Archive

Category Archives for "Russ White"

Reaction: The importance of diversity of sources

If you are like the rest of the world in the way you consume news, you are probably reading this because you followed a link in social media. If this is true, I have a request: set up an RSS reader, and start following technical and social content through feeds rather than exclusively through social networks. Why?

On Wednesday, Digg announced that it will be shutting down Digg Reader on March 26. The RSS reader, for me and likely many others, was a godsend after the 2013 shuttering of Google Reader. The rest of Digg is safe, rest assured, and the site gave no reason for discontinuing Digg Reader, but it’s likely as simple as “that’s not how people consume the internet anymore.”

Don’t get me wrong—I believe social media networks are important. Social media networks are a great place to keep up with people and products, with larger movements discovered by neural networks and put on your RADAR through a news feed.

But social media networks should not be the only place you learn about network engineering—or anything else of importance in your life. It is a bit like when I used to have a collection of Continue reading

What’s wrong with the IETF. And what’s right

I have not counted the IETF’s I have attended; I only know the first RFC on which I’m listed as a co-author was published in 2000, so this must be close to 20 years of interacting with the IETF community, and I’m pretty certain I’ve attended at least two meetings a year across that time, and three meetings a year in most of those years. Across that time, there has never been a time when I have not been told, at least once, “the IETF is broken.” And there has not been a single time I cannot remember agreeing with the sentiment.

So, how is the IETF broken? The trend that bothers me the most right now is the gold rush syndrome. A new technology is brought into the IETF, and if it looks like it might somehow be “important,” there is a “land rush” as people stake out new drafts, find use cases, find corner cases, and work to develop drafts and communities around those drafts. This generally results in a sort of ossification process, where there are clear insiders and outsiders, an entirely new vocabulary is developed, and the drafts fly so fast and furious there is Continue reading

Side Channel Attacks in the Wild: The Smart Home

Side channel attacks are not something most network engineers are familiar with; I provided a brief introduction to the concept over at The Network Collective in this Short Take. If you aren’t familiar with the concept, it might be worth watching that video (a little over 4 minutes) before reading this post.

Side channel attacks are more common, and more dangerous, than many engineers understand. In this post, I’ll take a look at a 2017 research paper that builds and exploits a side channel attack against several smart home devices to see how such a side channel attack plays out. They begin their test with a series of devices, including a children’s sleep monitor, a pair of security cameras, a pair of smart power plugs, and a voice based home assistant.

The attack itself takes place in two steps. The first is to correlate individual traffic flows with a particular device (where a traffic flow is a 5 tuple. The researchers did this in three different ways. First, they observed the MAC address of each device talking on the network, comparing the first three octets of this address to a list of known manufacturers. Most home device manufacturers use a Continue reading

1 63 64 65 66 67 164