Here at CloudFlare we are heavy users of the github.com/miekg/dns Go DNS library and we make sure to contribute to its development as much as possible. Therefore when Dmitry Vyukov published go-fuzz and started to uncover tens of bugs in the Go standard library, our task was clear.
Fuzzing is the technique of testing software by continuously feeding it inputs that are automatically mutated. For C/C++, the wildly successful afl-fuzz tool by Michał Zalewski uses instrumented source coverage to judge which mutations pushed the program into new paths, eventually hitting many rarely-tested branches.
go-fuzz applies the same technique to Go programs, instrumenting the source by rewriting it (like godebug does). An interesting difference between afl-fuzz and go-fuzz is that the former normally operates on file inputs to unmodified programs, while the latter asks you to write a Go function and passes inputs to that. The former usually forks a new process for each input, the latter keeps calling the function without restarting often.
There is no strong technical reason for this difference (and indeed afl recently gained the ability to behave like go-fuzz), but it's likely due to the different ecosystems in which they Continue reading
This post will give a brief overview of network configuration automation, describe its challenges and benefits and will set off a series of posts showing how to automate a configuration of a typical enterprise network.
Continue readingThe post Worth Listening: Optical for the Campus appeared first on 'net work.
Gartner has updated their networking hype cycle. Not surprisingly:
Gartner won’t give you free access to the graph, but you’ll find it in an article published on The Register.
A Dell SecureWorks survey explains how compromised sites can be used for highly selective attacks.
Big Switch, Clemson, and SDN go way back together.
The post HL: The Art of Network Architecture appeared first on 'net work.
C.S. Lewis, Letters to an American Lady
The post Good Works appeared first on 'net work.