Archive

Category Archives for "Networking"

What’s behind the Linux umask

The umask setting plays a big role in determining the permissions that are assigned to files that you create. But what's behind this variable and how do the numbers relate to settings like rwxr-xr-x?First, umask is a setting that directly controls the permissions assigned when you create files or directories. Create a new file using a text editor or simply with the touch command and its permissions will be derived from your umask setting. You can look at your umask setting simply by typing umask on the command line.$ umask 0022 Where the umask setting comes from The umask setting for all users is generally set up in a system-wide file like /etc/profile, /etc/bashrc or /etc/login.defs -- a file that's used every time someone logs into the system. The setting can be overidden in user-specific files like ~/.bashrc or ~/.profile since these files are read later in the login process. It can also be reset on a temporary basis at any time with the umask command.To read this article in full or to leave a comment, please click here

Truth Lives in the Open: Lessons from Wikipedia

Victoria Coleman, CTO, Wikimedia Foundation

Moderator: Michelle Zatlyn, Co-Founder & COO, Cloudflare

Photo by Cloudflare Staff

MZ: What is the Wikimedia Foundation?

VC: We pride ourselves in aiming to make available information broadly
not-for-profit

We’re the 5th most visited site on the planet.
We are the guardians of the project. There are 12 projects that we support, Wikipedia is the most prominent but there are others that will be just as influential in the next 5 years: e.g. Wikidata.
299 languages

Let’s also talk about the things that we don’t do: we don’t do editing. We edit as community members but not as members of the foundation.

We don’t monetize our users, content, or presence. We are completely funded by donations, with an average donation of $15.

MZ: If your mission is to help bring free education to all, getting to everyone can be hard. So how do you get access to people in hard-to-reach areas?

VC: It’s definitely a challenge. We built this movement primarily in NA and EU, but our vision goes beyond that. We started doing some critically refined and focused research in Brazil, Mexico, Nigeria.

Trying to understand what global communities need in other Continue reading

Will Data Destroy Democracy?

Lawrence Lessig, Roy L. Furman Professor of Law and Leadership, Harvard Law School and Darren Bolding, CTO, Cambridge Analytica

Moderator: Matthew Prince, Co-Founder & CEO, Cloudflare

Photo by Cloudflare Staff

MP: If there’s one person responsible for the Trump presidency, it seems there is a compelling argument that that might be you.

DB: I very much disagree with that.

MP: How does Cambridge Analytica work, and how did the Trump campaign use it to win the presidency?

DB: we take that data and match it up with lists of voters, and combine that data science to come up with ideas about you who might want to sell a product to, or in teh case of politics, this is this person's’ propensity to vote, this is the candidate they are likely most interested in. WE also do all the digital advertising. By combining data with digital advertising, we have lots of power.

MP: so you don’t want to take credit for having won the election; but the campaign's use of data and targeting was an important factor in the election.

DB: Yes, and what Cambridge did was basically a great turnaround story.

MP: larry you ran a presidential Continue reading

OpenStack SDN – Skydiving Into Service Function Chaining

SFC is another SDN feature that for a long time only used to be available in proprietary SDN solutions and that has recently become available in vanilla OpenStack. It serves as another proof that proprietary SDN solutions are losing the competitive edge, especially for Telco SDN/NFV use cases. Hopefully, by the end of this series of posts I’ll manage do demonstrate how to build a complete open-source solution that has feature parity (in terms of major networking features) with all the major proprietary data centre SDN platforms. But for now, let’s just focus on SFC.

SFC High-level overview

In most general terms, SFC refers to packet forwarding technique that uses more than just destination IP address to decide how to forward packets. In more specific terms, SFC refers to “steering” of traffic through a specific set of endpoints (a.k.a Service Functions), overriding the default destination-based forwarding. For those coming from a traditional networking background, think of SFC as a set of policy-based routing instances orchestrated from a central element (SDN controller). Typical use cases for SFC would be things like firewalling, IDS/IPS, proxying, NAT’ing, monitoring.

SFC is usually modelled as a directed (acyclic) graph, where the first and Continue reading

Napalm Getting Started

Napalm is a network automation library written in python that abstracts the differences between libraries such as Juniper's pyez and Arista's pyeapi bringing a common interface across many API's. Napalm is well supported in the network community, originally started by David Barroso and Elisa...

As Seen on TV

Chris Cantwell, Co-Creator and Show Runner, Halt & Catch Fire

Moderator: John Graham-Cumming, CTO, Cloudflare

Photo by Cloudflare Staff

CC: first off, we have very low ratings! The story came from my father who worked in computers in the early 80s in dallas; later in california. The dynamic between those characters was influenced by my dad.

This was largely a story about reverse engineering. The underdog story was interesting: not Bill Gates, not Silicon Valley, but a different story about the computer world.

JGC: and you managed to do 4 seasons

CC: In four seasons we go from ‘83 to ‘94; we cover everything from small networks to building of internet backbone, rise in search and www

JGC: I watched it before I came; it gave me some bad memories because there were AOL disks

CC: We have an incredible prop team. Some comes from RI computer museum; i have to ask our prop master, he might have manufactured them from images online.

JGC: This is a show about tech but also about money; these people are trying to build companies. The same people trying again and again. Is that a metaphor for recycling something?

CC: Yes, i Continue reading

Private Companies, Public Squares

Daphne Keller, Director, Stanford Center for Internet & Society, and Lee Rowland, Senior Staff Attorney, ACLU Speech, Privacy & Technology Project

Moderator: Matthew Prince, Co-Founder & CEO, Cloudflare

Photo by Cloudflare Staff

MP: Technology and law seem like they are colliding more and more. Tech companies are being asked to regulate content. For a largely non-lawyer audience, give us some foundations about basic rules when you have content on your network?

LR: Communications 2.0 makes the 1st amendment almost quaint. The vast majority of speech that we exchange happens online. When it is hosted by private companies, the 1st amendment doesn’t constrain it. So this is a space governed by norms and individual choices of people like Matthew. In the wake of Cloudflare's decision to take down the Daily Stormer, Matthew penned a piece saying it’s scary that we have this power, and I exercised it. We have a completely unaccountable private medium of communication.

MP: There are shields for companies for this; What is intermediary liability and why is this a position at Google/Stanford?

DK: No one knows what it means; it’s a set of laws that tell platforms when they have to take down Continue reading

Betting on Blockchain

Juan Benet, Founder, Protocol Labs, and Jill Carlson, GM, Tezos Foundation

Moderator: Jen Taylor, Head of Product, Cloudflare

Photo by Cloudflare Staff

JT: Tell us about what BlockChain is

JC: Going back to 2008, advent of blockchain came with bitcoin white paper.

The word Blockchain wasn’t mentioned at that point, but that was the advent of this tech.

What it solved was niche problem called double spend problem. Creation of digital cash.

What you see in a bank account isn’t digital cash. The problem in cryptography was how to create digital cash that doesn't rely on 3rd party intermediary. This is what Bitcoin created.

JB: Blockchain packs in lots of stuff: useful as brand. Like internet/web in early 90s, the meaning is fuzzy.

Properties that all of these apps have in common:

Academic definition: A blockchain is an indelible chain of blocks; once you insert information into one of them it remains.

Marketing definition: many applications have been developed over last few years, all have to do with public verifiability. Reliance on cryptographic methods to achieve goals on clearing payments and the ability to check and verify.

Across the board, removing 3rd parties from equation. Establishing publicly verifiable Continue reading

The New Breed of Patent Trolls

Lee Cheng, President & Co-CLO, Symmetry IP LLC, and Vera Ranieri, Staff Attorney, Electronic Frontier Foundation

Moderator: Doug Kramer, General Counsel, Cloudflare

Photo by Cloudflare Staff

DK: Patent--IP issues and challenges are accelerating important supreme court cases. there’s also a flurry of legislative activity about patents. Good idea to talk about this topic: where is this going? How to push world in virtuous direction?

DK: current state of affairs. Vera: at the core is the patent itself, which is issued by and often adjudged by the patent office… is this where the problem lies?

VR: I like to blame everyone. How does someone get a patent in the first place? Someone comes up with an invention, patent attorney, documents it with opaque language, and files. The examiner then interprets the patent and searches for prior art, and says “I think this is what the patent owner is trying to claim.”

In the software space, it’s especially difficult. A lot of where inventing happens in software is right here, in businesses. People have a problem and find a solution by developing software. They don’t patent and publish.

Patent office tends to focus on patents.

DK: Talk about the Continue reading

If I Knew Then What I Know Now: Tales from the Early Internet

Paul Mockapetris, Inventor, DNS, and David Conrad, CTO, ICANN

Moderator: Matthew Prince, Co-Founder & CEO, Cloudflare

Photo by Cloudflare Staff

MP: You guys wrote all this stuff; why is the internet so broken?

PM: People complain about security flaws, but there is no security in original design of dns. I think of it that we haven’t had the right investment in rebuilding the infrastructure.

Original stuff was only good for 10 years, but we’ve been using it for 30.

DC: The fact that we were able to get Packard from one machine to another in the early days was astonishing in itself.

MP: So what are you worried about in terms of Internet infrastructure that we aren’t even thinking about?

PM: i’m worried about the fact that a lot of places like the ITF are very incremental in their thinking, and that people aren’t willing to take the next big jump. E.g. hesitancy to adopt blockchain

Being able to experiment and try new stuff is important.

The idea that you can't change anything because it will affect the security and stability of the internet. we need to weigh benefits and risks or we will eventually die of Continue reading

Making the World Better by Breaking Things

Ben Sadeghipour, Technical Account Manager, HackerOne, and Katie Moussouris, Founder & CEO, Luta Security

Moderator: John Graham-Cumming, CTO, Cloudflare

Photo by Cloudflare Staff

JGC: We’re going to talk about hacking

Katie Moussouris helps people how to work around security vulnerabilities.

Ben Sadeghipour is a technical account manager at HackerOne, and a hacker at night

JGC: Ben, you say you’re a hacker by night. Tell us about this.

BS: It depends who you ask: if they encourage it; or, we do it for a good reason. “Ethical hacker” - we do it for a good reason. Hacking can be illegal if you’re hacking without permission; but that’s not what we do.

JGC: You stay up all night

BS: I lock myself in the basement

JGC: Tell us about your company.

KM: I was invited to brief Pentagon when I worked at Microsoft; The pentagon was interested in the implementation of this idea in a large corporation like Microsoft.
“Hacking the pentagon” The adoption of Bug Bounty has been slow. We were interested in working with a very large company like Microsoft. There was interest in implementing ideas from private sector at Pentagon. I helped the internal team at Continue reading

A Cloud Without Handcuffs

Brandon Philips, Co-Founder & CTO, CoreOS, and Joe Beda, CTO, Heptio, & Co-Founder, Kubernetes

Moderator: Alex Dyner, Co-Founder & COO, Cloudflare

Photo by Cloudflare Staff

We’re exploring increasing risk of few companies locking in customers gaining more power over time.

AD: I want to hear your stories about how you got into what you do.

JB: Kubernetes faced problem of either having googlers use rbs or bring X to rest of world. We wanted to have Googlers and outside people using something similar. We chose to do it as open source because you play a different game when you’re the underdog. Through open source we could garner interest. We wanted to provide applicational mobility.

AD: Brandon, talk about your mission and why you started company.

BP: We started CoreOS four years ago; We spent a lot of time thinking about this problem and containers were natural choice. They are necessary for achieving our mission. We wanted to allow people to have mobility around their applications. We wanted to enable new security model through containers. So we started building a product portfolio

AD: There are tradeoffs between using a container or an open source tech; how do you think Continue reading

Smartphone users on Wi-Fi drive most website traffic

Web visits from desktops and tablets have declined dramatically, says Adobe Digital Insights in Adobe Mobile Trends Refresh — Q2 2017.The device people are using: their smartphone. And the majority of that device’s traffic is arriving via Wi-Fi connections, not mobile networks, the analytics-oriented research firm says. Adobe has been tracking over 150 billion visits to 400 websites and apps since 2015.The sites these mobile users are visiting are large-organization national news, media and entertainment, and retail — with over 60 percent of those smartphone visits connecting through Wi-Fi.To read this article in full or to leave a comment, please click here