Geek Speak Round Up – Network Management

Thwack Community

I mentioned a few months ago that I had been asked to write some thought-provoking blogs on the subject of network management for the Solarwinds Thwack Community “Geek Speak” area. I’ve now finished my six posts, and while they won’t be reproduced on movingpackets.net, I’m linking to them here as I think they touch on some subjects close to my Software Defined Heart.

Click da pic to read the article.

1. Do You Monitor Your Network Interfaces?

thwack_post1_preview

2. The Perils of High Speed Logging

thwack_post2_preview

3. Could SNMP Please Just Die Already?

thwack_post3_preview

4. Keeping Your Secrets Secret

thwack_post4_preview

5. DHCP As A Configuration Tool

thwack_post5_preview

6. Network Management Isn’t Enough Any More

thwack_post6_preview

 

I hope you find something to think about or react to there. I’ve tried to blend some hyperbole with a tablespoon of annoyance and a light dash of technical reality. If you have any specific comments on any of these posts, the right thing to do would be to login to Thwack and comment there, but I’ll take any feedback you want to give, wherever it is.

 

 

Disclosures

I am participating in the Solarwinds Thwack Ambassador program on a paid basis for July-September 2015. My posts Continue reading

Ransomware pushers up their game against small businesses

After extorting millions from consumers over the past few years, file-encrypting ransomware creators are increasingly focusing their attention on victims who are more likely to pay up: small and medium-sized businesses.Throughout June and July, over 67 percent of users who clicked on malicious links in CryptoWall-related emails were from the SMB sector, researchers from antivirus vendor Trend Micro found. An additional 17 percent were from within large enterprises.CryptoWall is one of the most widespread ransomware programs, infecting nearly 625,000 systems between March and August 2014 and many more since then. Researchers estimate that it has earned well over $1 million for its creators.To read this article in full or to leave a comment, please click here

HP’s struggles reflected in CIOs IT purchasing plans

HP's plan to lay off 33,000 workers over the next three years -- the latest step in its massive restructuring -- underscores the challenges the tech giant faces as it seeks to adapt to changing demands in corporate computing.CIOs, many of whom are under pressure to inject digital capabilities into their businesses and support increasingly mobile workforces, are shifting spending away from enterprise hardware and services to cloud, mobile and analytics software. Incumbent vendors are scrambling to keep up, each in different ways. However, HP’s answer to the challenges is the most dramatic and headline-grabbing.To read this article in full or to leave a comment, please click here

Apple devs: Don’t let Apple’s Xcode validation scare you

The Apple App Store has long enjoyed a sterling reputation for screening out malware. But last weekend, the company pulled apps infected with XcodeGhost malware from the Chinese Apple App Store -- infected apps that had apparently been created with a counterfeit version of Apple's Xcode IDE by unsuspecting developers.As a precaution, Apple emailed its developers on Tuesday, recommending that they validate their installed version of Xcode using a simple procedure to ensure it wasn't a hacked version. The email also contained a reminder to "always download Xcode directly from the Mac App Store, or from the Apple Developer website, and leave Gatekeeper enabled on all your systems to protect against tampered software."To read this article in full or to leave a comment, please click here

Privacy group calls for a boycott of tech companies supporting CISA

Privacy advocates are stepping up their lobbying efforts against the controversial cyber threat information sharing bill currently in Congress after several tech giants indicated their support.Activist group Fight for the Future criticized Salesforce for supporting legislation which would "grant blanket immunity for American companies to participate in government mass surveillance programs like PRISM, without meaningfully addressing any of the fundamental cyber security problems we face in the U.S." Accordingly, Fight for the Future said it will abandon the Heroku cloud application platform within the next 90 days and encourages others to follow suit. The letter to Salesforce CEO Marc Benioff was posted on the site YouBetrayedUs.org.To read this article in full or to leave a comment, please click here

Cybersecurity hall of fame names inductees

Incoming class The National Cyber Security Hall of Fame has announced its recent class of inductees. In noting them we also highlight some of the past winners. The hall of fame recognizes the history and contributions of pioneers, innovators and educators who influenced the industry. The inductees are chosen by a board of advisers. Pictured from left to right are: Susan Landau, Steven Lipner, Cynthia Irvine, Ron Ross, and Jerry Saltzer is in front.To read this article in full or to leave a comment, please click here

An EIGRP Scaling Puzzle

This last week I received an email from a friend asking about scaling. The situation is this: a particular company has well over 100 EIGRP routers on a single L2 service from a provider. Will this scale? What’s more interesting than simply asking about scale, though, is to ask the “why” question — no matter […]

The post An EIGRP Scaling Puzzle appeared first on Packet Pushers.

DHCP Details You Didn’t Know

If you’ve been a networking engineer (or a sysadmin) for a few years, you must be pretty familiar with DHCP and might think you know everything there is to know about this venerable protocol. So did I… until I read the article by Chris Marget in which he answers two interesting questions:

  • How does the DHCP server (or relay) send DHCP offer to the client that doesn’t have an IP address (and doesn’t respond to ARP)?
  • How does the DHCP client receive the DHCP responses if it doesn’t have an IP address?

Risky Business #384 — Mark Dowd talks AirDrop pwnage, XCode iOS scandal

We've got a great show for you this week. Mark Dowd drops by to talk about the recent spate of Trojaned iOS apps that made it into Apple's China App Store. We also talk to him about his awesome AirDrop bug. How did it work?

This week's sponsor segment is actually a real cracker. Context IS consultant David Klein tells us how he owned an entire cloud platform by enumerating some shitty 90s-style bugs in some third party libraries they were using. It's comedy gold. This cloud platform that uses security at a selling point. It's bad.

read more

Apple lists 25 apps impacted by XcodeGhost

Apple has identified 25 apps on its stores that had used a rogue version of its Xcode development tool, and advised users to update the affected apps to fix the issue on their devices.Figuring in the list are the WeChat app from Tencent and the Didi ride-hailing app, which had been identified earlier as affected. Other apps included in the list released by Apple on its China website include local chatting tool Encounter, the app for Baidu Music and China Unicorn's customer service app.To read this article in full or to leave a comment, please click here

Networking Field Day 10 – Arista

I finally had the chance to finish watching all of the Arista videos from Networking Field Day 10.  They did quite a few presentations and if you haven’t watched them yet I would recommend you do…

EOS Evolution and Quality

EOS SDK Demo

CloudVision Overview

7500 Series Architecture

Leaf SSU Demo

While the bulk of the videos talked about Arista platforms or features, Ken Duda’s presentation (EOS Evolution and Quality) really struck a chord with me.  Early in the presentation Ken summarizes the problem by saying “when the network ain’t working, ain’t nothing working”.  The software powering your network just has to work and it has to work consistently.  Ken then goes into where he thinks quality should come from breaking it into 3 pieces.

Culture – It’s obvious from Ken’s talk that Arista legitimately cares about software quality.  While I don’t think this is unique to Arista, I think it’s something they’ve fully embraced because they can.  Arista was born out of the commodity network era.  When you are working with commodity chips, the real differentiator becomes software.  This puts them at a unique position compared to other traditional vendors who Continue reading

Using Docker Machine with OpenStack

In this post, I’m going to show you how to use Docker Machine with OpenStack. This is something I’ve been interested in testing for a while, and now that I finally have my test lab back up and running, I was able to spend some time on this. I’ll spend some time later in the post covering my reasons for wanting to look at this, but I’ll start with the technical content of how it works.

I tested this setup with the following components:

  • The client system was running OS X 10.9.5 with the Docker 1.8.2 client binary and Docker Machine 0.4.1.
  • The OpenStack cloud was running the Juno release on Ubuntu 14.04 LTS, KVM hypervisors, and VMware NSX for networking.

There are (at least) two approaches to using Docker Machine and OpenStack together:

  1. You can use Docker Machine’s generic driver to consume already-provisioned OpenStack instances. This is, in large part, very similar to what I covered here, but I’ll cover it in this post just for the sake of completeness.
  2. You can use Docker Machine’s openstack driver to automatically provision and configure new instances on an OpenStack cloud. This is the Continue reading