The RIPE 76 meeting starts next week in Marseille, which surprisingly is only the second RIPE meeting to have ever been held in France. RIPEs are always a key event for the Internet Society, with one of our colleagues, Jan Žorž, being a member of the RIPE Programme Committee, and another, Salam Yamout, being a member of the RIPE NCC Board. Andrei Robachevsky will be presenting during the Connect Working Group, and I’ll be there reporting on the highlights of the meeting, as well as staffing the MANRS stand on Thursday, so please come and say hello!
The Internet Society is also sponsoring the new RIPE on-site childcare service, whilst on Thursday we’ll be raising awareness of the MANRS initiative by organising a lunch for MANRS advocates, as well as having a stand in the exhibition area with goodies such as MANRS t-shirts and stickers.
The RIPE meeting is back to its usual Monday morning start after Dubai, and there’s three tutorials to choose from on Event-driven Network Automation and Orchestration using Salt (Mircea Ulinic), SRv6 Network Programming (Pablo Camarillo Garvia, Cisco), or IPv6 Security (Alvaro Vives, RIPE NCC).
The opening plenary commences at 14.00 CEST/UTC+2, and after the Continue reading
More and more network devices support REST API as the configuration method. While it’s not as convenient as having a dedicated cmdlet, it’s possible to call REST API methods (and configure or monitor network devices) directly from a PowerShell script, as Mitja Robas demonstrated during the PowerShell for Networking Engineers webinar.
You’ll need at least free ipSpace.net subscription to watch the video.
In January 2018, the WiFi Alliance announced that WPA3 was coming this year, a collection of security enhancements to address issues with WPA2.
Today, we discuss WPA3 with Dan Harkins, a scientist at Aruba Networks, a Hewlett Packard Enterprise company. Dan has been closely involved with WPA3 s development, and I heard Dan present on his work at Aruba Atmosphere 2018 in March of this year.
Dan was kind enough to join us today for a preview of what s coming, with a special focus on one aspect of WPA3 that interests me personally, Opportunistic Wireless Encryption (OWE).
We also discuss the fixes that WPA3 makes to WPA2, and when we can anticipate product support.
Paessler AG is the maker of PRTG Network Monitor. PRTG monitors your whole IT infrastructure 24/7 and alerts you to problems before users even notice. Find out more about the monitoring software that helps system administrators work smarter, faster, better. Visit paessler.com today.
Wi-Fi Alliance® introduces security enhancements – Wi-Fi Alliance
The post PQ 149: WPA3 And Wireless Security Improvements appeared first on Packet Pushers.
A recent report found 21 percent of open source serverless projects contained at least one critical vulnerability or misconfiguration.
Many Chinese service providers are reliant upon ZTE’s optical gear for their transport networks and backhaul. And switching to another vendor is not that easy.
With service-mesh technologies, such as Envoy and Istio, web services can effectively talk to each other and become building blocks to create applications.
One analyst said Ciena was the source of the current price war in the optical networking space.
The telecom will cut costs and employees as it attempts to evolve its legacy networks and fend off regulatory impact.
The software moves workloads between on-premises data centers and the cloud and allows customers to automate where their data lives.
Creating a safer and trusted Internet MUST involve education building and awareness raising. This is one message that came up at the women’s event during the 2018 Africa Internet Summit held in Dakar.
“Education should target mothers who do not always believe that they can have an important role in the Internet world and who are the ones educating the future generation of women in tech. Also, we should educate developers of applications used on the Internet to consciously include safety by design, as well as governments to enact cyber laws that protect their citizens,” one of the participants stated during her presentation. With this, they meant that not only individuals, but also companies and governments have an important role in building a safer and trusted Internet.
Raising awareness of Internet safety was another point raised by many of the participants. “In school, we are taught to use computers and the Internet, but we are not taught about how to use the Internet safely,” one participant stressed. The attendees called for educational systems to change. They also suggested addressing online privacy and safety concerns so girls can be aware from the very beginning.
Privacy of personal data was another important Continue reading
In January 2018, the Internet Society Nepal Chapter organized the first Nepal School on Internet Governance (npSIG) in collaboration with the Forum for Digital Equality. The initiative offered an intensive two-day learning course covering a wide list of topics at the Institute of Engineering Pulchowk in Kathmandu. The initiative helped participants to identify global and regional issues and facilitate the understanding of several aspects of Internet Governance, including access, diversity, security, privacy, IoT, and human rights within the Nepalese policy framework. The schedule included theoretical sessions, roleplays, and attendee engagement activities. All brilliant speakers presentations are available on sig.org.np for further consultation.
One of the major objectives of npSIG was to raise awareness among young people about Internet Governance issues and to promote their participation in the discussion. The speakers inspired analysis, critical thinking and motivated the audience to design effective questions and take action.
The opening speech delivered by Baburam Aryal, Chairperson at the Forum for Digital Equality, enhanced the understanding of the Internet Governance concept, which in Nepal is in the very early stages of development. The establishment of a proper ecosystem is complex as Continue reading
The post BGP and Traffic Engineering Mechanisms for WISPs appeared first on Noction.
A colleague just received an “Urgent Security Alert – Action Requested” email from Nest. At first glance it looked like either a phishing attempt or one of the way-too-often breach notifications we all receive these days. Instead, it was a real alert notifying him that the password he uses for his Nest account had been compromised in a data breach – not at Nest but somewhere else. Nest encouraged him to update to a unique password and enable two-step verification (additional authentication beyond a password, usually referred to as multi-factor authentication).
While it’s not clear exactly how Nest determined that the password was compromised, it could have come from security researcher Troy Hunt’s recently updated Pwned Passwords service (part of his “have i been pwned?” site). Via this service, you can enter a password to see if it matches more than half a billion passwords that have been compromised in data breaches. A hashed version of the full list of passwords can also be downloaded to do local or batch processing. (“Pwned” is video gamer talk for “utterly defeated,” as in “Last time we played, I pwned him.”)
Hunt created this service in response to the National Continue reading