Worth Reading: Should Firewalls Track Sequence Numbers?
The post Worth Reading: Should Firewalls Track Sequence Numbers? appeared first on 'net work.
The post Worth Reading: Should Firewalls Track Sequence Numbers? appeared first on 'net work.
Dan Conde, leader of Interop's Software-Defined Architecture Summit, discusses the changes taking place in infrastructure and how IT can adapt.
Learn more about the SDA Summit and register for Interop, May 2-6 in Las Vegas.
The post Worth Reading: Beyond Open Standards appeared first on 'net work.
Imagine that you’re sitting in a room interviewing a potential candidate for a position on your team. It’s not too hard to imagine, right, because it happens all the time. You know the next question I’m going to ask: what questions will you ask this candidate? I know a lot of people who have “set questions” they use to evaluate a candidate, such as “what is the OSPF type four for,” or “why do some states in the BGP peering session not have corresponding packets?” Since I’ve worked on certifications in the past (like the CCDE), I understand the value of these sorts of questions. They pinpoint the set and scope of the candidate’s knowledge, and they’re easy to grade. But is easy to grade what we should really be after?
Let me expand the scope a little: isn’t this the way we see our own careers? The engineer with the most bits of knowledge stuffed away when they die wins? I probably need to make a sign that says that, actually, just to highlight the humor of such a thought.
The problem is it simply isn’t a good way to measure an engineer, including the engineer reading this Continue reading
It's the Network Break! This week we examine the latest round in the Cisco/Arista legal battle, applaud Cisco's IoT acquisition, review the latest cloud infrastructure numbers, parse a warning of armed revolt if governments weaken crypto systems, and more.
The post Network Break 73: Cisco Buys Into IoT; Crypto Violence appeared first on Packet Pushers.
It's the Network Break! This week we examine the latest round in the Cisco/Arista legal battle, applaud Cisco's IoT acquisition, review the latest cloud infrastructure numbers, parse a warning of armed revolt if governments weaken crypto systems, and more.
The post Network Break 73: Cisco Buys Into IoT; Crypto Violence appeared first on Packet Pushers.
A while ago I answered a few questions that Dan Novak from University of Maryland sent me, and as they might be relevant to someone out there decided to publish the answers.
Dan started with a soft one:
What circumstances led you to choosing network engineering for a career?
It was pure coincidence.
Read more ...In this video, Tony Fortunato discusses his initial analysis of a network redesign project.
With the rise of disaggregation, the networking industry needs more than the IETF in order to thrive.
Do you sometimes feel as insignificant as a packet? Maybe technology does have its roots in philosophy.
Plexxi had a really big year in 2015; growing year-over-year revenue by 10X and dramatically increasing our list of customers, signing an exclusive distribution relationship with Arrow Electronics and expanding our value added reseller network by 6X. We achieved all this through a relentless focus on providing transformational data center networking products and tools. Our solutions are purpose-built to support the people responsible for designing, architecting and supporting public and private clouds deployments. As I discussed in my last blog, we call these people Cloud Builders.
Cloud Builders are tasked with finding new ways to meet today’s dynamic business requirements. Traditionally, public cloud has been associated with speed, agility, elasticity and cost savings, whereas private cloud has been associated with control around application performance, latency and security. To support modern day business requirements Cloud Builders need to leverage both public and private cloud; it’s no longer an either/or scenario. Public and private clouds need to offer control over application performance, latency and security AND offer speed, agility, elasticity and cost savings.
We continue, as a company, to learn and adapt to market conditions by listening intently to customers, prospects and partners. Lately our conversations with Cloud Builders have revolved Continue reading
I've been developing an IPAM/DCIM tool for work over the past several months (more on that soon), and recently my focus has been on expanding it to store confidential data associated with network devices. Backup login credentials, TACACS+/RADIUS secrets, SNMP communities, and so on: Short strings that need to be stored securely.
Storing a password or other small piece of sensitive data is different from merely authenticating against it. Most password storage mechanisms never actually store a user's actual password, but rather an irreversible hash of it. (That is if you're doing it correctly, at least.)
For example, the Django Python framework (which powers packetlife.net) by default employs salted SHA256 hashes to authenticate user passwords. When a password is saved, a random salt is generated and concatenated with the plaintext password. (A salt is used to prevent two identical passwords from producing the same hash.) The SHA256 algorithm is then run against the whole thing to produce a fixed-length hash. Here's an example in Python using Django's built-in make_password()
function:
>>> from django.contrib.auth.hashers import make_password >>> make_password("MyP@ssw0rd!") u'pbkdf2_sha256$12000$x5E0yB2dh13m$ablUOER8qn4CxjmHZlJrUUA1Cb9MeLXvfggTnG56QpM='