If you’re in Buenos Aires on April 2-3 and are interested in building, come join the IETF Hackathon. CloudFlare and Mozilla will be working on TLS 1.3, the first new version of TLS in eight years!
At the hackathon we’ll be focusing on implementing the latest draft of TLS 1.3 and testing interoperability between existing implementations written in C, Go, OCaml, JavaScript and F*. If you have experience with network programming and cryptography, come hack on the latest and greatest protocol and help find problems before it is finalized. If you’re planning on attending, add your name to the Hackathon wiki. If you can’t make it, but implementing cryptographic protocols is your cup of tea, apply to join the CloudFlare team!
We’re very excited about TLS 1.3, which brings both security and performance improvements to HTTPS. In fact, if you have a client that speaks TLS 1.3 draft 10, you can read this blog on our TLS 1.3 mirror: tls13.cloudflare.com.
We hope to see you there!
Today, we’re going to talk about performance and especially network performance. The main goal of this article is to present to you a way to boost progressively your network bandwidth at minor costs. Welcome to the wonderful world of the multipathing! We can define the multipathing as a method to use more than one way […]
The post Multipathing With NFS4.1 And KVM appeared first on Packet Pushers.
Today, we’re going to talk about performance and especially network performance. The main goal of this article is to present to you a way to boost progressively your network bandwidth at minor costs. Welcome to the wonderful world of the multipathing! We can define the multipathing as a method to use more than one way […]
The post Multipathing With NFS4.1 And KVM appeared first on Packet Pushers.
A recent report from Infoblox says the U.S. far and away hosted the largest number of domains that were used “for hosting and launching attacks using malicious DNS infrastructure” in the fourth quarter of 2015.
The post United States Hosts 72% Of Compromised DNS Domains appeared first on Packet Pushers.
A recent report from Infoblox says the U.S. far and away hosted the largest number of domains that were used “for hosting and launching attacks using malicious DNS infrastructure” in the fourth quarter of 2015.
The post United States Hosts 72% Of Compromised DNS Domains appeared first on Packet Pushers.
I’ve covered macvlans in the Bridge vs Macvlan post. If you are new to macvlan concept, go ahead and read it first.
To recap: Macvlan allows you to configure sub-interfaces (also termed slave devices) of a parent, physical Ethernet interface (also termed upper device), each with its own unique MAC address, and consequently its own IP address. Applications, VMs and containers can then bind to a specific sub-interface to connect directly to the physical network, using their own MAC and IP address.
Macvlan is a near-ideal solution to natively connect VMs and containers to a physical network, but it has its shortcomings:
Now I know why the IETF isn't doing stuff that Enterprises care about.
The post The IETF and Not The Enterprise appeared first on EtherealMind.
The post Worth Reading: Trademarking hashtags appeared first on 'net work.
Take a Network Break! We serve up a bounty of tech news, including Microsoft's influence over hardware players, Cisco's big reorganization, a new Citrix appliance & more.
The post Network Break 80: Microsoft Moves Markets, Cisco Reorganizes appeared first on Packet Pushers.
Take a Network Break! We serve up a bounty of tech news, including Microsoft's influence over hardware players, Cisco's big reorganization, a new Citrix appliance & more.
The post Network Break 80: Microsoft Moves Markets, Cisco Reorganizes appeared first on Packet Pushers.
So you’ve spent time asking what, observing the network as a system, and considering what has actually been done in the past. And you’ve spent time asking why, trying to figure out the purpose (or lack of purpose) behind the configuration and design choices made in the past. You’ve followed the design mindset to this point, so now you can jump in and make like a wrecking ball (or a bull in a china shop), changing things so they’re better, and the new requirements you have can fit right in. Right?
Wrong.
As an example, I want to take you back to another part of a story I told here about my early days in the networking world. Before losing the war over Banyan Vines, I actually encountered an obstacle that should have been telling—but I was too much of a noob at the time to recognize it for the warning it really was. At the time, I had written a short paper comparing Vines to Netware; the paper was, perhaps, ten pages long, and I thought it did a pretty good job of comparing the two network operating systems. Heck, I’d even put together a page showing how Vines Continue reading
It's selling the unit for less than it paid for it.
Change control isn’t so bad. With the underlying goal of risk mitigation, good change control can save a network engineer from the dreaded resume generating event we sweat over during cutovers. Change management frameworks such as ITIL layer an element of bureaucracy over network operations to provide a basis for a quantitative approach to IT […]
The post Change Control: Embrace the Red Tape appeared first on Packet Pushers.
Change control isn’t so bad. With the underlying goal of risk mitigation, good change control can save a network engineer from the dreaded resume generating event we sweat over during cutovers. Change management frameworks such as ITIL layer an element of bureaucracy over network operations to provide a basis for a quantitative approach to IT […]
The post Change Control: Embrace the Red Tape appeared first on Packet Pushers.
Ecomp would be the mother of SDN open source groups.
The post Worth Reading: Building a (human) network, part 2 appeared first on 'net work.