Archive

Category Archives for "Networking"

Report: 5G network slicing could leave flaws for bad actors to exploit

5G networks that incorporate legacy technology could be vulnerable to compromise via a lack of mapping between transport and application layers, according to a report by Ireland-based AdaptiveMobile Security. 5G resources What is 5G? Fast wireless technology for enterprises and phones How 5G frequency affects range and speed Private 5G can solve some problems that Wi-Fi can’t Private 5G keeps Whirlpool driverless vehicles rolling 5G can make for cost-effective private backhaul CBRS can bring private 5G to enterprises Network slicing is central to realizing many of 5G’s more ambitious capabilities because it enables individual access points or base stations to subdivide networks into multiple logical sections—slices—effectively providing entirely separate networks for multiple uses. The slices can be used for different purposes—say, mobile broadband for end-users and massive IoT connectivity—at the same time, without interfering with each other.To read this article in full, please click here

Tech Bytes: Inside The Latest SASE Features Of Palo Alto Networks Prisma Access 2.0 (Sponsored)

oday on the Tech Bytes podcast, sponsored by Palo Alto Networks, we dive into Prisma Access 2.0 and how it differs from the first-generation version. We talk about cloud-delivered security, Zero Trust Network Access, the return of proxies, and the importance of user experience management for distributed work.

The post Tech Bytes: Inside The Latest SASE Features Of Palo Alto Networks Prisma Access 2.0 (Sponsored) appeared first on Packet Pushers.

Dridex Reloaded: Analysis of a New Dridex Campaign

Dridex is a banking Trojan. After almost a decade since it was first discovered, the threat is still active. According to report published by Check Point [1]Dridex was one of the most prevalent malware in 2020. The recent Dridex campaign detected by VMware demonstrates that this ongoing threat constantly evolves with new tactics, techniques, and procedures (TTPs), which exhibit great differences with respect to the variants we’ve collected from campaigns since April 2020 (as discussed in the section Comparison with old Dridex samples). 

In this blog post, we first examine the recent Dridex attack by looking into some of VMware’s NSX Advanced Threat Prevention telemetry, which showcases the magnitude of the campaign. We then present the analysis for the most distinctive aspects of the attack, from the techniques leveraged by the XLSM downloader to the main functionality of the DLL payloads. Finally, we provide a comparison to some other Dridex variants seen in the past, which leads to the conclusion that the Dridex variant from the January 2021 campaign is very different from previous variants. 

The Dridex Campaign 

The chart below shows Continue reading

The Insecurity of Ambiguous Standards

Why are networks so insecure?

One reason is we don’t take network security seriously. We just don’t think of the network as a serious target of attack. Or we think of security as a problem “over there,” something that exists in the application realm, that needs to be solved by application developers. Or we think the consequences of a network security breach as “well, they can DDoS us, and then we can figure out how to move load around, so if we build with resilience (enough redundancy) we’re already taking care of our security issues.” Or we put our trust in the firewall, which sits there like some magic box solving all our problems.

The problem is–none of this is true. In any system where overall security is important, defense-in-depth is the key to building a secure system. No single part of the system bears the “primary responsibility” for “security.” The network is certainly a part of any defense-in-depth scheme that is going to work.

Which means network protocols need to be secure, at least in some sense, as well. I don’t mean “secure” in the sense of privacy—routes are not (generally) personally identifiable information (there are always Continue reading

6G: Vast and mysterious promises

I know what you’re thinking. “6G? He wants to blather on about 6G, when we barely have 5G?” 5G resources What is 5G? Fast wireless technology for enterprises and phones How 5G frequency affects range and speed Private 5G can solve some problems that Wi-Fi can’t Private 5G keeps Whirlpool driverless vehicles rolling 5G can make for cost-effective private backhaul CBRS can bring private 5G to enterprises Point taken. But 5G’s seemingly interminable rollout should not preclude wildly premature and breathless anticipation over its successor. Let’s face it, the time will come when we’ll all be complaining about the limitations of puny little 5G. Plus, isn’t wildly premature and breathless anticipation the essence of technology publishing?To read this article in full, please click here

Network Break 326: Cloudflare Announces New WAN Services; Intel’s Turnaround Roadmap

Can Pat Gelsinger refloat the Intel container ship? Is Cloudflare's new magic WAN service all that new? What's behind the Fortinet/Linksys partnership? Is a tweet really worth $2.9 million? This week's Network Break podcast ponders these and other tech questions, plus listener FUs.

The post Network Break 326: Cloudflare Announces New WAN Services; Intel’s Turnaround Roadmap appeared first on Packet Pushers.

The Week in Internet News: Facebook Calls for Changes in Legal Protections for User Content

Rewriting the rules: Facebook, during a hearing in the U.S. Congress, called on lawmakers to revamp Section 230 of the Communications Decency Act of 1996, which protects websites from lawsuits for content posted by users, NBC News reports. Websites should be protected if they adopt user moderation practices largely in line with Facebook’s own rules, ZDNet noted. The change could give Facebook an advantage while upending much of the rest of the Internet, The Verge suggested.

Competition in space: The competition among satellite-based broadband providers is heating up, with OneWeb launching 36 new satellites from eastern Russia, The BBC reports. The company, now primarily owned by Indian conglomerate Bharti Global and the U.K. government, now has 146 broadband satellites deployed. The company plans to offer broadband service later this year to northern latitudes, including the U.K., Northern Europe, Alaska, Canada, and other areas. Meanwhile, three rural counties in North Carolina are testing broadband service from SpaceX, another satellite provider, as a way to provide Internet service to students, GCN says.

Bad virus information: Facebook and Twitter have removed millions of posts containing misinformation about COVID-19 in recent months, The Straits Times reports. Since last year, Continue reading

A new Cloudflare Web Application Firewall

A new Cloudflare Web Application Firewall
A new Cloudflare Web Application Firewall

The Cloudflare Web Application Firewall (WAF) blocks more than 57 billion cyber threats per day. That is 650k blocked HTTP requests per second. The original code that filters this traffic was written by Cloudflare’s now CTO and the WAF has since received many accolades including the highest score for ability to execute in the 2020 Gartner Magic Quadrant for WAF.

Because we value replacing code when it is no longer as maintainable, performant, or scalable as it once was, we regularly rewrite key parts of the Cloudflare stack. That’s necessary as our enormous growth makes yesterday’s solutions unworkable. For some time, we have been working on replacing that original LuaJIT code John wrote with new code, written in Rust, along with an improved UI.

We are now excited to announce a new Cloudflare Web Application Firewall.

Starting today, 10% of newly created accounts on Cloudflare will be given access to the new WAF whenever a Pro plan zone or above is added. This percentage will increase to 100% of new accounts over the month of April, after which migration efforts will commence for existing customers. Enterprise customers may migrate early by contacting their account team.

What’s changing

The Web Application Continue reading

Playing games with Tensorflow

As a fun project, I recently built a web app to play checkers online against the computer. This post tries to outline the methodology I used. If you want to checkout the results, I would encourage you to try the web link above, change the difficulty level to ‘hard’ and play a round against the computer. You will be playing against a very simple neural network model that is, as far as I can tell, reasonably effective.

The standard approach to developing a game AI for something like board games is the “MiniMax” algorithm. Implementing “MiniMax” for a game like checkers is a relatively simple task; one needs to components:

  • A method of generating valid moves for a play given a board position;
  • A scorer function that evaluates the “goodness” of a given board position for a play;

There are multiple sets of possible rules for the game of checkers. I used the “Spanish draughts” rule set popular in Portugal: men move forward only; flying kings and mandatory moves on a 8×8 board. The minimax algorithm is independent of the particular rule-set used.

The scorer function must be able to look at a given player position and determine a score. Continue reading

Playing games with Tensorflow

As a fun project, I recently built a web app to play checkers online against the computer. This post tries to outline the methodology I used. If you want to checkout the results, I would encourage you to try the web link above, change the difficulty level to ‘hard’ and play a round against the computer. You will be playing against a very simple neural network model that is, as far as I can tell, reasonably effective.

The standard approach to developing a game AI for something like board games is the “MiniMax” algorithm. Implementing “MiniMax” for a game like checkers is a relatively simple task; one needs to components:

  • A method of generating valid moves for a play given a board position;
  • A scorer function that evaluates the “goodness” of a given board position for a play;

There are multiple sets of possible rules for the game of checkers. I used the “Spanish draughts” rule set popular in Portugal: men move forward only; flying kings and mandatory moves on a 8×8 board. The minimax algorithm is independent of the particular rule-set used.

The scorer function must be able to look at a given player position and determine a score. Continue reading

NaaS: Network-as-a-service is the future, but it’s got challenges

As-a-service offerings have been around for more than 10 years with roots that are decades older than that, and now this ever-expanding category of service offerings includes enterprise network-as-a-service.NaaS enables enterprises to outsource network functionality at network Layers 4-7—such as software-defined WAN (SD-WAN) and application delivery controller (ADC)—as well as Layers 1-3, which includes switches and routers.[Get regularly scheduled insights by signing up for Network World newsletters.] Full adoption of NaaS is still in its early days because most enterprise network functions require physical hardware to transport data to and from endpoints and the data center or internet. That is a challenge to deliver as a service. The Layer 4-7 functions are already available in a cloud-delivery model.To read this article in full, please click here

netsim-tools: Release 0.4 Is Out

TL&DR: The new release of netsim-tools includes unnumbered interfaces, configuration modules, and OSPF configuration.

In mid-March, we enjoyed another excellent presentation by Dinesh Dutt, this time focused on running OSPF in leaf-and-spine fabrics. He astonished me when he mentioned unnumbered Ethernet interfaces being available on all major network operating systems. It was time to test things out, and I wanted to use my networking simulation builder to build the test lab.

TCP Congestion Control at IETF 110

IETF 110 was held virtually in March 2020. These are some notes I took on the topic of current research activities in the area of transport protocol flow control at the meeting of the Internet Congestion Control Research Group at that meeting.

Don’t Be Complex When Simple Will Do

Let’s say you’re a consultant working on a couple of internet edge design projects.

In the first scenario, you are designing an internet connection for a factory.

  1. There are a few hundred workers who access AWS using the internet-as-WAN for critical apps related to factory operations.
  2. The factory is automated, and metrics related to production line health and performance are analyzed in AWS.
  3. There is an IoT network used for physical security that relies on an internet-based SaaS product to run reports and distribute alerts.
  4. A group of executives have offices at one end of the factory. Because of the pandemic, they don’t use them right now, but they do remotely access workstations with highly sensitive data that reside in those offices.

In the second scenario, you are designing an internet connection for an executive’s home.

  1. The executive has been working from home since the pandemic started, and finds the internet connection is unreliable for video calls. The video lags and gets pixelated. There are audio dropouts and audible jitter.
  2. The executive’s family members are also demanding internet users. The kids are in Zoom school. The spouse has a digital editing business and shares large files with clients.

Continue reading

Keyless SSL now supports FIPS 140-2 L3 hardware security module (HSM) offerings from all major cloud providers

Keyless SSL now supports FIPS 140-2 L3 hardware security module (HSM) offerings from all major cloud providers
Keyless SSL now supports FIPS 140-2 L3 hardware security module (HSM) offerings from all major cloud providers

Private encryption keys stored in hardware security module offerings from all major cloud providers can now be used to secure HTTPS connections at Cloudflare’s global edge.

Cloudflare generates, protects, and manages more SSL/TLS private keys than perhaps any organization in the world. Private keys must be carefully protected, as an attacker in possession of one can impersonate legitimate sites and decrypt HTTPS requests. To mitigate this risk, Cloudflare has strict key handling procedures and layers of isolation at the edge that are designed to safeguard keys at all costs. But for a small minority of customers with information security policies dictating where they can (or cannot) custody their keys, these protections do not meet their requirements.

It was for these customers that we first released Keyless SSL in 2014, a protocol we use extensively inside our network: all of the TLS handshakes per day established at the Cloudflare edge that take place in a process that has no access to our customers’ private keys. The data required to establish the session is instead sent to a separate system, where the necessary cryptographic signing operation is performed. For keys uploaded to or generated by Cloudflare, we manage this other system, Continue reading

Heartbleed Revisited

Heartbleed Revisited
Heartbleed Revisited

In 2014, a bug was found in OpenSSL, a popular encryption library used to secure the majority of servers on the Internet. This bug allowed attackers to abuse an obscure feature called TLS heartbeats to read memory from affected servers. Heartbleed was big news because it allowed attackers to extract the most important secret on a server: its TLS/SSL certificate private key. After confirming that the bug was easy to exploit, we revoked and reissued over 100,000 certificates, which highlighted some major issues with how the Internet is secured.

As much as Heartbleed and other key compromise events were painful for security and operations teams around the world, they also provided a learning opportunity for the industry. Over the past seven years, Cloudflare has taken the lessons of Heartbleed and applied them to improve the design of our systems and the resiliency of the Internet overall. Read on to learn how using Cloudflare reduces the risk of key compromise and reduces the cost of recovery if it happens.

Keeping keys safe

An important tenet of security system design is defense-in-depth. Important things should be protected with multiple layers of defense. This is why security-conscious people keep spare house Continue reading