Archive

Category Archives for "Networking"

EU air passenger data retention system ready for take-off, says Parliament

Air passengers entering or leaving the European Union could soon have their personal details stored and shared among EU countries, after lawmakers voted Wednesday to move forward with the proposal.The creation of the passenger name record (PNR) system, recording such details as who flew where, when, and how they booked, is intended to help law enforcers fight terrorism and serious crime, but civil rights groups say it is disproportionate and undermines fundamental privacy rights.The European Parliament’s Civil Liberties, Justice and Home Affairs Committee (LIBE) quickly dealt with almost 900 amendments filed on the proposal, including two calling for its outright rejection, before agreeing to enter negotiations on a final text with the European Commission and the Council of the EU, composed of representatives of national governments.To read this article in full or to leave a comment, please click here

Open Compute Software Interface Platform Control Demonstration

This four minute demonstration from Mellanox is really well done. It provides a simple and direct demonstration of the OCP Platform Control system. I note the simplicity of the linux commands to drive the configuration of the switch. Especially, if you use Ansible/Puppet etc, you will appreciate how easy it is to configure and monitor […]

The post Open Compute Software Interface Platform Control Demonstration appeared first on EtherealMind.

Network Break 44

Network Break 44 analyzes cloud spending numbers from IDC, the impact of virtual appliances on hardware purchases, EMC and Symantec storage moves, and a new OpenStack appliance from Mirantis.

Author information

Drew Conry-Murray

I'm a tech journalist, editor, and content director with 17 years' experience covering the IT industry. I'm author of the book "The Symantec Guide To Home Internet Security" and co-author of the post-apocalyptic novel "Wasteland Blues," available at Amazon.

The post Network Break 44 appeared first on Packet Pushers Podcast and was written by Drew Conry-Murray.

Darkode computer hacking forum shuts after investigation spanning 20 countries

Law enforcement agencies from 20 countries working together have shut down a major computer hacking forum, and U.S. officials have filed criminal charges against a dozen people associated with the website, the U.S. Department of Justice announced.Darkode.com on Wednesday displayed a message saying the site and domain had been seized by the FBI and other law enforcement agencies.Darkode, a password-protected online forum for criminal hackers, represented one of the gravest threats to the integrity of data on computers across the world, according to David Hickton, U.S. attorney for the Western District of Pennsylvania. “Through this operation, we have dismantled a cyber hornets’ nest of criminal hackers which was believed by many, including the hackers themselves, to be impenetrable.”To read this article in full or to leave a comment, please click here

FBI, international law units smash infamous hacker bazaar Darkode

The FBI in concert with Interpol and other worldwide law enforcement teams say they have taken down the international cybercriminal site marketplace Darkode and arrested 70 people involved with the site. Darkode was an online, password-protected forum in which hackers and other cyber-criminals convened to buy, sell, trade and share malware, ransomware, information, ideas, and tools to facilitate unlawful intrusions on others’ computers and electronic devices, the FBI said. +More on Network World: GAO: Early look at fed’s “Einstein 3” security weapon finds challenges+To read this article in full or to leave a comment, please click here

Let users choose enterprise cloud applications

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Asked whether he was considering a cloud application for his company, a CIO of a mid-size organization said the downside risk of ripping and replacing the company’s existing on-premises application outweighed the productivity gains the cloud application might bring. Part of that risk, he felt, was his job security.

That sentiment is common. IT professionals, after all, are responsible for keeping the organization’s applications running and ensuring the security of sensitive data. When they do decide to make a software change, IT leaders traditionally consider criteria such as:

To read this article in full or to leave a comment, please click here

Objectivity Never Rests

objectivity

Being an independent part of the IT community isn’t an easy thing. There is a lot of writing involved and an even greater amount of research. For every word you commit to paper there is at least an hour of taking phone calls and interviewing leaders in the industry about topics. The rewards can be legion. So can the pitfalls. Objectivity is key, yet that is something where entire communities appear to be dividing.

Us Or Them

Communities are complex organisms with their own flow and feel. What works well in one community doesn’t work well in another. Familiarity with one concept doesn’t immediately translate to another. However, one thing that is universal across all communities is the polarization between extremes.

For instance, in the networking community this polarization is best characterized by the concept of “ABC – Anything But Cisco”. Companies make millions selling Cisco equipment every year. Writers and speakers can make a very healthy career from covering Cisco technologies. And yet there are a large number of companies and people that choose to use other options. They write about Juniper or install Brocade. They spend time researching Cumulus Linux or Big Switch Networks.

Knowing a little about Continue reading

Why you need to care more about DNS

When you say Domain Name System (DNS), you might think, naturally enough, of domain names and the technical details of running your Internet connection. You might be concerned about denial of service attacks on your website, or someone hijacking and defacing it.While those certainly matter, DNS isn't just for looking up Web URLs any more; it's used by software to check licences, by video services to get around firewalls and, all too often, by hackers stealing data out from your business. Plus, your employees may be gaily adding free DNS services to their devices that, at the very least, mean you're not in full control of your network configuration. It’s a fundamental part of your infrastructure that’s key to business productivity, as well as a major avenue of attack, and you probably have very little idea of what’s going on.To read this article in full or to leave a comment, please click here

Oracle fixes zero-day Java flaw and over 190 other vulnerabilities

Go ahead and update Java—or disable it if you don’t remember the last time you actually used it on the Web: Oracle’s latest patch, released Tuesday, fixes 25 vulnerabilities in the aging platform, including one that’s already being exploited in attacks.In addition to Java, Oracle also updated a wide range of other products, fixing a total of 193 vulnerabilities, 44 stemming from third-party components.The patched products include Oracle Database, Oracle Fusion Middleware, Oracle Hyperion, Oracle Enterprise Manager, Oracle E-Business Suite, Oracle Supply Chain Suite, Oracle PeopleSoft Enterprise, Oracle Siebel CRM, Oracle Communications Applications, Oracle Java SE, Oracle Sun Systems Products Suite, Oracle Linux and Virtualization, and Oracle MySQL.To read this article in full or to leave a comment, please click here

The Upload: Your tech news briefing for Wednesday, July 15

Intel’s second quarter numbers likely shadowed by falling PC salesIntel reports earnings Wednesday and it’s expected to be a lackluster quarter for the chip giant as PC sales continue to slow. Analysts expect revenue to be down 6 percent from last year, and profit is forecast to fall as well. PC shipments declined 10 percent last quarter, according to Gartner, and Intel’s results are likely to reflect that.Hacking Team CEO insists customers’ spy tools aren’t compromisedThe founder of the Italian surveillance software company that suffered a disastrous data breach last week sought to reassure clients on Tuesday, insisting that Hacking Team’s anti-terrorism tools have not been jeopardized. “If the client has followed our instructions there are no problems for security. Only a part of the source code has been stolen,” Hacking Team CEO David Vincenzetti said, adding that the hack, which resulted in the theft of 400GB of data and the publication of around 1 million company emails on the WikiLeaks website, had not compromised its most innovative products.To read this article in full or to leave a comment, please click here

The case for lifelong learning.

People often ask me why i keep studying and when i will be “done”.
To me, this type of question seems odd, because i am committed to lifelong learning.

I am of the opinion that going through life without learning something all the time would be a life wasted. I think this goes back to the early explorers. Discovering new things, whether it be a new continent or simply a piece of knowledge really excites a certain type of people.

I am by no means comparing myself to these great explorers, but i understand what drove these legendary people to do the things they did, whether it be Columbus or more recently modern day astronauts.

My studies, whether they be in the field of networking or more personal related, will continue until the day i leave this crazy world.

There so much information and knowledge thats readily available in our day and age, that i would find it hard to simply ignore it and just lean back and say: “thats it, im done!”.

As I write this post, its about 6am in the morning. Part of my morning ritual is getting to the office early and spending some time Continue reading

IPv6-test.com and SRX firewall policies

ipv6-test.com is a useful site for testing IPv4 & IPv6 connectivity. It checks that v4 & v6 are working as expected, and reports your browser v4/v6 preferences. It does have one oddity with ICMPv6 tests. Here’s what I did to work around it with my SRX setup.

The site runs a suite of tests and gives you a score out of 20. Most dual-stack home users will probably get 17/20. They deduct 1 point for no reverse DNS entry for v6, and 2 points for “ICMP Filtered”

icmp-test-fail

How can you improve your score ?

1. Reconfigure your firewall
Your router or firewall is filtering ICMPv6 messages sent to your computer. An IPv6 host that cannot receive ICMP messages may encounter problems like some web pages loading partially or not at all.

2. Get a reverse DNS record

The first one is fine, but the second issue is a worry. ICMP is a critical part of IPv6. It’s needed for things like Neighbor Discovery, and Packet Too Big messages.

Most home user firewall setups will be fairly simple. Basically ‘Allow everything out, and allow related traffic back in. Drop everything else.’ Surely the default policy on the SRX should be allowing related Continue reading

With fresh cash in hand, HackerRank wants to be the ‘default resume’ for coders

Good programmers are notoriously hard to find, but HackerRank thinks it has the answer. A fresh cash infusion suggests it may be on to something.Employers looking for programming talent begin by sponsoring coding “challenges” on HackerRank’s merit-based hiring platform—contests that force applicants to use the skills the company needs. For example, a company seeking a junior developer might sponsor a challenge from HackerRank’s library that says, “Given a list of points in the 2D plane, sort them in ascending order of their polar angle.” Alternatively, it could create its own and have HackerRank host and score it.To read this article in full or to leave a comment, please click here

Kubernetes networking with OpenContrail

OpenContrail can be used to provide network micro-segmentation to kubernetes, providing both network isolation as well as the ability to attach a pod to a network that may have endpoints in using different technologies  (e.g. bare-metal servers on VLANs or OpenStack VMs).

This post describes how the current prototype works and how packets flow between pods. For illustration purposes we will focus on 2 tiers of the k8petstore example on kubernetes: the web frontend and the redis-master tier that the frontend uses as a data store.

The OpenContrail integration works without modifications to the kubernetes code base (as off v1.0.0 RC2). An additional daemon, by the name of kube-network-manager, is started on the master. The kubelets are executed with the option: “–network_plugin=opencontrail”, which instructs the kubelet to execute the command:
/usr/libexec/kubernetes/kubelet-plugins/net/exec/opencontrail/opencontrail. The source code for both the network-manager and the kubelet plugin are publicly available.

When using OpenContrail as the network implementation the kube-proxy process is disabled and all pod connectivity is implemented via the OpenContrail vrouter module which implements an overlay network using MPLS over UDP as encapsulation. OpenContrail uses a standards based control plane in order to distribute the mapping between endpoint (i.e. pod) and Continue reading