Leaba's founders could be the main attraction.
The temptation to put a backdoor into a product is almost overwhelming. It’s just so dang convenient. You can go into any office, any lab, any customer site and get your work done. No hassles with getting passwords or clearances. You can just solve problems. You can log into any machine and look at logs, probe the box, issue commands, and debug any problem. This is very attractive to programmers.
I’ve been involved in several command line interfaces to embedded products and though the temptation to put in a backdoor has been great, I never did it, but I understand those who have.
We’ve seen a number of backdoors hidden in code bases you would not expect. Juniper Networks found two backdoors in its firewalls. Here’s Some Analysis of the Backdoored Backdoor. Here’s more information to reaffirm your lack of faith in humanity: NSA Helped British Spies Find Security Holes In Juniper Firewalls. And here are a A Few Thoughts on Cryptographic Engineering.
Juniper is not alone. Here’s a backdoor in AMX AV equipment. A Secret SSH backdoor in Fortinet hardware found in more products. There were Backdoors Found in Barracuda Continue reading
The post Worth Reading: Beyond ‘Neutrality’ appeared first on 'net work.
Normally, I would be writing this a few weeks ago, but sometimes the world just takes the luxury of time away from you. In this case, I couldn’t be happier though as I’m about to part of something that I believe is going to be really really amazing. This event is really a testimony to Brent Salisbury and John Willis’s commitment to community and their relentless pursuit of trying to evolve the whole industry, bringing along as many of the friends they’ve made along the way as possible.
Given the speaker list, I don’t believe there’s been any event in recent ( or long term!) memory that has such an amazing list of speakers. The most amazing part is that this event was really put together in the last month!!!!
If you’re in the bay area, you should definitely be there. If you’re not in the area, you should buy a plane ticket as you might not ever get a chance like this again.
From the website
previously known as DevOps4Networks is an event started in 2014 by John Willis and Brent Salisbury to begin a discussion on what Devops Continue reading
Introduction
Sometimes a customer needs a L3 VPN between two locations where the same SP is not present. This can be on a national or international basis. It would be possible to buy an Internet circuit and run an overlay such as DMVPN but what if the customer wants to buy a MPLS VPN circuit?
The customer could buy a VPN from SP1 in location1 and a VPN from SP2 in location2. The two SPs would then have to exchange traffic somehow to make the customer circuit end to end. The concept is shown in the following topology.
The customer connects to the PE of each of the SPs. The SPs need to interconnect at some common point, either through a public peering place such as an IX or with an private interconnect at a common location. The routers that connect to each other are called autonomous system border routers (ASBR). There are three main options and a fourth option which combines two of the others.
Inter-AS Option A
Option A is the most simple of the options to interconnect the ASBRs. Each customer VRF requires either a physical interface or more likely a subinterface. Option A has Continue reading
Millions of SSL servers are vulnerable to newly discovered attack that breaks encryption and exposes information.
Takeaway: DevOps is a first rate staff, second class assets. Helluva difference from Enterprise IT.
The post Musing: First Class Assets, Second Rate Staff appeared first on EtherealMind.
The Datanauts talk pros and cons of adopting IaaS with guest Steve Winwood, a technical architect with direct experience in IaaS usage. We talk about when IaaS makes sense vs. building your own infrastructure, considerations for choosing a provider, how cloud app deployment is different, how to understand and manage costs, and more.
The post Datanauts 025: Moving To The Cloud: IaaS Lessons Learned appeared first on Packet Pushers.
The Datanauts talk pros and cons of adopting IaaS with guest Steve Winwood, a technical architect with direct experience in IaaS usage. We talk about when IaaS makes sense vs. building your own infrastructure, considerations for choosing a provider, how cloud app deployment is different, how to understand and manage costs, and more.
The post Datanauts 025: Moving To The Cloud: IaaS Lessons Learned appeared first on Packet Pushers.
Software-defined networking can mean many things, depending on your view.
This article was initially sent to my SDN mailing list. To register for SDN tips, updates, and special offers, click here.
During one of my SDN workshops one of the attendees working for a mid-sized European ISP asked me this question:
Our management tells us we should build our network like Google does, including building our own switches. Where should we start?
The only answer I could give him was “You don’t have a chance.”
Read more ...