Archive

Category Archives for "Networking"

Syria’s exam-related Internet shutdowns

Syria’s exam-related Internet shutdowns

To prevent cheating in exams many countries restrict or even shut down Internet access during critical exam hours. For most of June Syria is having planned Internet shutdowns during critical exam periods. The exam schedule is as follows:

Syria’s exam-related Internet shutdowns

I’m grateful to a Twitter user for the translation from the original Arabic and collating the data.

Cloudflare Radar allows anyone to track Internet traffic patterns around the world, and it has country-specific pages. The chart for the last seven days of Internet use in Syria as seen by Cloudflare shows two drops to almost zero corresponding to the first two exams on the schedule.

Syria’s exam-related Internet shutdowns

The Internet outage starts at around 0100 UTC (0400 local time) and ends about four and a half hours later at 0530 UTC (0830 UTC). This covers the period before the exams start apparently to prevent any figuring out the answers.

If you want to follow the other outages for the remaining seven exams you can see live data on the Cloudflare Radar Syria page.

Don’t Be Fooled by Agent Tesla’s Football Club Red Herring

Contributors: Subrat Sarkar (T-Rex), Jason Zhang (NSBU TAU)

Agent Tesla is a remote access tool (RAT) that is known for stealing credentials from several applications, including web browsers, VPN clients, and mail and FTP applications. It also supports keylogging, screen grabbing, and other functionality. Since it first came on to the scene in 2014, Agent Tesla has evolved into a fully customizable commercial malware tool, which is readily available on underground markets. Given the huge popularity of the malware, this threat has been thoroughly covered by the threat intelligence community, including our analysis in 2018 [1], our reports on COVID-19 related cyber threats [2] [3], and a recent article describing a surge of infections [4]. More recently, we detected a new wave of Agent Tesla attacks that exhibited some interesting characteristics, such as requesting a connection to top European football club websites.

In this blog post, we first present some of VMware’s NSX Advanced Threat Prevention telemetry and email metadata from the attack. We then provide our analysis detailing the most distinctive aspects of the attack, from the use of well-known European football club websites to key tactics, techniques, and procedures (TTPs).

The Agent Tesla Campaign

Figure 1 shows Continue reading

The Hedge 86: TCPLS

TCP and QUIC are the two primary transport protocols in use on the Internet today—QUIC carries a large part of the HTTP traffic that makes the web work, while TCP carries most everything else that expects reliability. Why can’t we apply the lessons from QUIC to TCP so we can merge these two protocols, unifying Internet transport? TCPLS is just such an attempt at merging the most widely used reliable transport protocols.

You can read more about TCPLS here.

download

Four New IXPs Take off in Central America and the Caribbean

According to the global IXP Database, as of January 2021, of the 630 registered Internet Exchange Points (IXPs), 229 are in Europe, 126 in North America, 140 in Asia-Pacific, 96 in Latin America and the Caribbean (LAC), and 39 in Africa. Although the LAC region is second-last on the list, there has been a strong […]

The post Four New IXPs Take off in Central America and the Caribbean appeared first on Internet Society.

Birth of the Cloud: A Q&A with Vint Cerf and Linode’s Christopher Aker

Mike Maney Mike Maney leads corporate communications for Linode. Over the years, he’s led global communications teams for high profile, culture-shifting businesses at Fortune 50 companies and helped early stage startups tell better stories. I have had the opportunity to work with a number of tech pioneers over the course of my career. So when an opportunity to interview two who were at the forefront of the internet and the cloud, I jumped at it. a vice president and chief internet evangelist for Google). Years later after the creation of TCP/IP, Linode, the company Aker built, turns 18 this year, I asked Cerf and Aker to weigh in on where we’ve been, where we are today, and where we’re going. You’ve both been in the business of cloud for many years. Looking back to when you first started in this business, how has Continue reading

Routing Protocols: Use the Best Tool for the Job

When I wrote about my sample katacoda hands-on lab on LinkedIn (mentioning how easy it is to set up an OSPF+BGP network), someone couldn’t resist asking:

I’m still wondering why people use two routing protocols and do not have clean redistribution points or tunnels.

Ignoring for the moment the fact that he missed the point of the blog post (completely), the idea of “using tunnels or redistribution points instead of two routing protocols” hints at the potential applicability of RFC 1925 rule 4.

Dr. Kanchana Kanchanasut: On Connecting with Communities

Dr. Kanchana Kanchanasut is defined by many firsts. She is well known for being the first Thai to establish email connection to the world. She was among the pioneers to establish Thailand’s research and education network. She registered the .th domain name, conducted Thailand’s first TV White Spaces trial, and started the first open and […]

The post Dr. Kanchana Kanchanasut: On Connecting with Communities appeared first on Internet Society.

Day Two Cloud 100: Get To Know Crossplane: An Infrastructure Control Plane For K8s

Crossplane is an open-source project that plugs into Kubernetes to serve as a control plane that can run across multiple private and public clouds. It allows infrastructure teams to compose infrastructure with all the required policies, permissions, and guardrails, while also providing APIs for developer self-service. Today's Day Two Cloud podcast dives into Crossplane and how it works with maintainer Daniel Mangum.

The post Day Two Cloud 100: Get To Know Crossplane: An Infrastructure Control Plane For K8s appeared first on Packet Pushers.

Day Two Cloud 100: Get To Know Crossplane: An Infrastructure Control Plane For K8s

Crossplane is an open-source project that plugs into Kubernetes to serve as a control plane that can run across multiple private and public clouds. It allows infrastructure teams to compose infrastructure with all the required policies, permissions, and guardrails, while also providing APIs for developer self-service. Today's Day Two Cloud podcast dives into Crossplane and how it works with maintainer Daniel Mangum.

Could antiferromagnetic chips replace silicon?

We probably wouldn’t have a Digital Age without silicon.The second most abundant element in the Earth’s crust (oxygen is No. 1), silicon is cheap and has the ability to conduct electricity and/or act as an insulator. Converted into silicon wafers, it powers the computers, smartphones and other electronic devices we use to work and, importantly, to avoid work. So clearly silicon is indispensable.Or maybe not. Our insatiable demand for more and more data, along with the need to store it, is pushing the limits of what silicon can deliver in terms of speed, density, and security. In a bid to find a worthy successor to silicon-based memory devices, MIT physicists are zeroing in something called antiferromagnets.To read this article in full, please click here

Could antiferromagnetic chips replace silicon?

We probably wouldn’t have a Digital Age without silicon.The second most abundant element in the Earth’s crust (oxygen is No. 1), silicon is cheap and has the ability to conduct electricity and/or act as an insulator. Converted into silicon wafers, it powers the computers, smartphones and other electronic devices we use to work and, importantly, to avoid work. So clearly silicon is indispensable.Or maybe not. Our insatiable demand for more and more data, along with the need to store it, is pushing the limits of what silicon can deliver in terms of speed, density, and security. In a bid to find a worthy successor to silicon-based memory devices, MIT physicists are zeroing in something called antiferromagnets.To read this article in full, please click here

The Opportunity Your Future Needs: How I Helped Build the Internet and My Career

A group of 40-50 youth waving at camera

Have you ever wondered how you can change the course of the Internet? Do you want to share your ideas about how to keep the Internet secure, trusted, and a force for good with leading technology companies, government officials, and expert leaders? Are you ready to transform your career and master your leadership skills through […]

The post The Opportunity Your Future Needs: How I Helped Build the Internet and My Career appeared first on Internet Society.

Unnumbered Ethernet Interfaces

Imagine an Internet Service Provider offering Ethernet-based Internet access (aka everyone using fiber access, excluding people believing in Russian dolls). If they know how to spell security, they might be nervous about connecting numerous customers to the same multi-access network, but it seems they have only two ways to solve this challenge:

  • Use private VLANs with proxy ARP on the head-end router, forcing the customer-to-customer traffic to pass through layer-3 forwarding on the head-end router.
  • Use a separate routed interface with each customer, wasting three-quarters of their available IPv4 address space.

Is there a third option? Can’t we pretend Ethernet works in almost the same way as dialup and use unnumbered IPv4 interfaces?

Calico Integration with WireGuard Using kOps

Reza Ramezanpour Reza is a developer advocate at Tigera, working to promote adoption of Project Calico. Before joining Tigera, Reza worked as a systems engineer and network administrator. It has been a while since I have been excited to write about encrypted tunnels. It might be the sheer pain of troubleshooting old technologies or countless hours of falling down the rabbit hole of a project’s source code that always motivated me to pursue a better alternative — without much luck. However, I believe luck is finally on my side. In this blog post, we will explore using open source Tigera announced a tech preview of its TLS were available to encrypt workloads’ traffic at higher TCP/IP layers, in this case, the application layer. However, WireGuard targets traffic at a lower layer, the transport layer, which makes it effective for a wider range Continue reading

How Do Surveillance Laws Impact the Economy?

In 2018 the Australian parliament passed the “TOLA” Act, expanding the government’s powers to bypass digital data protections, and bringing with it the potential for significant harm to the economy and to trust in digital services and the Internet. Under TOLA, law enforcement and security agencies can require “designated communications providers,” or other businesses associated […]

The post How Do Surveillance Laws Impact the Economy? appeared first on Internet Society.

Keeping the Internet on during Benin’s Presidential Elections

With protests intensifying and social media interruptions reported in the weeks leading up to Benin’s presidential elections on 11 April 2021, many Internet and civil rights organizations were growing nervous about the potential for another Internet shutdown. Internet access was cut for almost 24 hours during Benin’s legislative elections in 2019 and there has been […]

The post Keeping the Internet on during Benin’s Presidential Elections appeared first on Internet Society.

Is Your Perimeter Firewall Enough?

It’s not unnecessary, but a perimeter firewall is not enoughPicture this: innocent end-user at a mid-size commercial firm clicks on an email link originating in a phishing email attack. Sigh. The bad actor is now already behind the firewall. Without lateral controls, the exploit can quickly propagate throughout the network. In fact, according to our recent Threat Landscape Report, email is still the number one vector to deliver malware, and 4% of all emails are malicious. So if you have 701 emails in your inbox right now (no? just me?) 28 of them may be malicious. Yikes.  

See What Evaded the Perimeter Threat Landscape Report

Most data center traffic happens within the data center and behind perimeter firewalls—a.k.a. east-west traffic, internal traffic, or lateral traffic—as opposed to north-south traffic, which is inbound/outbound. Likewise, most of the high-profile attacks in recent times have involved malware sitting inside the network, moving laterally from server to server and remaining undetected for months. This is what causes real damage. You simply need more visibility and control in east-west traffic to prevent attackers’ lateral movement.

Perimeter Firewalls Weren’t Made to Secure East-West Traffic

It’s true, traditional appliance-based firewalls Continue reading