Archive

Category Archives for "Networking"

Hedge 138: The Robustness Principle

Most network engineers take it as a “given” that the robustness principle is the “right way” to build protocols and networks—”be conservative in what you send, and liberal in what you receive.” The idea behind the robustness principle is that implementations should implement specifications as accurately as possible, but they should also accept malformed and otherwise erroneous data, process the best they can, and drop the bits they cannot process. This should allow the network to operate correctly in the face of defects and other failures. A recent draft, draft-iab-protocol-maintenance/, challenges the assumptions behind the robustness principle. Join Tom and Russ as they discuss the robustness principle and its potential problems.

download

Enabling Continuous Compliance for a Global Financial Gluware Customer: Livestream 28 June 2022 1/7 – Video

Regulated industries such as financials often feel the pain of a current audit or upcoming audit. Implementing network automation with a product like Gluware can enable continuous compliance. Julie Wehling, Solutions Architect, Gluware; and Greg Ferro, Co-Founder, Packet Pushers discuss a real-world customer use case in which a global financial services company used Gluware to […]

The post Enabling Continuous Compliance for a Global Financial Gluware Customer: Livestream 28 June 2022 1/7 – Video appeared first on Packet Pushers.

OpenSSL Heap Memory Corruption Vulnerability Fixed

Ever since CVE-2022-2274, didn’t reach Heartbleed levels of ick, but it was more than bad enough. What happened was that the OpenSSL 3.0.4 release introduced a serious RSA bug in X86-64 CPUs supporting the AVX512 IFMA instructions. This set of CPU single instruction, multiple data (SIMD) instructions for floating-point operations per second (FLOPS) was introduced in 2018. You’ll find it in pretty much every serious Intel processor, from Skylake to AMD’s forthcoming Zen 4. In other words, it’s probably in every server you’re currently running. Is that great news or what? Memory Corruption The problem is that RSA 2048-bit private key implementations fail on this chip architecture. Adding insult to injury, memory corruption results during the computation. The last straw? An attacker can use this memory corruption to trigger a remote code execution (RCE) on the machine. Exploiting it might not be easy, but it is doable. And, even if an attack isn’t that reliable, if it’s used to hit a server that constantly respawns, say a web server, it Continue reading

Juniper upgrades management platform, adds a switch

Juniper Networks has upgraded its cloud-based management platform and introduced a new switch family for campus and branch networks.On the management side, Juniper says the goal is to simplify network operations for organizations with a mix of campus, branch, micro-site, and remote-worker settings, and it is doing that by adding features to its Mist AI/ML cloud-based management platform and its Marvis virtual network assistant. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Juniper upgrades management platform, adds a switch

Juniper Networks has upgraded its cloud-based management platform and introduced a new switch family for campus and branch networks.On the management side, Juniper says the goal is to simplify network operations for organizations with a mix of campus, branch, micro-site, and remote-worker settings, and it is doing that by adding features to its Mist AI/ML cloud-based management platform and its Marvis virtual network assistant. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Juniper upgrades management platform, adds a switch

Juniper Networks has upgraded its cloud-based management platform and introduced a new switch family for campus and branch networks.On the management side, Juniper says the goal is to simplify network operations for organizations with a mix of campus, branch, micro-site, and remote-worker settings, and it is doing that by adding features to its Mist AI/ML cloud-based management platform and its Marvis virtual network assistant. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Starlink and Couchbase — Accelerating Innovation to the Stars

If data is the lifeblood of enterprise applications, networks are the arteries. Wayne Carter Wayne is vice president of engineering at Couchbase. Before Couchbase, Wayne spent seven years at Oracle as the architect responsible for driving mobile innovation within the CRM and SaaS product lines. He has 10 patents and patents pending from his work there. Networks are so vital because they enable business, human and mission-critical processes by connecting organizations with customers, employees and partners, increasing efficiency, powering automation, driving engagement and accelerating productivity. Networks are the glue that knit modern applications together. But apps can only be as available and fast as the network that underpins them. Achieving high levels of reliability and speed are keys to success. Network disruptions and slowness are a daily reality that lead to downtime with Starlink. Dancing with the Stars Continue reading

Ansible For Network Automation Lesson 2: Getting To Know Ansible – Video

In this lesson on using Ansible to automate network tasks, instructor Josh Vanderra covers the following topics: -Ansible origins -Inventory files -The Ansible playbook structure: Tasks Plays Playbooks Roles -Using the debug module Josh has created a GitHub repo to store additional material, including links and documentation: https://github.com/jvanderaa/AnsibleForNetworkAutomation You can subscribe to the Packet Pushers’ […]

The post Ansible For Network Automation Lesson 2: Getting To Know Ansible – Video appeared first on Packet Pushers.

BrandPost: Creating a Consistent User Experience Across the Network

By: Tom Hollingsworth, Networking Expert.Crucial to any user experience is consistency. After all, users can be fickle. They want things now. They might even want it to be fun, but more importantly, they require a consistent experience. Between increased speed or consistency, users most always pick consistency. No matter where they log in or on what device they happen to be using, especially when it comes to real-time communications experiences on an app, they want the same treatment time and time again. It’s crucial to their success.That consistent experience requirement also extends to aspects they may not see or even realize is vital to the capabilities they rely upon. Chief among them is security policy. Policy enforcement should not be predicated or determined by whether they are using a company-issued laptop inside the proverbial corporate firewall or not.To read this article in full, please click here

35,000 new trees in Nova Scotia

35,000 new trees in Nova Scotia

Cloudflare is proud to announce the first 35,000 trees from our commitment to help clean up bad bots (and the climate) have been planted.

35,000 new trees in Nova Scotia

Working with our partners at One Tree Planted (OTP), Cloudflare was able to support the restoration of 20 hectares of land at Victoria Park in Nova Scotia, Canada. The 130-year-old natural woodland park is located in the heart of Truro, NS, and includes over 3,000 acres of hiking and biking trails through natural gorges, rivers, and waterfalls, as well as an old-growth eastern hemlock forest.

The planting projects added red spruce, black spruce, eastern white pine, eastern larch, northern red oak, sugar maple, yellow birch, and jack pine to two areas of the park. The first area was a section of the park that recently lost a number of old conifers due to insect attacks. The second was an area previously used as a municipal dump, which has since been covered by a clay cap and topsoil.

35,000 new trees in Nova Scotia

Our tree commitment began far from the Canadian woodlands. In 2019, we launched an ambitious tool called Bot Fight Mode, which for the first time fought back against bots, targeting scrapers and other automated actors.

Our Continue reading

Twilight Zone: File Transfer Causes Link Drop

Long long time ago, we built a multi-protocol WAN network for a large organization. Everything worked great, until we got the weirdest bug report I’ve seen thus far:

When trying to transfer a particular file with DECnet to the central location, the WAN link drops. That does not happen with any other file, or when transferring the same file with TCP/IP. The only way to recover is to power cycle the modem.

Try to figure out what was going on before reading any further ;)

Twilight Zone: File Transfer Causes Link Drop

Long long time ago, we built a multi-protocol WAN network for a large organization. Everything worked great, until we got the weirdest bug report I’ve seen thus far:

When trying to transfer a particular file with DECnet to the central location, the WAN link drops. That does not happen with any other file, or when transferring the same file with TCP/IP. The only way to recover is to power cycle the modem.

Try to figure out what was going on before reading any further ;)

The ‘Cisco’ gear you bought from these companies could be counterfeit

Business entities in Florida and New Jersey, plus 25 storefronts on Amazon and eBay, sold old Cisco gear that had been cosmetically altered to seem like new, more advanced models, part of a conspiracy going back eight years.The counterfeit-distribution operation was selling the networking devices for a tenth what it would cost if they were legitimate, according to the US Department of Justice. It estimated the conspiracy took in more than $100 million in revenue, and that—if the equipment had been what it was purported to be—would have retailed for more than $1 billion. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here