Open vSwitch Database Management Protocol (OVSDB) 101

Open vSwitch Database Management Protocol (OVSDB, RFC 7047) is often mentioned together with other semi-magic SDN tools that will bring everlasting peace to the chaotic world of networking. In reality, it’s just a database access/update protocol (think SQL with JSON encoding) with an interesting twist: a client can request notifications about table or row updates, replacing periodic database polling with a pub-sub solution.

Read more ...

Some notes about Wassenaar

So #wassenaar has infected your timeline for the past several days. I thought I'd explain what the big deal is.

What's a Wassenaar?


It's a town in Europe where in 1996 a total of 41 nations agreed to an arms control treaty. The name of the agreement, the Wassenaar Arrangement, comes from the town. The US, Europe, and Russia are part of the agreement. Africa, Middle East, and China are not.

The primary goal of the arrangement is anti-proliferation, stopping uranium enrichment and chemical weapons precursors. Another goal is to control conventional weapons, keeping them out of the hands of regimes that would use them against their own people, or to invade their neighbors.

Historically in cybersec, we've complained that Wassenaar classifies crypto as a munition. This allows the NSA to eavesdrop and decrypt messages in those countries. This does little to stop dictators from getting their hands on strong crypto, but does a lot to prevent dissidents in those countries from encrypting their messages. Perhaps more importantly, it requires us to jump through a lot of bureaucratic hoops to export computer products, because encryption is built-in to virtually everything.

Why has this become important recently?


Last year, Wassenaar Continue reading

Ads for MacKeeper refunds will run on Facebook

A sizable Internet advertising campaign is planned to alert people to a proposed class-action settlement over MacKeeper, a security program for Macs accused of deceptive practices.MacKeeper’s developer, ZeoBit, was sued in May 2014 in U.S. District Court for the Western District of Pennsylvania. Filed on behalf of Pennsylvania resident Holly Yencha, the class-action suit alleges MacKeeper was deceptively marketed and did not fully function as advertised.Under a proposed settlement, ZeoBit—a company started in Ukraine but now based in California—will put US$2 million into a fund to reimburse customers but admit no fault, which is customary in class-action settlements.To read this article in full or to leave a comment, please click here

Rubrik adds $41m in funding, releases backup appliance

When a startup’s $10 million in funding is followed two months later by a further $41 million, it’s safe to say they’re tapping into a trend. In the case of Rubrik, that trend is enterprise data management.Promising an all-in-one approach to enterprise backup and recovery, Rubrik announced its Converged Data Management platform in late March along with its initial funding. Introduced at the time via an early-access program, Rubrik’s technology aims to “eliminate backup software” by fusing enterprise data management with Web-scale IT.On Tuesday, Rubrik announced the $41 million Series B portion of its funding along with the general availability of its r300 Series hybrid cloud appliance. The Rubrik r300, a 2U unit containing up to four x86 nodes, comes pre-configured with the Rubrik Converged Data Management software.To read this article in full or to leave a comment, please click here

At Google I/O, Android may push deeper into the home

Android, already the most widely used operating system in smartphones, could soon find its way into refrigerators, door locks and all manner of other “smart” appliances around the home.The OS will be in the spotlight at Google’s massive I/O conference in San Francisco later this week. As well as pushing into home appliances, it could also be extended to play a deeper role in virtual reality, allowing Android developers to build apps for smartphones or VR headsets.Google hasn’t confirmed any of those plans yet, but as usual, the rumor mill has been in motion. Extending Android to even more devices could help Google draw more people to its online services, and by putting the software in home appliances, Google could gather further valuable insights into people’s behavior.To read this article in full or to leave a comment, please click here

Microsoft partners with 20 more Android tablet makers to pre-load Office apps

Microsoft apps will soon come pre-installed on more Android devices thanks to 20 new partnerships the company has forged with tablet makers around the world. The group of global and regional partners, which includes LG, Sony, Haier and Wortmann, will pre-install Word, Excel, PowerPoint, OneNote, OneDrive and Skype on devices in the near future.Beyond that, it’s mostly unclear when the manufacturers will be launching tablets with Microsoft’s apps pre-installed. Sony is slated to start with its Xperia Z4 in the next 90 days, but Microsoft hasn’t provided a timetable for the other manufacturers. LG, for its part, will include the apps on a new tablet sometime later this year. Going forward, manufacturers will have the freedom to pick which apps (if any) show up on a given tablet.To read this article in full or to leave a comment, please click here

MPLS “No Label” vs “Pop Label”

I like MPLS. And I don't necessarily mean as a solution to solve a problem, but as something to configure in the lab. It's fun to build things that do something when you're done. Setting up OSPF or EIGRP and being able to traceroute across routers is meh. But configuring MPLS with all the associated technologies — an IGP, LDP, MP-BGP, — and then getting all of them working in unison… when you get the traceroute working, it's rewarding.

Here's something to keep an eye out for when you're troubleshooting MPLS: An LFIB entry (that is, the Label Forwarding Information Base) that states “No Label” versus one that states “Pop Label”. These mean very different things and can be the difference between a working Label Switched Path (LSP) and a non-working LSP.

Thieves stole data on 100,000 taxpayers through IRS app

Criminals stole sensitive information about roughly 100,000 taxpayers through the Internal Revenue Service’s “Get Transcript” application, a major data breach at the U.S.’s national tax agency. The thieves first stole information including Social Security details, dates of birth and street addresses from an outside, non-IRS source, the government agency said Tuesday. They then used that information to clear a multistep authentication process and access the IRS site, along with all the personal tax details stored there. The matter is now under review by the Treasury Inspector General for Tax Administration and the IRS’ Criminal Investigation unit. The Get Transcript application has also been temporarily shut down.To read this article in full or to leave a comment, please click here

EFF and intrusion software regulation

To its credit, the EFF is better than a lot of other privacy groups like the ACLU or Privacy International. It at least acknowledges that regulating "evil" software can have unintended consequences on "good" software, that preventing corrupt governments from buying software also means blocking their dissidents from buying software to protect themselves. An example is this piece from several years ago that says:
"First and foremost, we want to make sure we do not leave activists with fewer tools than they already have. Parliament must be mindful of legislation just based on types of technology because broadly written regulations could have a net negative effect on the availability of many general-purpose technologies and could easily harm very people that the regulations are trying to protect."
But that does not stop the EFF from proposing such regulations.

In that same piece, the EFF first proposes rules for transparency. This will not stop the bad companies, but will be a burden on the legitimate companies that have no interesting in dealing with corrupt governments anyway. Most of this stuff is sold by small companies, like FinFisher, who focus on the "corrupt regime" market. They would not be embarrassed by transparency -- Continue reading

Power problems disrupt Africa’s telecom sector

Rampant power outages are hitting Africa’s telecom sector hard, and are likely to cause aftershocks in related industries.Southern African Development Community (SADC) and West African countries including Zambia, Nigeria, South Africa, and Malawi face an increasing number of power shortages, affecting the ability of businesses to run base stations, data centers, computers and other IT equipment.Fuel shortages in Nigeria Monday, for example, curtailed MTN and Etisalat services. The shortages also disrupted services in the banking and travel industries.Persistent power shortages have added to the high cost of doing business in Africa, as most mobile phone service providers and business process outsourcing facilities are forced to use generators to power installations. This has led operators including MTN to increase investments in renewable energy technologies in order to avoid reliance on the national grid.To read this article in full or to leave a comment, please click here

IDG Contributor Network: The connected car gets its own app store

Apple's App Store was launched on July 10, 2008 with 552 apps. The first weekend saw 10 million downloads."Stunning," was Apple CEO Steve Jobs comment at the time, according to Macworld.Well, as we know, apps have since taken off and app stores have spread to different devices. The latest of which is the connected car's first app gallery, just announced.Dongle It comes from Automatic, a company that makes a proprietary dongle for the car that grabs data from the vehicle's On-board Diagnostics II System (OBD-II). Automatic merges that data with other sensors.To read this article in full or to leave a comment, please click here

Network Break 38

Take a Network Break! Grab a coffee, a doughnut and then join us for an analysis of the latest IT news, vendor moves and new product announcements. We’ll separate the signal from the noise--or at least make some noise of our own.

Author information

Greg Ferro

Greg Ferro is a Network Engineer/Architect, mostly focussed on Data Centre, Security Infrastructure, and recently Virtualization. He has over 20 years in IT, in wide range of employers working as a freelance consultant including Finance, Service Providers and Online Companies. He is CCIE#6920 and has a few ideas about the world, but not enough to really count.

He is a host on the Packet Pushers Podcast, blogger at EtherealMind.com and on Twitter @etherealmind and Google Plus.

The post Network Break 38 appeared first on Packet Pushers Podcast and was written by Greg Ferro.

HP buying SDN company for NFV

HP this week signed a definitive agreement to acquire ConteXtream, a provider of OpenDaylight-based SDNs for service providers.Terms of the deal were not disclosed.ConteXtream develops an SDN controller for Network Functions Virtualization (NFV), software-based services that replace hardware-dependent Layer 4-7 functions, like load balancing and firewalls. ConteXtream’s products enable carriers to use existing standard server hardware to virtualize functions and services for subscribers, and to chain services across servers and subscribers.To read this article in full or to leave a comment, please click here

HP buying SDN company for NFV

HP this week signed a definitive agreement to acquire ConteXtream, a provider of OpenDaylight-based SDNs for service providers.Terms of the deal were not disclosed.ConteXtream develops an SDN controller for Network Functions Virtualization (NFV), software-based services that replace hardware-dependent Layer 4-7 functions, like load balancing and firewalls. ConteXtream’s products enable carriers to use existing standard server hardware to virtualize functions and services for subscribers, and to chain services across servers and subscribers.To read this article in full or to leave a comment, please click here

Researchers claim to boost cell-phone battery life with radio signals

Cell phones are constantly transmitting radio signals, whose energy can also be used to boost the battery life of mobile devices.Researchers at Ohio State University have developed circuitry that converts radio signals from a handset into energy, which is then fed back to the device’s battery. The researchers say the technology can increase the battery life of mobile devices by up to 30 percent.The OSU researchers are working with startup Nikola Labs to commercialize the technology, which they say can be easily implemented in cell-phone cases, and in June will launch a Kickstarter campaign to fund its continued development.To read this article in full or to leave a comment, please click here