nationwide 5G coverage from “early...
Developers taking advantage of the tie-up will not have to change how they code. They will just...
The 2.0 product is available as software-as-a-service, with SaaS services hosted by VMware now and...
In this episode of the Network Collective, John Fraizer, Denise Fishburn, and Trey Aspelund join the NC crew to talk about the importance of mentorship and practical advice on how to mentor and be mentored.
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
Cumulus built a new underlying infrastructure for the toolset so end-users can process massive...
The British government has stopped short of banning Huawei but wants to exclude the vendor from...
The k3OS uses the same declarative syntax as other Kubernetes resources. This allows a user to...
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post History Of Networking – MIME – Nathaniel Borenstein appeared first on Network Collective.
Why is hybrid cloud DNS with AWS hard? What has AWS recently done to make it better? Should we use the new Route 53 Resolver features? The Datanauts tackles these questions and other cloud DNS issues with guest Matt Adorjan. We also explore Matt's CloudPing utility that measures inter-region latency in AWS.
The post Datanauts 163: Hybrid Cloud DNS Design With AWS Route 53 appeared first on Packet Pushers.
As we have seen vividly in recent years, inadequate security and privacy protections in the Internet of Things (IoT) can have devastating impacts – on Internet users and core infrastructure. The high profile Mirai botnet distributed denial of service (DDoD) attack in 2016 was a dramatic example of the effects of poor security in IoT devices, and CloudPets connected teddy bears were withdrawn from sale by most retailers after it was revealed that millions of voice recordings between parents and their children were exposed. But the threats from these insecure devices don’t vanish when they are updated or recalled, since there is often a large number of them still in service, and still vulnerable.
Because of this, the Internet Society is particularly focused on improving the security and privacy of consumer IoT. As a rapidly growing area, it is especially vulnerable and has been exploited by malicious actors.
That’s why we’re encouraging manufacturers to adopt Trust by Design.
“Trust by Design” – an umbrella term that includes Privacy by Design and Security by Design – is an essential component of a healthy IoT ecosystem. It has significant implications beyond IoT for the health of the Internet as a whole, and Continue reading