
Over the few last hours, a dozen news stories have broken about how an attacker attempted (and perhaps managed) to steal cryptocurrencies using a BGP leak.

CC BY 2.0 image by elhombredenegro
The Internet is composed of routes. For our DNS resolver 1.1.1.1 , we tell the world that all the IPs in the range 1.1.1.0 to 1.1.1.255 can be accessed at any Cloudflare PoP.
For the people who do not have a direct link to our routers, they receive the route via transit providers, who will deliver packets to those addresses as they are connected to Cloudflare and the rest of the Internet.
This is the normal way the Internet operates.
There are authorities (Regional Internet Registries, or RIRs) in charge of distributing IP addresses in order to avoid people using the same address space. Those are IANA, RIPE, ARIN, LACNIC, APNIC and AFRINIC.
The broad definition of a BGP leak would be IP space that is announced by somebody not allowed by the owner of the Continue reading
Equal Cost Multi-Path (ECMP) routes are a big component of all the super-trendy data center network designs that are en vogue right now. Clos networks and the ECMP that underpins those designs are the best tools we have today to deliver high bandwidth, highly fault-tolerant networks. Clos networks are rich with multiple equal cost paths to get from Server A to Server B.

2 Paths from Host to ToR * 8 Paths from ToR to Leaf * 16 Paths from Leaf to Spine * 8 Paths from Spine to Leaf * 2 Paths from Leaf to ToR
= 4096 Possible Unique Paths between Server A and Server B
FYI: The above is an actual customer network. Names have been changed to protect the innocent and colors have been added because a rainbow of links is more fun!
Cumulus has been working to improve the behavior of ECMP routes in the Linux kernel over the last several kernel releases. Now, with kernel v4.17, we have achieved the milestone we set out to attain. As of Linux kernel v4.17, Linux hosts can now leverage the “5-Tuple” style hashing used inside traditional network devices for Continue reading
The performance management company released a new version of its platform that integrates with Cisco’s new SAN telemetry streaming and AppDynamics.
Virtualization is a key skillset for any Linux Administrator or Engineer. Not all workloads are useful in the cloud, and companies are quickly realizing this in terms of increasing cloud bills. You can bring those workloads in house, but what about licensing? KVM is a favorite of home labs because of the low cost of entry (free). KVM is also a favorite of shops that know how powerful open source is. Gain a greater understanding of how any virtualization platform works by utilizing common linux tools to manage and orchestrate your virtual machines. KVM forms the basis for upstream virtualization projects like oVirt and RHEV as well. Learn how to setup a virtualized environment only armed with an install usb from your favorite linux distribution.

Any workload can be run on a KVM virtual machine platform. Docker/Kubernetes? No problem. Databases, front end web services, workloads requiring dedicated hardware such as GPU’s or HBA’s, KVM can run any of these workloads with near bare metal performance.
What You’ll Learn:
You can watch this course on our streaming Continue reading
The tests could break new ground in terms of supporting 5G use cases using very high mmWave spectrum bands.
The operator said it is on track to launch 5G in a handful of markets later this year but is still cagey about the details. Launch cities remain a mystery.
I was over at ipspace to talk to Ivan and several other folks about openfabric. This is one of those situations where… Well, the algorithm openfabric uses to calculate fabric location has changed slightly in the last week. Welcome to the world of networking technology. 
Cyber warfare and cryptomining dominated RSA Conference keynotes and talks with technologists, who advocated a back-to-basics approach to network security.
In this SDxCentral eBrief, we look at the types of security threats that are becoming more prevalent and examine some of the latest techniques and tools that enterprises are employing to make sure that their business assets in the cloud are secure.

A deep, comprehensive review of BPF