Stahp it with the Network programmer FUD already

Every week I see somebody ask “will all Network Engineers be programmers” on Twitter, LinkedIn, at a trade show or just to be antagonistic and for no other reason than to start an argument.

The anger inside has been brewing for over 12 months until the pressure valve finally released in the form of this blog post. Expect snark.

Healthy Paranoia Show 19: The ABCs of PCI DSS

Hello boys and girls! What time is it? That’s right, it’s time for another fun-filled episode of Healthy Paranoia! Joining us in the top secret Healthy Paranoia treehouse and just in time for the release of PCI DSS 3.0 is special guest, Dr. Anton Chuvakin, Research Director at Gartner and recognized security expert in the […]

Author information

Mrs. Y

Snarkitecht at Island of Misfit Toys

Mrs. Y is a recovering Unix engineer working in network security. Also the host of Healthy Paranoia and official nerd hunter. She likes long walks in hubsites, traveling to security conferences and spending time in the Bat Cave. Sincerely believes that every problem can be solved with a "for" loop. When not blogging or podcasting, can be found using up her 15 minutes in the Twittersphere or Google+ as @MrsYisWhy.

The post Healthy Paranoia Show 19: The ABCs of PCI DSS appeared first on Packet Pushers Podcast and was written by Mrs. Y.

TPM chip protecting SSH keys

STOP! There is a better way. this post explains a simpler and more secure way.

Update 2: I have something I think will be better up my sleeve for using the TPM chip with SSH. Stay tuned. In the mean time, the below works.

Finally, I found out how to use a TPM chip to protect SSH keys. Thanks to Perry Lorier. I'm just going to note down those same steps, but with my notes.

I've written about hardware protecting crypto keys and increasing SSH security before:

but this is what I've always been after. With this solution the SSH key cannot be stolen. If someone uses this SSH key that means that the machine with the TPM chip is involved right now. Right now it's not turned off, or disconnected from the network.

Update: you need to delete /var/lib/opencryptoki/tpm/your-username/*.pem, because otherwise your keys will be migratable. I'm looking into how to either never generating these files, or making them unusable by having the TPM chip reject them. Update to come.

When I run this again on a completely blank system I'll add Continue reading

When is enough, enough?

I recently came across this article from John Dix – who made the point that throughout the year, SDN events have helped monitor and inform the community on where the adoption is really occurring. Many articles like this suggest to me that the market understands the idea of SDN opening up a “stack” as in the entire solution – from the metal, to the OS, to the applications. Yet today, there is not enough understanding to necessarily pull the ideal stack together. Articles such as this ask a common question we are all trying to answer: How much SDN is enough to see the value of SDN?

Customers help us see the value in “de-laminating the stack” and moving toward a horizontal model instead of the traditional, fully integrated and closed system that legacy networking vendors now provide. This makes sense because a more open SDN was designed in part to enable innovation and help break some of the vendor lock-in that a closed system fosters. Conversely, for even visionary customers, it can be daunting to try to pull the stack back together and add value to their specific environments.

Do customers see SDN as part of their collective visions Continue reading

F5 Networks iRule Event Order – HTTPS/SSL – Client & Server Side

As promised, here’s the event order for  HTTPS. I’d be grateful to any F5′ers out there that can pick holes in this, if any. Apologies for the ‘slimming’ of the diagram caused by the WordPress theme. Right click and view in a new tab or save as to see it in all it’s glory. Last […]

Author information

Steven Iveson

Steven Iveson

Steven Iveson, the last of four children of the seventies, was born in London and has never been too far from a shooting, bombing or riot. He's now grateful to live in a small town in East Yorkshire in the north east of England with his wife Sam and their four children.

He's worked in the IT industry for over 15 years in a variety of roles, predominantly in data centre environments. Working with switches and routers pretty much from the start he now also has a thirst for application delivery, SDN, virtualisation and related products and technologies. He's published a number of F5 Networks related books and is a regular contributor at DevCentral.

The post F5 Networks iRule Event Order – HTTPS/SSL – Client & Server Side appeared first on Packet Pushers Podcast and was written by Continue reading

Configuring the HP MSR930 for BT Infinity

After trying in vain to make my BT Home Hub 3 work as a Proper Router™ for my home lab I decided to take the plunge and get something better. Seeing as I work at HP, I thought I’d try the HP MSR 930

First step is to get your Fundamentals configured. The config below is a snippet from my configuration. This will enable SSH, SFTP, and HTTPS access from local IP addresses only.

sysname <Your Hostname>
#
# Change some web timeouts
#
web https-authorization mode auto
web idle-timeout 3
#
# ACL for Local Access
#
acl number 2000
 description *** Local Only ***
 rule 0 permit source 192.168.1.0 0.0.0.255
 rule 5 permit source 10.0.0.0 0.255.255.255
#
# Secure Web Interface
#
undo ip http enable
ip https enable
ip https port 443
ip https acl 2000
#
# SSH Setup
#
ssh server enable
ssh server authentication-timeout 10
sftp server enable
#
# Restrict VTY to SSH from Local IP's
#
user-interface vty 0 4
 acl 2000 in
 authentication-mode scheme
 protocol inbound ssh

Once we have our fundamentals done, we can get our firewall ready. Continue reading

Learning though experimentation and breaking things

Lifehacker suggested“Learning to Code by Breaking Someone Else’s Code” and I wanted to share my personal experiences with this method….

The DOS era

When I was young, 7ish, my parents bought a Packard Bell 486 machine (a DX with goofy speakers that hook on the side of the monitor IIRC). It was supposed to be for school, but as far as I was concerned it was for playing games! While the PC ran Windows 3.11, all of my games ran on DOS. DOS, as many of you probably know, has no UI, so in order to install or run a game you were at the mercy of the manual. Typically, the manual would instruct you to “cd” to a removable disk drive and run an “.exe”. This taught me some basic DOS and that an “exe” was an application that I could run.

Sound, Joysticks, IRQ and DMA

Upon running the “exe” in DOS you would be lucky if the game would run correctly first time. Sometimes you would have graphics issues, other times no sound and sometimes your joystick wouldn’t work. To get a game to work you had to select the correct drivers for graphics Continue reading

Tech Field Day Round Table at Cisco ACI Launch

I was honored to be part of a round table discussion held at the Cisco ACI launch with a lot of smart folks. I recommend a watch, we got into some really cool topics, and helped create the framework for some future blog posts of mine. For more on Tech Field Day, head over to TechFieldDay.com I attended the Cisco ACI launch event as a Tech Field Day delegate.

Tech Field Day Round Table at Cisco ACI Launch

I was honored to be part of a round table discussion held at the Cisco ACI launch with a lot of smart folks. I recommend a watch, we got into some really cool topics, and helped create the framework for some future blog posts of mine. For more on Tech Field Day, head over to TechFieldDay.com I attended the Cisco ACI launch event as a Tech Field Day delegate.

Making JSON more Readable with Sublime Text

I saw Scott Lowe’s post on how he is making JSON more readable in BBEdit and I thought I’d share how I’m doing this in Sublime Text.

If you aren’t using Package Control, you should be, so install it using the instructions here.

Open the prompt with ^⌘P then type Install and press Enter Then type Pretty JSON and press enter on more time.

Then to make your JSON pretty, you can simply ^⌘J or ^⌘P and type pretty

F5 Networks iRule Event Order – HTTP

I hit an issue recently where I thought I knew what was what but found myself doubting my knowledge. To that end, here’s a diagram detailing the iRule event order where HTTP traffic is concerned – I’ll follow up shortly with one for HTTPS flows. I’d be grateful to any F5’ers out there that can […]

Author information

Steven Iveson

Steven Iveson

Steven Iveson, the last of four children of the seventies, was born in London and has never been too far from a shooting, bombing or riot. He's now grateful to live in a small town in East Yorkshire in the north east of England with his wife Sam and their four children.

He's worked in the IT industry for over 15 years in a variety of roles, predominantly in data centre environments. Working with switches and routers pretty much from the start he now also has a thirst for application delivery, SDN, virtualisation and related products and technologies. He's published a number of F5 Networks related books and is a regular contributor at DevCentral.

The post F5 Networks iRule Event Order – HTTP appeared first on Packet Pushers Podcast and was written by Steven Iveson.

ACI Launch

Tech Field Day brought me to the Cisco Application Centric Infrastructure launch event last week in New York. I attended at someone else's expense, but that doesn't mean my opinions are for sale, etc...

If you're totally unfamiliar with ACI (formerly Insieme), I recommend listening to Episode 12 of the Class C Block podcast with guest Joe Onisick. This was far more informative than anything I encountered at the actual launch event, probably because the Tech Field Day crew went straight from the John Chambers presentation into a room where we recorded a roundtable discussion. There may have been some technical discussion going on next door, but I missed it.

There's no shortage of people expressing opinions about ACI and what it will or won't do for you, most of whom have beaten me to the punch by several days. I'm going to post instead about a few details of the launch that I found interesting.

Defining Policy Might Not Be Easy
ACI requires that applications (really application owners) express to it the relationships between nodes before any traffic is allowed to flow. There are countless ways this might happen, but they all boil down to figuring out which ports Continue reading

On IPSec complexity – maybe AWS VPC’s IPSec will emerge as a de-facto standard

Here is a delayed reaction to the posts about IPSec complexity by Jason Edelman and Ivan Pepelnjak last month. AWS might give us decent IPSec ‘standard’ to rally around. There has been plenty of discussion of the past few years about whether it’s a good idea for providers and orchestration stacks to adopt the AWS APIs. There’s no need to […]

Author information

Nik Weidenbacher

Nik Weidenbacher

Nik has been into linux, networking and software development for the past couple of decades. He's been working for a service provider for a long time, and in recent years has been doing a lot with data center automation (the buzzword-enhanced version of that being "cloud orchestration").

The post On IPSec complexity – maybe AWS VPC’s IPSec will emerge as a de-facto standard appeared first on Packet Pushers Podcast and was written by Nik Weidenbacher.

Show 167 – Cisco ACI Software Defined Networking – A First Look

Ethan and Greg got together to talk over the Cisco Application Centric Infrastructure (ACI) announcement this week. From the information that we have available to us, we look at some of the early concepts and technology that we know about. 40 GB BiDir optics and what it means for data centre design Nexus 9000 hardware […]

Author information

Greg Ferro

Greg Ferro is a Network Engineer/Architect, mostly focussed on Data Centre, Security Infrastructure, and recently Virtualization. He has over 20 years in IT, in wide range of employers working as a freelance consultant including Finance, Service Providers and Online Companies. He is CCIE#6920 and has a few ideas about the world, but not enough to really count.

He is a host on the Packet Pushers Podcast, blogger at EtherealMind.com and on Twitter @etherealmind and Google Plus.

The post Show 167 – Cisco ACI Software Defined Networking – A First Look appeared first on Packet Pushers Podcast and was written by Greg Ferro.