Source IP Address in Multicast Packets

One of my readers sent me this (paraphrased) question:

What I have seen in my network are multicast packets with the IP source address set to 0.0.0.0 and source port set to 0. Is that considered acceptable? Could I use a multicast IP address as a source address?

TL&DR: **** NO!!!

It also seemed like a good question to test ChatGPT, and this time it did a pretty good job.

Source IP Address in Multicast Packets

One of my readers sent me this (paraphrased) question:

What I have seen in my network are multicast packets with the IP source address set to 0.0.0.0 and source port set to 0. Is that considered acceptable? Could I use a multicast IP address as a source address?

TL&DR: **** NO!!!

It also seemed like a good question to test ChatGPT, and this time it did a pretty good job.

Cisco aims for AI-first security with Armorblox buy

Cisco plans to buy Armorblox, a six-year-old AI vendor, to help create “an AI-first Security Cloud.”“Leveraging Armorblox’s use of predictive and Generative AI across our portfolio, we will change the way our customers understand and interact with their security control points,” wrote Raj Chopra senior vice president and chief product officer for Cisco Security in a blog announcing the pending acquistion.While securing email was Armorblox’s first application of its AI techniques, they might also be applied to attack prediction, rapid threat detection, and efficient policy enforcement, Chopra wrote. “Through this acquisition though, we see many exciting broad security use cases and possibilities to unlock.”To read this article in full, please click here

Cisco aims for AI-first security with Armorblox buy

Cisco plans to buy Armorblox, a six-year-old AI vendor, to help create “an AI-first Security Cloud.”“Leveraging Armorblox’s use of predictive and Generative AI across our portfolio, we will change the way our customers understand and interact with their security control points,” wrote Raj Chopra senior vice president and chief product officer for Cisco Security in a blog announcing the pending acquistion.While securing email was Armorblox’s first application of its AI techniques, they might also be applied to attack prediction, rapid threat detection, and efficient policy enforcement, Chopra wrote. “Through this acquisition though, we see many exciting broad security use cases and possibilities to unlock.”To read this article in full, please click here

Calico monthly roundup: May 2023

Welcome to the Calico monthly roundup: May edition! From open source news to live events, we have exciting updates to share—let’s get into it!

 

Customer case study: Rafay

Rafay achieved turnkey Kubernetes security using Calico on AWS. Read our new case study to find out how.

Read case study.

New guide: CISO’s security guide to containers and Kubernetes

This guide provides CISOs and other security decision-makers with an overview of container security, insights into securing Kubernetes landscapes and container-based applications, and why securing these technologies requires a unique approach.

Read the guide.

Tigera Named Winner of the Esteemed Global InfoSec Awards during RSA Conference 2023

We’re excited to announce that we won the ‘Hot Company: Container Security’ category of the Global InfoSec Awards from Cyber Defense Magazine! Check out the full press release for more details.

Read the press release.

Open source news

  • Calico Wall of Fame – As a valued member of our Calico users community, we would like to feature you on our NEW Project Calico Wall of Fame. To participate, fill out the form here.
  • Flagsmith & Project Calico Interview – In this podcast, Ben Rometsch from Flasgsmith interviews Tigera’s Shaun Crampton about his experiences as Continue reading

Google Cloud can tie together enterprise multicloud resources

Google Cloud has announced services for enterprises to more easily and securely connect distributed multicloud resources.The chief service, Cross-Cloud Interconnect, provides dedicated high-speed connections between the Google network and customer networks hosted in other clouds—Amazon Web Services, Microsoft Azure, Oracle Cloud Infrastructure, or Alibaba.“Cross-Cloud Interconnect lets organizations connect to any public cloud through a highly secure, dedicated-bandwidth network that has a much lower latency than going through an internet-based VPN solution,” said Muninder Sambi, vice president and general manager of networking for Google Cloud. “With the new service, customers can run their applications on multiple clouds, they can host SaaS applications that are multicloud, and they can also migrate workloads from one cloud to another.”To read this article in full, please click here

Intel looking likely to manufacture Nvidia chips

More than a year ago, Nvidia CEO Jensen Huang said he was open to the possibility of having Intel manufacture Nvidia’s GPUs through Intel's foundry services program.At the time, Huang was noncommittal beyond saying that Nvidia was looking at the possibility. Now things are getting more concrete. During a question-and-answer session at the Computex tradeshow in Taipei, Taiwan, Huang said he had recently received good results for an Intel test chip based on the company's next-generation process node."You know that we also manufacture with Samsung, and we're open to manufacturing with Intel. [Intel CEO Pat Gelsinger] has said in the past that we're evaluating the process, and we recently received the test chip results of their next-generation process, and the results look good," Huang said.To read this article in full, please click here

Intel looking likely to manufacture Nvidia chips

More than a year ago, Nvidia CEO Jensen Huang said he was open to the possibility of having Intel manufacture Nvidia’s GPUs through Intel's foundry services program.At the time, Huang was noncommittal beyond saying that Nvidia was looking at the possibility. Now things are getting more concrete. During a question-and-answer session at the Computex tradeshow in Taipei, Taiwan, Huang said he had recently received good results for an Intel test chip based on the company's next-generation process node."You know that we also manufacture with Samsung, and we're open to manufacturing with Intel. [Intel CEO Pat Gelsinger] has said in the past that we're evaluating the process, and we recently received the test chip results of their next-generation process, and the results look good," Huang said.To read this article in full, please click here

Writing An IETF Draft: Document Streams And Document Status

So far in this series we’ve discussed the history of the IETF, some of the tools you might want to use when building an IETF submission, and document formatting. There are other seemingly mystical concepts in the IETF process as well—for instance, what is a “document stream,” and what is a document’s “status?” Let’s look […]

The post Writing An IETF Draft: Document Streams And Document Status appeared first on Packet Pushers.

6 lessons from the Amazon Prime Video serverless vs. monolith flap

A software-development team caused quite a stir recently with a blog post describing how it abandoned a serverless architecture project in favor of a monolith—and slashed cloud infrastructure costs by 90% in the process.But this wasn’t just any team; the post was written by Marcin Kolny, a senior software-development engineer at Amazon Prime Video.Since Amazon is one of the leading advocates for serverless computing, not to mention the market leader in cloud services, the post was viewed as either a commendable act of openness or the very definition of throwing your company under the bus. Either way, it triggered a passionate back and forth on social media platforms that focused on larger questions:To read this article in full, please click here

Day Two Cloud 197: Understanding Decentralized Identity With Dr. Joanne Friedman

On today's Day Two Cloud we dive into Decentralized Identity, or DID. This W3C standard is a unique identifier, authenticated by cryptographic proofs, that individuals and organizations can generate themselves using systems they trust. A DID can be a person, an object, an organization, a data model, or other subject. We explore DIDs, how they work, and what they can be used for with Dr. Joanne Friedman.

Day Two Cloud 197: Understanding Decentralized Identity With Dr. Joanne Friedman

On today's Day Two Cloud we dive into Decentralized Identity, or DID. This W3C standard is a unique identifier, authenticated by cryptographic proofs, that individuals and organizations can generate themselves using systems they trust. A DID can be a person, an object, an organization, a data model, or other subject. We explore DIDs, how they work, and what they can be used for with Dr. Joanne Friedman.

The post Day Two Cloud 197: Understanding Decentralized Identity With Dr. Joanne Friedman appeared first on Packet Pushers.

NTP in a Nutshell

Years ago I’ve been involved in an interesting discussion focusing on NTP authentication and whether you can actually implement it reliably on Cisco IOS. What I got out of it (apart from a working example) was the feeling that NTP and it’s implementation in Cisco IOS was under-understood and under-documented, so I wrote an article about it. Of course the web version got lost in the mists of time but I keep my archives handy.

Last weekend I migrated that article to blog.ipSpace.net. I hope you’ll still find it useful; while it’s pretty old, the fundamentals haven’t changed in the meantime.

NTP in a Nutshell

Years ago I’ve been involved in an interesting discussion focusing on NTP authentication and whether you can actually implement it reliably on Cisco IOS. What I got out of it (apart from a working example) was the feeling that NTP and it’s implementation in Cisco IOS was under-understood and under-documented, so I wrote an article about it. Of course the web version got lost in the mists of time but I keep my archives handy.

Last weekend I migrated that article to blog.ipSpace.net. I hope you’ll still find it useful; while it’s pretty old, the fundamentals haven’t changed in the meantime.

Heavy Wireless 003: Designing Eduroam For The Future With Mark Houtz

On today's Heavy Wireless, Keith Parsons talks with guest is Mark Houtz about designing Eduroam for the future, including the 6Ghz band. Mark explains the challenges of filtering Internet access for K-12 students when they travel outside of their local high school and the technical requirements of Eduroam, specifically the use of WPA3 Enterprise on all frequencies when using the new 6 GHz band. Mark also shares his testing process for Eduroam's compatibility with 6 GHz radios.

Heavy Wireless 003: Designing Eduroam For The Future With Mark Houtz

On today's Heavy Wireless, Keith Parsons talks with guest is Mark Houtz about designing Eduroam for the future, including the 6Ghz band. Mark explains the challenges of filtering Internet access for K-12 students when they travel outside of their local high school and the technical requirements of Eduroam, specifically the use of WPA3 Enterprise on all frequencies when using the new 6 GHz band. Mark also shares his testing process for Eduroam's compatibility with 6 GHz radios.

The post Heavy Wireless 003: Designing Eduroam For The Future With Mark Houtz appeared first on Packet Pushers.