Archive

Category Archives for "Networking"

Pluribus Netvisor ONE R7 Feature Spotlight: Kubernetes-aware Fabric with the KubeTracker™ Fabric Service

Today, Pluribus released Netvisor 7, which marks another major step forward in our mission to radically simplify deployment and operations for distributed cloud networking. One of the most innovative features of this release is a new suite of monitoring and visibility tools, including FlowTracker and KubeTracker™ fabric services.

In prior releases, Netvisor ONE OS and the Adaptive Cloud Fabric software could capture flow telemetry for TCP flows only. With the introduction of FlowTracker in R7, Pluribus now provides telemetry on every flow traversing the fabric, including TCP, UDP, ICMP and even infrastructure services flows like DCHP, DNS and more.

Amazingly, this comprehensive flow telemetry is achieved without the need for an expensive external TAP and TAP aggregation overlay infrastructure. The cost of procuring and deploying TAPS to capture packet flows for analysis can be daunting and often results in cost/benefit tradeoffs where TAPS are only installed at certain points in the network. With FlowTracker, that expense and those tradeoffs are eliminated, every flow in the fabric is captured, and flow metadata is exported to tools like our UNUM Insight Analytics platform.

The KubeTracker fabric service is a powerful new capability delivered by the Adaptive Cloud Fabric specifically for network operators Continue reading

WAF: Securing Applications at the Edge

Sheraline Barthelmy Sheraline is the head of product, marketing and customer success at Cox Edge, an edge cloud startup from Cox Communications. At Cox Edge, she's focused on developing the tools and systems that customers and developers rely on to build the next generation of edge applications. These days, brick-and-mortar or television-based bank robberies and heists seem old-fashioned no matter how well planned or executed. What the new “money” criminals are after is personal data. And the “banks” being attacked are the growing number of web applications. Studies show that web application attacks have become the single most significant cause of data breaches. According to NTT’s 2020 Global Threat Intelligence Report (GTIR), more than half (55%) of all attacks in 2019 were a mix of web application and application-specific attacks, up from 32% the year before. As organizations move away from VPNs, virtual machines and centralized management systems to distributing and even running applications at the edge, conventional perimeter-based security like network firewalls isn’t enough. The best defense is a firewall that can mitigate application-layer attacks. Web Application Firewall (WAF) A WAF helps protect web applications from application-layer attacks like cross-site scripting, SQL injection attacks, remote file inclusion and cookie Continue reading

How to stop running out of ephemeral ports and start to love long-lived connections

How to stop running out of ephemeral ports and start to love long-lived connections

Often programmers have assumptions that turn out, to their surprise, to be invalid. From my experience this happens a lot. Every API, technology or system can be abused beyond its limits and break in a miserable way.

It's particularly interesting when basic things used everywhere fail. Recently we've reached such a breaking point in a ubiquitous part of Linux networking: establishing a network connection using the connect() system call.

Since we are not doing anything special, just establishing TCP and UDP connections, how could anything go wrong? Here's one example: we noticed alerts from a misbehaving server, logged in to check it out and saw:

marek@:~# ssh 127.0.0.1
ssh: connect to host 127.0.0.1 port 22: Cannot assign requested address

You can imagine the face of my colleague who saw that. SSH to localhost refuses to work, while she was already using SSH to connect to that server! On another occasion:

marek@:~# dig cloudflare.com @1.1.1.1
dig: isc_socket_bind: address in use

This time a basic DNS query failed with a weird networking error. Failing DNS is a bad sign!

In both cases the problem was Linux running out of ephemeral ports. When Continue reading

Announcing the public launch of Cloudflare’s bug bounty program

Announcing the public launch of Cloudflare's bug bounty program
Announcing the public launch of Cloudflare's bug bounty program

Today we are launching Cloudflare’s paid public bug bounty program. We believe bug bounties are a vital part of every security team’s toolbox and have been working hard on improving and expanding our private bug bounty program over the last few years. The first iteration of our bug bounty was a pure vulnerability disclosure program without cash bounties. In 2018, we added a private bounty program and are now taking the next step to a public program.

Starting today, anyone can report vulnerabilities related to any Cloudflare product to our public bug bounty program, hosted on HackerOne’s platform.

Let's walk through our journey so far.

Announcing the public launch of Cloudflare's bug bounty program

Step 1: starting a vulnerability disclosure program

In 2014, when the company had fewer than 100 employees, we created a responsible disclosure policy to provide a safe place for security researchers to submit potential vulnerabilities to our security team, with some established rules of engagement. A vulnerability disclosure policy is an important first step for a company to take because it is an invitation to researchers to look at company assets without fear of repercussions, provided the researchers follow certain guidelines intended to protect everyone involved. We still stand by that policy and welcome Continue reading

BrandPost: Overcoming Digital Transformation Challenges in Financial Services with SD-WAN

By: Gabriel Gomane, Sr Product Marketing Manager, Aruba, a Hewlett Packard Enterprise company.Whether for customers or employees, the digital transformation occurring at financial institutions has only accelerated in recent years. With that digital transformation, financial services organizations face an increasing array of networking and security challenges. These challenges include: digitization and cloud migration; the increasing percent of the workforce working from home; maintaining a modern and resilient network infrastructure; and last but certainly not least – cybersecurity risks and regulatory compliance.In response, SD-WAN has emerged as a key enabler to tackle and overcome these challenges while accelerating business growth. To illustrate how, below are five SD-WAN use cases from the financial services industry.To read this article in full, please click here

Cato adds fine-grained CASB controls to SASE platform

SASE vendor Cato Networks is adding fine-grained cloud access security broker (CASB) controls to its platforms.When employees working from home or branch locations log into SaaS services such as Office 365 or Dropbox or Salesforce, a CASB gateway can track the applications employees access, where they log in from, and sometimes even what they do when using those applications.Previously, Cato only offered limited CASB controls, enabling companies to allow or prohibit the use of particular SaaS tools, says Dave Greenfield, Cato's director of technology evangelism. Now, individual behaviors can be controlled. For example, users might be allowed to download documents from certain cloud file-sharing providers but can only upload documents to a company's preferred platform.To read this article in full, please click here

Cato adds fine-grained CASB controls to SASE platform

SASE vendor Cato Networks is adding fine-grained cloud access security broker (CASB) controls to its platforms.When employees working from home or branch locations log into SaaS services such as Office 365 or Dropbox or Salesforce, a CASB gateway can track the applications employees access, where they log in from, and sometimes even what they do when using those applications.Previously, Cato only offered limited CASB controls, enabling companies to allow or prohibit the use of particular SaaS tools, says Dave Greenfield, Cato's director of technology evangelism. Now, individual behaviors can be controlled. For example, users might be allowed to download documents from certain cloud file-sharing providers but can only upload documents to a company's preferred platform.To read this article in full, please click here

Gartner: Worldwide IT spending to reach $4.5T in 2022

Research firm Gartner forecasts IT spending will reach nearly $4.5 trillion worldwide this year, with enterprise software, IT services, and data center systems leading the way. The projected $4.45 trillion in spending this year represents an increase of 5.1% compared with 2021.The largest growth segment is enterprise software, which is projected to grow 11% to $672 billion. However, Gartner includes the cloud market in the enterprise software market, and that's where the growth is. Read more: Gartner's top infrastructure and operations trends for 2022To read this article in full, please click here

Where have all the global network aggregators gone?

One of the key selling points of SD-WAN is the ability to use a variety of network transport options. Enterprises can select MPLS, dedicated Internet access, business broadband, or wireless broadband, for example – whatever makes the most sense, technically and economically, for each site that needs connectivity. Cultivating a mix of suppliers can allow enterprises to significantly reduce transport costs as well as improve the flexibility of their networks.The growth in SD-WAN deployments over the last four or five years created a sweet spot for Internet transport aggregators, which, frankly, had struggled to break into the enterprise market when it was dominated by traditional MPLS providers.To read this article in full, please click here

Gartner: Worldwide IT spending to reach $4.5T in 2022

Research firm Gartner forecasts IT spending will reach nearly $4.5 trillion worldwide this year, with enterprise software, IT services, and data center systems leading the way. The projected $4.45 trillion in spending this year represents an increase of 5.1% compared with 2021.The largest growth segment is enterprise software, which is projected to grow 11% to $672 billion. However, Gartner includes the cloud market in the enterprise software market, and that's where the growth is. Read more: Gartner's top infrastructure and operations trends for 2022To read this article in full, please click here

Introducing our exciting new ambassador program: Calico Big Cats

The Project Calico community is one of the most collaborative and supportive communities in the open-source space. Our community has shown great engagement through the years, which has helped us maintain and grow the project.

Thanks to our 200+ contributors from all over the world, Calico Open Source (the solution born out of the project) is powering 1.5M+ nodes daily across 166 countries. Our engineering team is committed to maintaining Calico Open Source as the leading standard for container and Kubernetes networking and security!

Given our community’s passion for Project Calico, we wanted to give its members a chance to inspire others by telling their stories. To this end, we are very excited to announce our new Calico Big Cats ambassador program!

What is Calico Big Cats?

Calico Big Cats is an ambassador program that provides a platform for our community to talk about their experiences with Calico. The goal is to help community members connect, inspire, and share common challenges and ways to overcome these challenges using Calico and other tools.

Why join Calico Big Cats?

If you have experience with Project Calico, recognize its value in the open-source networking and security domain, and are passionate about sharing Continue reading

SSH over bluetooth – cleanly

In my previous two posts I set up a login prompt on a bluetooth serial port and then switched to running SSH on it.

I explicitly did not set up an IP network over bluetooth as I want to minimize the number of configurations (e.g. IP address) and increase the chance of it working when needed.

E.g. firewall misconfiguration or Linux’s various “clever” network managers that tend to wipe out network interface configs would have more of a shared fate with the primary access method (SSH over normal network).

This post is about how to accomplish this more properly.

The problems now being solved are:

  • It wasn’t entirely reliable. The rfcomm tool is pretty buggy.

  • There was no authentication of the Bluetooth channel. Not as much a problem when doing SSH, but if there are passwords then there could be a man-in-the-middle attack.

  • The server side had to remain discoverable forever. So anyone who scans for nearby bluetooth devices would see your servers, and would be able to connect, possibly brute forcing passwords. Not as much of a problem if running SSH with password authentication turned off, but why broadcast the name of a server if you don’t Continue reading