Archive

Category Archives for "Networking"

Ansible For Network Automation Part 5: Ansible Variables And Folder Structures – Video

In this lesson on Ansible and network automation, Josh VanDeraa reviews a common folder structure for use in Ansible and discusses where to define variables in Ansible including: -all.yml -group_vars folder -host_vars folder -importing variables from another file -accessing variables from other devices Josh has created a GitHub repo to store additional material, including links […]

The post Ansible For Network Automation Part 5: Ansible Variables And Folder Structures – Video appeared first on Packet Pushers.

Mantis – the most powerful botnet to date

Mantis - the most powerful botnet to date
Mantis - the most powerful botnet to date

In June 2022, we reported on the largest HTTPS DDoS attack that we’ve ever mitigated — a 26 million request per second attack - the largest attack on record. Our systems automatically detected and mitigated this attack and many more. Since then, we have been tracking this botnet, which we’ve called “Mantis”, and the attacks it has launched against almost a thousand Cloudflare customers.

Cloudflare WAF/CDN customers are protected against HTTP DDoS attacks including Mantis attacks. Please refer to the bottom of this blog for additional guidance on how to best protect your Internet properties against DDoS attacks.

Have you met Mantis?

We named the botnet that launched the 26M rps (requests per second) DDoS attack "Mantis" as it is also like the Mantis shrimp, small but very powerful. Mantis shrimps, also known as “thumb-splitters”, are very small; less than 10 cm in length, but their claws are so powerful that they can generate a shock wave with a force of 1,500 Newtons at speeds of 83 km/h from a standing start. Similarly, the Mantis botnet operates a small fleet of approximately 5,000 bots, but with them can generate a massive force — responsible for the largest Continue reading

8 enterprise storage trends to watch

The data storage industry is experiencing a major transformation driven by multiple factors, including the need for security, speed, efficiency, and lower costs. IT research firm Gartner recently predicted 23-times growth in shipped petabytes through 2030, a trajectory that promises to radically reshape and redefine current data center and IT operations. To stay on top of the storage game, keep a close eye on these eight trends.1. DNA storage DNA, when used as a data storage medium, promises a far higher capacity and more resilient storage environment than traditional storage architecture. DNA storage allows molecular-level data storage, archiving information directly into DNA molecules.To read this article in full, please click here

8 enterprise storage trends to watch

The data storage industry is experiencing a major transformation driven by multiple factors, including the need for security, speed, efficiency, and lower costs. IT research firm Gartner recently predicted 23-times growth in shipped petabytes through 2030, a trajectory that promises to radically reshape and redefine current data center and IT operations. To stay on top of the storage game, keep a close eye on these eight trends.1. DNA storage DNA, when used as a data storage medium, promises a far higher capacity and more resilient storage environment than traditional storage architecture. DNA storage allows molecular-level data storage, archiving information directly into DNA molecules.To read this article in full, please click here

Kubernetes For Network Engineers – Lesson 4: Kubernetes Networking Under The Hood – Video

In this video, host Michael Levan shows the basics of using Weave to enable simple networking within Kubernetes. He also shares how to find instructions to use Cisco ACI and Flannel. Michael Levan brings his background in system administration, software development, and DevOps to this video series. He has Kubernetes experience as both a developer […]

The post Kubernetes For Network Engineers – Lesson 4: Kubernetes Networking Under The Hood – Video appeared first on Packet Pushers.

Hedge 138: The Robustness Principle

Most network engineers take it as a “given” that the robustness principle is the “right way” to build protocols and networks—”be conservative in what you send, and liberal in what you receive.” The idea behind the robustness principle is that implementations should implement specifications as accurately as possible, but they should also accept malformed and otherwise erroneous data, process the best they can, and drop the bits they cannot process. This should allow the network to operate correctly in the face of defects and other failures. A recent draft, draft-iab-protocol-maintenance/, challenges the assumptions behind the robustness principle. Join Tom and Russ as they discuss the robustness principle and its potential problems.

download

Enabling Continuous Compliance for a Global Financial Gluware Customer: Livestream 28 June 2022 1/7 – Video

Regulated industries such as financials often feel the pain of a current audit or upcoming audit. Implementing network automation with a product like Gluware can enable continuous compliance. Julie Wehling, Solutions Architect, Gluware; and Greg Ferro, Co-Founder, Packet Pushers discuss a real-world customer use case in which a global financial services company used Gluware to […]

The post Enabling Continuous Compliance for a Global Financial Gluware Customer: Livestream 28 June 2022 1/7 – Video appeared first on Packet Pushers.

OpenSSL Heap Memory Corruption Vulnerability Fixed

Ever since CVE-2022-2274, didn’t reach Heartbleed levels of ick, but it was more than bad enough. What happened was that the OpenSSL 3.0.4 release introduced a serious RSA bug in X86-64 CPUs supporting the AVX512 IFMA instructions. This set of CPU single instruction, multiple data (SIMD) instructions for floating-point operations per second (FLOPS) was introduced in 2018. You’ll find it in pretty much every serious Intel processor, from Skylake to AMD’s forthcoming Zen 4. In other words, it’s probably in every server you’re currently running. Is that great news or what? Memory Corruption The problem is that RSA 2048-bit private key implementations fail on this chip architecture. Adding insult to injury, memory corruption results during the computation. The last straw? An attacker can use this memory corruption to trigger a remote code execution (RCE) on the machine. Exploiting it might not be easy, but it is doable. And, even if an attack isn’t that reliable, if it’s used to hit a server that constantly respawns, say a web server, it Continue reading

Juniper upgrades management platform, adds a switch

Juniper Networks has upgraded its cloud-based management platform and introduced a new switch family for campus and branch networks.On the management side, Juniper says the goal is to simplify network operations for organizations with a mix of campus, branch, micro-site, and remote-worker settings, and it is doing that by adding features to its Mist AI/ML cloud-based management platform and its Marvis virtual network assistant. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Juniper upgrades management platform, adds a switch

Juniper Networks has upgraded its cloud-based management platform and introduced a new switch family for campus and branch networks.On the management side, Juniper says the goal is to simplify network operations for organizations with a mix of campus, branch, micro-site, and remote-worker settings, and it is doing that by adding features to its Mist AI/ML cloud-based management platform and its Marvis virtual network assistant. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Juniper upgrades management platform, adds a switch

Juniper Networks has upgraded its cloud-based management platform and introduced a new switch family for campus and branch networks.On the management side, Juniper says the goal is to simplify network operations for organizations with a mix of campus, branch, micro-site, and remote-worker settings, and it is doing that by adding features to its Mist AI/ML cloud-based management platform and its Marvis virtual network assistant. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Starlink and Couchbase — Accelerating Innovation to the Stars

If data is the lifeblood of enterprise applications, networks are the arteries. Wayne Carter Wayne is vice president of engineering at Couchbase. Before Couchbase, Wayne spent seven years at Oracle as the architect responsible for driving mobile innovation within the CRM and SaaS product lines. He has 10 patents and patents pending from his work there. Networks are so vital because they enable business, human and mission-critical processes by connecting organizations with customers, employees and partners, increasing efficiency, powering automation, driving engagement and accelerating productivity. Networks are the glue that knit modern applications together. But apps can only be as available and fast as the network that underpins them. Achieving high levels of reliability and speed are keys to success. Network disruptions and slowness are a daily reality that lead to downtime with Starlink. Dancing with the Stars Continue reading