MUST READ: Using BGP RPKI for a Safer Internet

As I explained in How Networks Really Work and Upcoming Internet Challenges webinars, routing security, and BGP security in particular remain one of the unsolved challenges we’ve been facing for decades (see also: what makes BGP a hot mess).

Fortunately, due to enormous efforts of a few persistent individuals BGP RPKI is getting traction (NTT just went all-in), and Flavio Luciani and Tiziano Tofoni decided to do their part creating an excellent in-depth document describing BGP RPKI theory and configuration on Cisco- and Juniper routers.

There are only two things you have to do:

Thank you, the Internet will be grateful.

2020-04-02 16:00 UTC - Two interesting events happened on April 1st. This is why we badly need RPKI and this is why we might need another document describing “how to back up ROAs and have a recovery procedure that takes less than 20 hours

About them Zoom vulns…

Today a couple vulnerabilities were announced in Zoom, the popular work-from-home conferencing app. Hackers can possibly exploit these to do evil things to you, such as steal your password. Because of the COVID-19, these vulns have hit the mainstream media. This means my non-techy friends and relatives have been asking about it. I thought I'd write up a blogpost answering their questions.

The short answer is that you don't need to worry about it. Unless you do bad things, like using the same password everywhere, it's unlikely to affect you. You should worry more about wearing pants on your Zoom video conferences in case you forget and stand up.



Now is a good time to remind people to stop using the same password everywhere and to visit https://haveibeenpwned.com to view all the accounts where they've had their password stolen. Using the same password everywhere is the #1 vulnerability the average person is exposed to, and is a possible problem here. For critical accounts (Windows login, bank, email), use a different password for each. (Sure, for accounts you don't care about, use the same password everywhere, I use 'Foobar1234'). Write these passwords down on paper and put that paper in Continue reading

The Mistake that Caused 1.1.1.3 to Block LGBTQIA+ Sites Today

The Mistake that Caused 1.1.1.3 to Block LGBTQIA+ Sites Today

Today we made a mistake. The mistake caused a number of LGBTQIA+ sites to inadvertently be blocked by the new 1.1.1.1 for Families service. I wanted to walk through what happened, why, and what we've done to fix it.

As is our tradition for the last three years, we roll out new products for the general public that uses the Internet on April 1. This year, one of those products was a filtered DNS service, 1.1.1.1 for Families. The service allows anyone who chooses to use it to restrict certain categories of sites.

Filtered vs Unfiltered DNS

Nothing about our new filtered DNS service changes the unfiltered nature of our original 1.1.1.1 service. However, we recognized that some people want a way to control what content is in their home. For instance, I block social media sites from resolving while I am trying to get work done because it makes me more productive. The number one request from users of 1.1.1.1 was that we create a version of the service for home use to block certain categories of sites. And so, earlier today, we launched 1.1.1. Continue reading

Canonical Wants to Manage Away Open Source Complexity

The vendor's Managed Apps platform can oversee 10 cloud-native database and logging, monitoring,...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Daily Roundup: T-Mobile Closes Sprint Merger

T-Mobile closed its Sprint acquisition; Intel CEO bestowed optimism despite pandemic; and...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Intel CEO Bestows Optimism Despite Pandemic Perils

Perhaps the most interesting thing about the letter was what wasn’t said. There was not one...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Tech Bytes: Using HashiCorp’s Terraform Cloud For Collaboration And Governance (Sponsored)

Terraform Cloud, from HashiCorp, is a SaaS-based service that provides governance, auditing, and collaboration for your infrastructure-as-code initiatives. Our guest to walk us through Terraform Cloud is Rosemary Wang, Developer Advocate at HashiCorp.

The post Tech Bytes: Using HashiCorp’s Terraform Cloud For Collaboration And Governance (Sponsored) appeared first on Packet Pushers.

T-Mobile US Closes Sprint Merger

The combination of the nation's third- and fourth-largest operators is the biggest shakeup to hit...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

KDDI, SoftBank Target 5G at Rural Japan

They will share base stations used to transmit the 5G signals in rural areas and collaborate on the...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Day Two Cloud 042: AWS Networking Part 1: Performance

Today on Day Two Cloud, Ned Bellavance and Ethan Banks answer listener questions about AWS Networking. They get into the nitty gritty on core AWS networking concepts including placement groups for EC2 instances, Elastic Network Adapters, network and application load balancing, Route 53, and more.

The post Day Two Cloud 042: AWS Networking Part 1: Performance appeared first on Packet Pushers.

SDxCentral’s Top 10 Articles — March 2020

Cisco Networking lessons learned during COVID-19; AT&T slashed more jobs; Microsoft topped...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Comcast’s Jeff Lewis: ‘Job No. 1 Is Customer Experience’

Jeff Lewis sat down to share his thoughts on ActiveCore products, the benefits for customers, and...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

SD-WAN and Technical Debt

Back during Networking Field Day 22, I was having a fun conversation with Phil Gervasi (@Network_Phil) and Carl Fugate (@CarlFugate) about SD-WAN and innovation. I mentioned that it was fascinating to see how SD-WAN companies kept innovating but that bigger, more established companies that had bought into SD-WAN seemed to be having issues catching up. As our conversation continued I realized that technical debt plays a huge role in startup culture in all factors, not just with SD-WAN. But we’ll use SD-WAN as an example here to focus our discussion.

Any Color You Want In Black

Big companies have investments in supply chains. They have products that are designed in a certain way because it’s the least expensive way to develop the project or it involves using technology developed by the company that gives them a competitive advantage. Think about something like the Cisco Nexus 9000-series switches that launched with Cisco ACI. Every one of them came with the Insieme ASIC that was built to accelerate the policy component of ACI. Whether or not you wanted to use ACI or Insieme in your deployment, you were getting the ASIC in the switch.

Policies like this Continue reading

Python String-Mutable Data Type

We all know that there are two types of Data types in Python ,i.e Mutable and other is immutable. In simple words, Mutable object can be change after its created whereas immutable object can’t

String,tuple,int,float,bool is example of immutable whereas list,dict and set are example of mutable data type.

Lets take an example of string data type :

We have string S=’Sujil’ and we need to change char ‘j’ to ‘n’ to make S=’Sunil’

>>> S ='Sunil'
>>> S ='Sujil'
>>> S=[2] = 'n'
  File "<input>", line 1
SyntaxError: can't assign to literal

We will get the SyntaxError , means we cannot change the defined string as string is Mutable data type .

Is there any way to change the Mutable data type string S=’Sujil’ to S=’Sunil’.

Yes , we can so the same . There is 3 way to do as below , choose the best way for urself.

Way 1:

>>> S ='Sujil'
>>> S
'Sujil'
>>> S = S[:2]+'n' +S[3:]
>>> S
'Sunil'
>>> type(S)
<class 'str'>

Way 2:

>>> S = 'Sujil'
>>> S
'Sujil'
>>> type(S)
<class 'str'>
>>> S =S.replace('j','n')
>>> S
'Sunil'

Way 3:

>>> S = 'Sujil'
>>> type(S)
<class 'str'>
>>>  Continue reading

Disinformation: The Invisible Sword Dividing Society

Supermarkets have finally restocked their toilet paper in Hong Kong after weeks of panic buying when a rumor about toilet paper shortage due to closure of factories in China went viral. The toilet paper shortage did happen, but it was because of panic buying, not because of factory closure in China. How did the rumor spread? Was disinformation one of the culprits?

On February 25th, the Internet Society Hong Kong Chapter organized a Hong Kong Internet Governance Forum Roundtable on disinformation. On the panel was Eric Wishart, News Management Member at Agence France-Presse (AFP); Masato Kajimoto from the Journalism and Media Studies Centre of the University of Hong Kong; George Chen, Head of Public Policy (Hong Kong, Taiwan and Mongolia) at Facebook; and Charles Mok, a local Legislative Councillor.

Did someone spread “disinformation” about toilet paper shortage?

While a lot of people think that the rumor on toilet paper shortage is a piece of disinformation or fake news, Masato reminded us that it actually is not. Disinformation is information that is deliberately created to deceive people, which is different from “misleading information.” In the case of panic buying toilet paper, some people made an opinion about toilet paper production Continue reading

Tips to prevent Zoom Bombing, Security and Conference Hygience

Zoom Meeting IDs are sequential ten digit numbers. People are randomly creating IDs and dropping into Zoom conferences often using abusive language, displaying pornagraphic images or worse.  Yes, Zoom has poor security posture generally. The design approach appears makes it easy to use as possible while compromising security. Compared to other conferencing platforms, it does […]

The post Tips to prevent Zoom Bombing, Security and Conference Hygience appeared first on EtherealMind.