We’d like to introduce you to one of the most devastating ways to cause service instability in modern micro-service architectures: application DDoS. A specially crafted application DDoS attack can cause cascading system failures often for a fraction of the resources needed to conduct a more traditional DDoS attack. This is due to the complex, interconnected…
During the lifetime of an IPv4 datagram inside the Linux kernel, one important step is the route lookup for the destination address through the fib_lookup() function. From essential information about the datagram (source and destination IP addresses, interfaces, firewall mark, …), this function should quickly provide a decision. —Vincent Bernat @MTU Ninja
Over the years hackers have hijacked many domain names by manipulating their DNS records to redirect visitors to malicious servers. While there’s no perfect solution to prevent such security breaches, there are actions that domain owners can take to limit the impact of these attacks on their Web services and users. —Lucisn Constantin @ The…
One of the several capabilities provided by IPv6 is that hosts are provided two options to configure their IPv6 addressles) and other parameters like the Recursive DNS Server(RDNSS) information [2]; that is either by using the stateless address autoconfiguration [3] or by obtaining the information from aDHCPv6server(4]. IPv6 hosts are advised as for the environment…
When Cisco announced its intent to acquire leading SD-WAN vendor Viptela in May of 2017, the network industry buzzed with conversation. Now, we’re in the quiet purgatory while we wait for regulatory approval. Since the deal hasn’t been finalized yet, neither company can say much about their plans for integration. But it’s clear that a…
Following the success of the first course ‘Introduction to Cybersecurity’, the APNIC Academy has launched its second course: ‘Internet Resource Management’. The course is for anyone interested in managing their Internet number resources more effectively, familiarising themselves with the Internet ecosystem, and finding out new ways to engage with the Internet community. —APNIC
Around 12:00 PST, an unknown attacker exploited a critical flaw in the Parity multi-signature wallet on the Ethereum network, draining three massive wallets of over $31,000,000 worth of Ether in a matter of minutes. Given a couple more hours, the hacker could’ve made off with over $180,000,000 from vulnerable wallets. —Haseeb Qureshi @ Free Code…
Containers (and microservices) are the future of application delivery, at least until the next Great Tech Leap Forward comes along, and Docker is the category killer platform. Companies are adopting Docker at a remarkable rate these days. And, increasingly, all developers — and systems administrators, and cloud administrators — need to at least have a…
A recent article in The Washington Post identified a rising “sea of despair” among the white working class and a surge in suicides from 1999 to 2015, when a record high of 600,000 Americans took their own lives. In a country as free and as prosperous as the United States of America, where the pursuit…
Since the advent of open source in telecoms, customers have increasingly fallen in love with the idea of getting all software for free. That keeps vendors scratching their heads when thinking about long term survival, let alone midterm profitability… and ways of differentiating. Hopefully the industry will find a way to keep on paying for…