Recent Russian Routing Leak was Largely Preventable

Last week, the IP address space belonging to several high-profile companies, including Google, Facebook and Apple, was briefly announced out of Russia, as was first reported by BGPmon.

Following the incident, Job Snijders of NTT wrote in a post entitled, “What to do about BGP hijacks”.  He stated that, given the inherent security weaknesses in BGP, things will only improve “the moment it becomes socially unacceptable to operate an Internet network without adequate protections in place” and thus customers would stop buying transit from providers that operate without proper route filtering.

Since Job has presented at NANOG about the various filtering methods employed by NTT, I decided to look into how well NTT (AS2914) did in this particular incident.  While a handful of the 80 misdirected routes were ultimately carried on by AS2914 to the greater internet, NTT didn’t contribute to the leaking of any of the major internet companies, such as Facebook, Google, Apple, etc.  In fact, when one analyzes the propagation of every one of these leaked routes, a pattern begins to emerge.

Route Leaks by AS39523

On 12 December 2017, AS39523 announced 80 prefixes (only one of which was theirs) for two different 3-4 Continue reading

IDG Contributor Network: How interconnection can set the pace as holiday shopping gets more digital

The arrival of the holiday shopping season always brings sharp focus onto ecommerce, which just keeps disrupting how retailers and consumers shop. But it’s striking just how much running room remains in front of this trend, which already has a couple decades of Christmases under its big black Santa belt.According to eMarketer, ecommerce sales will grow more than 23 percent in 2017 – and still only account for a tenth of retail sales globally. Opportunities remain huge in the online shopping sector, but only if companies can continue to keep the digital payments at the heart of it simple, fast and secure for consumers and retailers alike. That’s a perpetual challenge.To read this article in full, please click here

IDG Contributor Network: How interconnection can set the pace as holiday shopping gets more digital

The arrival of the holiday shopping season always brings sharp focus onto ecommerce, which just keeps disrupting how retailers and consumers shop. But it’s striking just how much running room remains in front of this trend, which already has a couple decades of Christmases under its big black Santa belt.According to eMarketer, ecommerce sales will grow more than 23 percent in 2017 – and still only account for a tenth of retail sales globally. Opportunities remain huge in the online shopping sector, but only if companies can continue to keep the digital payments at the heart of it simple, fast and secure for consumers and retailers alike. That’s a perpetual challenge.To read this article in full, please click here

IDG Contributor Network: How interconnection can set the pace as holiday shopping gets more digital

The arrival of the holiday shopping season always brings sharp focus onto ecommerce, which just keeps disrupting how retailers and consumers shop. But it’s striking just how much running room remains in front of this trend, which already has a couple decades of Christmases under its big black Santa belt.According to eMarketer, ecommerce sales will grow more than 23 percent in 2017 – and still only account for a tenth of retail sales globally. Opportunities remain huge in the online shopping sector, but only if companies can continue to keep the digital payments at the heart of it simple, fast and secure for consumers and retailers alike. That’s a perpetual challenge.To read this article in full, please click here

Squinting at ASCII on Linux

Back when I started working with computers, understanding the nature of ASCII was exciting. In fact, just knowing how to convert binary to hex was fun.That was a lot of years ago — berfore ASCII had yet reached drinking age — but character encoding standards are as important as ever today with the internet being so much a part of our business and our personal lives. They're also more complex and more numerous than you might imagine. So, let’s dive into some of the details of what ASCII is and some of the commands that make it easier to see coding standards in action.Why ASCII? ASCII came about to circumvent the problem that different types of electronic systems were storing text in different ways. They all used some form of ones and zeroes (or ONs and OFFs), but the issue of compatibility became important when they needed to interact. So, ASCII was developed primarily to provide encoding consistency. It became a standard in the U.S. in 1960. Initially, ASCII characters used only 7 bits. Some years later, ASCII was extended to use all 8 bits in each byte.To read this article in full, please click here

Technical reading from the Cloudflare blog for the holidays

During 2017 Cloudflare published 172 blog posts (including this one). If you need a distraction from the holiday festivities at this time of year here are some highlights from the year.


CC BY 2.0 image by perzon seo

The WireX Botnet: How Industry Collaboration Disrupted a DDoS Attack

We worked closely with companies across the industry to track and take down the Android WireX Botnet. This blog post goes into detail about how that botnet operated, how it was distributed and how it was taken down.

Randomness 101: LavaRand in Production

The wall of Lava Lamps in the San Francisco office is used to feed entropy into random number generators across our network. This blog post explains how.

ARM Takes Wing: Qualcomm vs. Intel CPU comparison

Our network of data centers around the world all contain Intel-based servers, but we're interested in ARM-based servers because of the potential cost/power savings. This blog post took a look at the relative performance of Intel processors and Qualcomm's latest server offering.

How to Monkey Patch the Linux Kernel

One engineer wanted to combine the Dvorak and QWERTY keyboard layouts and did so by patching the Linux kernel using SystemTap. This blog explains Continue reading

Technical reading from the Cloudflare blog for the holidays

During 2017 Cloudflare published 172 blog posts (including this one). If you need a distraction from the holiday festivities at this time of year here are some highlights from the year.

CC BY 2.0 image by perzon seo

The WireX Botnet: How Industry Collaboration Disrupted a DDoS Attack

We worked closely with companies across the industry to track and take down the Android WireX Botnet. This blog post goes into detail about how that botnet operated, how it was distributed and how it was taken down.

Randomness 101: LavaRand in Production

The wall of Lava Lamps in the San Francisco office is used to feed entropy into random number generators across our network. This blog post explains how.

ARM Takes Wing: Qualcomm vs. Intel CPU comparison

Our network of data centers around the world all contain Intel-based servers, but we're interested in ARM-based servers because of the potential cost/power savings. This blog post took a look at the relative performance of Intel processors and Qualcomm's latest server offering.

How to Monkey Patch the Linux Kernel

One engineer wanted to combine the Dvorak and QWERTY keyboard layouts and did so by patching the Linux kernel using SystemTap. This blog explains Continue reading

A Cumulus holiday special: unboxing the Facebook Backpack Chassis

Season’s greetings from Cumulus Networks! We wish you all the happiest of holidays and hope they lead into a fantastic new year.

But before we take off for our holiday break, we’ve got one more present for you — a Facebook Backpack Chassis! Well, a video of a Facebook Backpack Chassis. Pour yourself a mug of hot chocolate and prepare yourself for some laughs as we unwrap this exciting new addition to our data center. Check it out:

The post A Cumulus holiday special: unboxing the Facebook Backpack Chassis appeared first on Cumulus Networks Blog.