The Week in Internet News: More Communities Building Their Own Broadband Networks

Build-your-own broadband: Small towns in the United States and the United Kingdom are increasingly bypassing large ISPs and building their own broadband networks, according to two recent stories. Reuters notes that rural communities in the U.K. are building networks to improve speeds and expand coverage, while Wired.com reports that independent broadband networks are proliferating across the United States in small towns, with speeds often exceeding a gigabit per second.

Where the IT jobs are: If you understand blockchain or Artificial Intelligence, job recruiters are looking for you. SHRM.org, the website for the Society of Human Resource Management, notes there’s been a 500 percent increase in blockchain-related job postings on Stack Overflow in the past year. Meanwhile, the Economic Times of India reports that AI experts are getting job offers that include major salary increases.

Power grid and IoT security don’t mix: Princeton researchers have suggested that insecure IoT devices could be used against the power grid, potentially leading to local power outages or even widescale blackouts, SecurityBoulevard.com reports. During a recent conference, the researchers demonstrated how an IoT botnet of Internet-connected high wattage devices could give attackers the ability to launch large-scale attacks on the Continue reading

Do We Need Leaf-and-Spine Fabrics?

Evil CCIE left a lengthy comment on one of my blog posts including this interesting observation:

It's always interesting to hear all kind of reasons from people to deploy CLOS fabrics in DC in Enterprise segment typically that I deal with while they mostly don't have clue about why they should be doing it in first place. […] Usually a good justification is DC to support high amount of East-West Traffic....but really? […] Ask them if they even have any benchmarks or tools to measure that in first place :)

What he wrote proves that most networking practitioners never move beyond regurgitating vendor marketing (because that’s so much easier than making the first step toward becoming an engineer by figuring out how technology really works).

Read more ...

Fear the reaper: characterization and fast detection of card skimmers

Fear the reaper: characterization and fast detection of card skimmers Scaife et al., USENIX Security 2018

Until I can get my hands on a Skim Reaper I’m not sure I’ll ever trust an ATM or other exposed card reading device (e.g., at garages) again!

Scaife et al. conduct a study of skimming devices found by the NYPD Financial Crimes Task Force over a 16 month period. The bad news is that you and I don’t really have much chance of detecting a deployed card skimming device (most of the folk wisdom about how to do so doesn’t really work). The good news is that the Skim Reaper detection device developed in this research project was able to effectively detect 100% of the devices supplied by the NYPD. That’s great if you happen to have a Skim Reaper handy to test with before using an ATM. The NYPD are now actively using a set of such devices in the field.

Card skimmers and why they’re so hard for end-users to detect

Almost as well-know as (credit and debit) cards themselves is the ease with which fraud can be committed against them. Attackers often acquire card data using skimmers Continue reading

Porting Our Software to ARM64

Porting Our Software to ARM64

As we enable more ARM64[1] machines in our network, I want to give some technical insight into the process we went through to reach software parity in our multi-architecture environment.

To give some idea of the scale of this task, it’s necessary to describe the software stack we run on our servers. The foundation is the Linux kernel. Then, we use the Debian distribution as our base operating system. Finally, we install hundreds of packages that we build ourselves. Some packages are based on open-source software, often tailored to better meet our needs. Other packages were written from scratch within Cloudflare.

Industry support for ARM64 is very active, so a lot of open-source software has already been ported. This includes the Linux kernel. Additionally, Debian made ARM64 a first-class release architecture starting with Stretch in 2017. This meant that upon obtaining our ARM64 hardware, a few engineers were able to bring Debian up quickly and smoothly. Our attention then turned to getting all our in-house packages to build and run for ARM64.

Our stack uses a diverse range of programming languages, including C, C++, Go, Lua, Python, and Rust. Different languages have different porting requirements, with some being easier Continue reading

Better XMind-GNOME Integration

In December of 2017 I wrote about how to install XMind 8 on Fedora 27, and at the time of that writing I hadn’t quite figured out how to define a MIME type for XMind files that would allow users to double-click on an XMind file in Nautilus and open that file in XMind. After doing a bit of additional research and testing, I’ve found a solution and would like to share it here.

The solution I’ll describe here has been tested on Fedora 28, but it should work on just about any distribution with the GNOME desktop environment.

First, you’ll want to define the MIME type by creating an XML file in the ~/.local/share/mime/packages directory, as outlined here. I called my file application-vnd-xmind-workbook.xml, but I don’t know if the filename actually matters. (I derived the filename from this list of XMind file types.) The contents of the file should look something like this:

<mime-info xmlns="http://www.freedesktop.org/standards/shared-mime-info">
  <mime-type type="application/vnd.xmind.workbook">
    <comment>XMind Workbook</comment>
    <glob pattern="*.xmind"/>
    <glob pattern="*.XMIND"/>
    <glob pattern="*.XMind"/>
  </mime-type>
</mime-info>

You’ll note that multiple glob patterns are included to help deal with case sensitivity issues. The specific values used in Continue reading

Weekly Show 405: Juniper Contrail SD-WAN: Driving Wave Two (Sponsored)

In today's Weekly Show we drill into Contrail SD-WAN with sponsor Juniper Networks. We discuss Contrail SD-WAN's three pillars--routing, VPNs, and security--and look at how the product distinguishes itself from its competitors. Our guest is Tony Sarathchandra, Director, Product Management - Software Defined Networking Technology and Solutions at Juniper Networks.

The post Weekly Show 405: Juniper Contrail SD-WAN: Driving Wave Two (Sponsored) appeared first on Packet Pushers.

Networking in the Cloud – Different but the Same

Networking in the cloud is impressive. Building redundant internet access is as easy as attaching an internet gateway (IGW) to your VPC. In an on-premises network we would have to build VLANs, subnets, IGPs, possibly HSRP and BGP etc. This holds true for many of the services in the cloud.

I’ve seen statements as “The networking team is going away because everyone is moving to the cloud”. “The networking team is going away because webscaler/startup company X networking team is only Y number of people”. This is like comparing apples to ostridges. I call BS. Why?

Networking in the cloud is relatively easy when you can leverage the standard services available, which is not always the case. It’s relatively easy because people are in the beginning of their cloud journey. They have one or a couple of VPCs. If they really move a major part of their app stack to the cloud, networking won’t be so easy. Let’s think about some examples.

In the cloud you can provision resources into different subnets, meaning different availability zones. This leads to a very high availability but it’s not enough. To build a really resilient service you need to be in different regions. Continue reading

The Long And Winding Network Road

How do you see your network? Odds are good it looks like a big collection of devices and protocols that you use to connect everything. It doesn’t matter what those devices are. They’re just another source of packets that you have to deal with. Sometimes those devices are more needy than others. Maybe it’s a phone server that needs QoS. Or a storage device that needs a dedicated transport to guarantee that nothing is lost.

But what does the network look like to those developers?

Work Is A Highway

When is the last time you thought about how the network looks to people? Here’s a thought exercise for you:

Think about a highway. Think about all the engineering that goes into building a highway. How many companies are involved in building it. How many resources are required. Now, think of that every time you want to go to the store.

It’s a bit overwhelming. There are dozens, if not hundreds, of companies that are dedicated to building highways and other surface streets. Perhaps they are architects or construction crews or even just maintenance workers. But all of them have a function. All for the sake of letting us drive on Continue reading

Stuff The Internet Says On Scalability For August 31st, 2018

Hey, it's HighScalability time:

This mind blowing creation is from John Williamson. It's the first million integers, represented as binary vectors indicating their prime factors, laid out with UMAP. No, I really have no idea what that means either, but it did make me consider that our universe could be created by an algorithm. What are the wiggly cycles on the periphery? Groups of numbers that share a minimum amount of prime factors, further out groups are numbers that have increasing amounts of shared prime factors. So the primes are at the core, ungrouped as they have no prime factors to use to join groups. Primorials should be furthest out.

 

Do you like this sort of Stuff? Please lend me your support on Patreon. It would mean a great deal to me. And if you know anyone looking for a simple book that uses lots of pictures and lots of examples to explain the cloud, then please recommend my new book: Explain the Cloud Like I'm 10. They'll love you even more.

 

Updates To The CCIE/CCDE Evolving Technologies

Cisco just rolled out the Evolving Technologies v1.1 update, which will affect anyone taking their CCIE certification exams on, or after, August 30, 2018. Fortunately, the v1.1 updates are fairly minor. The CCIE/CCDE Evolving Technologies section still includes three overall categories; Cloud, Network Programmability and Internet of things, and still makes up 10% of all CCIE/CCDE written exams. However, changes can be found in the specific topics tested in each of the evolving technologies categories.

Cloud – v1.1

Compare and contrast public, private, hybrid, and multi-cloud design considerations

  • Infrastructure, platform, and software as a service (XaaS)
  • Performance, scalability, and high availability
  • Security implications, compliance, and policy
  • Workload migration

Describe cloud infrastructure and operations

  • Compute virtualization (containers and virtual machines)
  • Connectivity (virtual switches, SD-WAN and SD-Access)
  • Virtualization functions (NFVi, VNF, and L4/L1)
  • Automation and orchestration tools (cloud center, DNA-center, and Kubernetes)

Network Programmability (SDN) – v1.1

Describe architectural and operational Considerations for a programmable network

  • Data models and structures (YANG, JSON and XML)
  • Device programmability (gRPC, NETCONF and RESTCONF)
  • Controller based network design (policy driven configuration and northbound/ southbound APIs)
  • Configuration management tools (agent and agent-less) and version control systems (Git and SVN)

Internet of Things (IOT) Continue reading

Indigenous Communities: “Stuck…Between Technology and Tradition”

In November 2017, the Internet Society hosted the inaugural Indigenous Connectivity Summit in Santa Fe, New Mexico. The event brought together community network operators, Internet service providers, community members, researchers, policy makers, and Indigenous leadership to work together to bridge the connectivity gap in indigenous communities in North America. One of the participants shared her story.

Christel White, geographic information system (GIS) specialist for the Pueblo of Cochiti, is no stranger to intertribal dynamics. White is an enrolled member of the Onondaga people and grew up on the Seneca Nation reservation in New York State. In her current role, she ponders how the specific culture and needs of the people of Cochiti impacts the role of connectivity. “I want to bring in GIS online, but we don’t want cultural sites out in circulation,” explains White. “Do we want new land on there?”

The lack of Internet speed in tribal offices means White currently works from home, but says that it impacts her ability to interact with the public. If someone comes into the office with a question, White is not always physically there, but she can’t otherwise complete her work without a better connection.  “Indigenous communities are often stuck on Continue reading