Service Provider SDN Webinar — Sign Up & Learn Ericsson’s Core Principles
Ericsson shines a light on service provider SDN and software-defined agility with it's August 26 webinar. Sign up Now!
Ericsson shines a light on service provider SDN and software-defined agility with it's August 26 webinar. Sign up Now!
I wanted to let everyone know that I’m going to be taking part in an excellent event being put on by my friend Enrico Signoretti (@ESignoretti) this September. TECH.unplugged is a jam-packed day of presentations from people that cover storage, computing, and in my case networking. We’re getting together to share knowledge and discuss topics of great interest to the IT community. As excited as I am to be taking part, I also wanted to take a few moments to discuss why events like this are important to the technology community.
There’s no doubt that online events are becoming the standard for events in recent years. It’s much more likely to find an event that offers streaming video, virtual meeting rooms, and moderated discussions taking place in a web browser. The costs of travel and lodging are far higher than they were during the recession days of yore. Finding a meeting room that works with your schedule is even harder. It’s much easier to spin up a conference room in the cloud and have people dial in to hear what’s going on.
For factual information, such as teaching courses, this approach works rather well. That’s Continue reading
The post Highlight: Why Your Presentations Stink appeared first on 'net work.
The post Worth Reading: Expert Versus Nonexpert appeared first on 'net work.
BIG-IP gets a DevOps twist.
Last week ISC published a patch for a critical remotely exploitable vulnerability in the BIND9 DNS server capable of causing a crash with a single packet.
CC BY 2.0 image by Ralph Aversen
The public summary tells us that a mistake in handling of queries for the TKEY type causes an assertion to fail, which in turn crashes the server. Since the assertion happens during the query parsing, there is no way to avoid it: it's the first thing that happens on receiving a packet, before any decision is made about what to do with it.
TKEY queries are used in the context of TSIG, a protocol DNS servers can use to authenticate to each other. They are special in that unlike normal DNS queries they include a “meta” record (of type TKEY) in the EXTRA/ADDITIONAL section of the message.
CC BY 2.0 image by Ralph Aversen
Since the exploit packet is now public, I thought we might take a dive and look at the vulnerable code. Let's start by taking a look at the output of a crashing instance:
03-Aug-2015 16:38:55.509 message.c:2352: REQUIRE(*name == ((void*)0)) failed, back trace
03-Aug-2015 16:38:55.510 #0 0x10001510d in Continue reading
One of the participants of the Carrier Ethernet LinkedIn group asked a great question:
When we install a virtual-router of any vendor over an ordinary sever (having general-purpose microprocessor), can it really compete with a physical-router having ASICs, Network Processors…?
Short answer: No … and here’s my longer answer (cross-posted to my blog because not all of my readers participate in that group).
Read more ...IPv6 is inevitable, but what's the real rate of adoption in North America? Join Ethan Banks and Alain Fiocco as they discuss the state of the protocol, share educational opportunities, and offer tips to get your vendors to fully embrace IPv6.
The post PQ Show 54 – IPv6 Adoption Trends With Alain Fiocco appeared first on Packet Pushers.