<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Sun, 19 Apr 2026 16:28:23 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Acme”</title>
    <link>https://techsnap.systems/tags/acme</link>
    <pubDate>Fri, 20 Mar 2020 00:15:00 -0700</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>425: Ryzen Gets Real</title>
  <link>https://techsnap.systems/425</link>
  <guid isPermaLink="false">fc127e6a-cc96-408c-ae38-8049074a8f34</guid>
  <pubDate>Fri, 20 Mar 2020 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/fc127e6a-cc96-408c-ae38-8049074a8f34.mp3" length="23682530" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We take a look at AMD's upcoming line of Ryzen 4000 mobile CPUs, and share our first impressions of Ubuntu 20.04's approach to ZFS on root.</itunes:subtitle>
  <itunes:duration>32:53</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We take a look at AMD's upcoming line of Ryzen 4000 mobile CPUs, and share our first impressions of Ubuntu 20.04's approach to ZFS on root. 
Plus Let's Encrypt's certificate validation mix-up, Intel's questionable new power supply design, and more. 
</description>
  <itunes:keywords>Let's Encrypt, Boulder, Go, HTTPS, TLS, CAA, DNS, ACME, automation, Intel, AMD, Ryzen, Ryzen 4000, laptop, mobile processors, CPU, GPU, computer hardware, gaming, integrated graphics, graphics, battery life, Lenovo, Ryzen Mobile, ATX12VO, power supply, PSU, motherboard, electronics, iXsystems, TrueNAS, FreeNAS, TrueNAS Core, ZFS, fusion pools, storage, zsys, 20.04, Ubuntu, Canonical, snapshots, APT, sanoid, DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, Linux Academy, sysadmin podcast, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We take a look at AMD&#39;s upcoming line of Ryzen 4000 mobile CPUs, and share our first impressions of Ubuntu 20.04&#39;s approach to ZFS on root. </p>

<p>Plus Let&#39;s Encrypt&#39;s certificate validation mix-up, Intel&#39;s questionable new power supply design, and more.</p><p>Links:</p><ul><li><a title="Let&#39;s Encrypt changes course on certificate revocation" rel="nofollow" href="https://arstechnica.com/information-technology/2020/03/lets-encrypt-holds-off-on-revocation-of-certificates/">Let's Encrypt changes course on certificate revocation</a></li><li><a title="Revoking certain certificates on March 4" rel="nofollow" href="https://community.letsencrypt.org/t/revoking-certain-certificates-on-march-4/114864">Revoking certain certificates on March 4</a></li><li><a title="Let&#39;s Encrypt: Incomplete revocation for CAA rechecking bug" rel="nofollow" href="https://bugzilla.mozilla.org/show_bug.cgi?id=1619179#c7">Let's Encrypt: Incomplete revocation for CAA rechecking bug</a></li><li><a title="Pass authzModel by value, not reference" rel="nofollow" href="https://github.com/letsencrypt/boulder/pull/4690/files#diff-2285b0268539881fde96d9928ecef358R1412">Pass authzModel by value, not reference</a></li><li><a title="The Complete Guide to CAA Records" rel="nofollow" href="https://jasonofflorida.com/the-complete-guide-to-caa-records/">The Complete Guide to CAA Records</a></li><li><a title="DNS Certification Authority Authorization" rel="nofollow" href="https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization">DNS Certification Authority Authorization</a></li><li><a title="AMD&#39;s 7nm Ryzen 4000 laptop processors are finally here" rel="nofollow" href="https://arstechnica.com/gadgets/2020/03/amds-7nm-ryzen-4000-laptop-processors-are-finally-here/">AMD's 7nm Ryzen 4000 laptop processors are finally here</a></li><li><a title="How Intel is changing the future of power supplies with its ATX12VO spec" rel="nofollow" href="https://www.pcworld.com/article/3518831/how-intels-changing-the-future-of-power-supplies-with-its-atx12vo-spec.html">How Intel is changing the future of power supplies with its ATX12VO spec</a></li><li><a title="Single Rail Power Supply ATX12VO Design Guide" rel="nofollow" href="https://www.intel.com/content/dam/www/public/us/en/documents/guides/single-rail-power-supply-platform-atx12vo-design-guide.pdf">Single Rail Power Supply ATX12VO Design Guide</a></li><li><a title="FreeNAS and TrueNAS are Unifying" rel="nofollow" href="https://www.ixsystems.com/blog/freenas-truenas-unification/">FreeNAS and TrueNAS are Unifying</a></li><li><a title="FreeNAS and TrueNAS are Unifying [Video Announcement]" rel="nofollow" href="https://www.youtube.com/watch?v=0gK2g8g0btI">FreeNAS and TrueNAS are Unifying [Video Announcement]</a></li><li><a title="Ubuntu 20.04&#39;s zsys adds ZFS snapshots to package management" rel="nofollow" href="https://arstechnica.com/gadgets/2020/03/ubuntu-20-04s-zsys-adds-zfs-snapshots-to-package-management/">Ubuntu 20.04's zsys adds ZFS snapshots to package management</a></li><li><a title="ubuntu/zsys: zsys daemon and client for zfs systems" rel="nofollow" href="https://github.com/ubuntu/zsys">ubuntu/zsys: zsys daemon and client for zfs systems</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We take a look at AMD&#39;s upcoming line of Ryzen 4000 mobile CPUs, and share our first impressions of Ubuntu 20.04&#39;s approach to ZFS on root. </p>

<p>Plus Let&#39;s Encrypt&#39;s certificate validation mix-up, Intel&#39;s questionable new power supply design, and more.</p><p>Links:</p><ul><li><a title="Let&#39;s Encrypt changes course on certificate revocation" rel="nofollow" href="https://arstechnica.com/information-technology/2020/03/lets-encrypt-holds-off-on-revocation-of-certificates/">Let's Encrypt changes course on certificate revocation</a></li><li><a title="Revoking certain certificates on March 4" rel="nofollow" href="https://community.letsencrypt.org/t/revoking-certain-certificates-on-march-4/114864">Revoking certain certificates on March 4</a></li><li><a title="Let&#39;s Encrypt: Incomplete revocation for CAA rechecking bug" rel="nofollow" href="https://bugzilla.mozilla.org/show_bug.cgi?id=1619179#c7">Let's Encrypt: Incomplete revocation for CAA rechecking bug</a></li><li><a title="Pass authzModel by value, not reference" rel="nofollow" href="https://github.com/letsencrypt/boulder/pull/4690/files#diff-2285b0268539881fde96d9928ecef358R1412">Pass authzModel by value, not reference</a></li><li><a title="The Complete Guide to CAA Records" rel="nofollow" href="https://jasonofflorida.com/the-complete-guide-to-caa-records/">The Complete Guide to CAA Records</a></li><li><a title="DNS Certification Authority Authorization" rel="nofollow" href="https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization">DNS Certification Authority Authorization</a></li><li><a title="AMD&#39;s 7nm Ryzen 4000 laptop processors are finally here" rel="nofollow" href="https://arstechnica.com/gadgets/2020/03/amds-7nm-ryzen-4000-laptop-processors-are-finally-here/">AMD's 7nm Ryzen 4000 laptop processors are finally here</a></li><li><a title="How Intel is changing the future of power supplies with its ATX12VO spec" rel="nofollow" href="https://www.pcworld.com/article/3518831/how-intels-changing-the-future-of-power-supplies-with-its-atx12vo-spec.html">How Intel is changing the future of power supplies with its ATX12VO spec</a></li><li><a title="Single Rail Power Supply ATX12VO Design Guide" rel="nofollow" href="https://www.intel.com/content/dam/www/public/us/en/documents/guides/single-rail-power-supply-platform-atx12vo-design-guide.pdf">Single Rail Power Supply ATX12VO Design Guide</a></li><li><a title="FreeNAS and TrueNAS are Unifying" rel="nofollow" href="https://www.ixsystems.com/blog/freenas-truenas-unification/">FreeNAS and TrueNAS are Unifying</a></li><li><a title="FreeNAS and TrueNAS are Unifying [Video Announcement]" rel="nofollow" href="https://www.youtube.com/watch?v=0gK2g8g0btI">FreeNAS and TrueNAS are Unifying [Video Announcement]</a></li><li><a title="Ubuntu 20.04&#39;s zsys adds ZFS snapshots to package management" rel="nofollow" href="https://arstechnica.com/gadgets/2020/03/ubuntu-20-04s-zsys-adds-zfs-snapshots-to-package-management/">Ubuntu 20.04's zsys adds ZFS snapshots to package management</a></li><li><a title="ubuntu/zsys: zsys daemon and client for zfs systems" rel="nofollow" href="https://github.com/ubuntu/zsys">ubuntu/zsys: zsys daemon and client for zfs systems</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>395: The ACME Era</title>
  <link>https://techsnap.systems/395</link>
  <guid isPermaLink="false">26a02c39-f731-48d1-9539-2d910465a6f7</guid>
  <pubDate>Sun, 20 Jan 2019 20:45:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/26a02c39-f731-48d1-9539-2d910465a6f7.mp3" length="28300543" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We welcome Jim to the show, and he and Wes dive deep into all things Let’s Encrypt.</itunes:subtitle>
  <itunes:duration>33:21</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We welcome Jim to the show, and he and Wes dive deep into all things Let’s Encrypt.
The history, the clients, and the from-the-field details you'll want to know. 
</description>
  <itunes:keywords>SSL, TLS, public key cryptography. X.509, EV, DV, Domain Verification, Extended Verification, StartSSL, CSR, SSL certificates, TLS certificates, BGP, ACME, Let’s Encrypt, Certbot, Mozilla, EFF, Automation, NGINX, Apache, Traefik, caddy,  DNS, HTTP,  HTTPS, Encryption, ISRG, TLS-SNI-01, ACME V2, Mail Server, Exim, Dovecot, Postfix, IETF, Security, Networking, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We welcome Jim to the show, and he and Wes dive deep into all things Let’s Encrypt.</p>

<p>The history, the clients, and the from-the-field details you&#39;ll want to know.</p><p>Links:</p><ul><li><a title=" Let’s Encrypt and CertBot – JRS Systems" rel="nofollow" href="http://jrs-s.net/2018/12/22/reverse-proxy-lets-encrypt-certbot/"> Let’s Encrypt and CertBot – JRS Systems</a></li><li><a title="Automatic Certificate Management Environment (ACME)" rel="nofollow" href="https://ietf-wg-acme.github.io/acme/draft-ietf-acme-acme.html#rfc.section.8">Automatic Certificate Management Environment (ACME)</a> &mdash; The surprisingly readable IETF draft.</li><li><a title="How It Works - Let&#39;s Encrypt" rel="nofollow" href="https://letsencrypt.org/how-it-works/">How It Works - Let's Encrypt</a></li><li><a title="ACME Client Implementations" rel="nofollow" href="https://letsencrypt.org/docs/client-options/">ACME Client Implementations</a></li><li><a title="Certbot" rel="nofollow" href="https://github.com/certbot/certbot">Certbot</a> &mdash; Certbot is EFF's tool to obtain certs from Let's Encrypt.</li><li><a title="acme-nginx: python acme client for nginx" rel="nofollow" href="https://github.com/kshcherban/acme-nginx">acme-nginx: python acme client for nginx</a> &mdash; A particularly simple client that is useful for understanding the protocol details.</li><li><a title="Caddy - The HTTP/2 Web Server with Automatic HTTPS" rel="nofollow" href="https://caddyserver.com/">Caddy - The HTTP/2 Web Server with Automatic HTTPS</a></li><li><a title="mod_md: Let&#39;s Encrypt (ACME) support for Apache httpd" rel="nofollow" href="https://github.com/icing/mod_md">mod_md: Let's Encrypt (ACME) support for Apache httpd</a></li><li><a title="Traefik - The Cloud Native Edge Router" rel="nofollow" href="https://traefik.io/">Traefik - The Cloud Native Edge Router</a></li><li><a title="Looking Forward to 2019 - Let&#39;s Encrypt" rel="nofollow" href="https://letsencrypt.org/2018/12/31/looking-forward-to-2019.html">Looking Forward to 2019 - Let's Encrypt</a> &mdash; We’re now serving more than 150 million websites while maintaining a stellar security and compliance track record. Most importantly though, the Web went from 67% encrypted page loads to 77% in 2018, according to statistics from Mozilla. This is an incredible rate of change!</li><li><a title="Let&#39;s Encrypt ACME v2 API Announcements" rel="nofollow" href="https://community.letsencrypt.org/t/staging-endpoint-for-acme-v2/49605">Let's Encrypt ACME v2 API Announcements</a> &mdash; Now that the draft standard is in last-call and the pace of major changes has slowed, we’re able to release a “v2” API that is much closer to what will become the final ACME RFC.</li><li><a title="Let&#39;s Encrypt disables TLS-SNI-01 validation" rel="nofollow" href="https://www.zdnet.com/article/lets-encrypt-disables-tls-sni-01-validation/">Let's Encrypt disables TLS-SNI-01 validation</a> &mdash; The researcher noticed that "at least two" large hosting providers host many users on the same IP address and users are able to upload certificates for arbitrary names without proving they have control of a domain.</li><li><a title="A Technical Deep Dive on Using Certbot to Secure your Mailserver from the EFF" rel="nofollow" href="https://www.eff.org/deeplinks/2019/01/encrypting-web-encrypting-net-primer-using-certbot-secure-your-mailserver">A Technical Deep Dive on Using Certbot to Secure your Mailserver from the EFF</a> &mdash; With the most recent release of Certbot v0.29.1, we’ve added some features which make it much easier to use with both Sendmail and Exim.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We welcome Jim to the show, and he and Wes dive deep into all things Let’s Encrypt.</p>

<p>The history, the clients, and the from-the-field details you&#39;ll want to know.</p><p>Links:</p><ul><li><a title=" Let’s Encrypt and CertBot – JRS Systems" rel="nofollow" href="http://jrs-s.net/2018/12/22/reverse-proxy-lets-encrypt-certbot/"> Let’s Encrypt and CertBot – JRS Systems</a></li><li><a title="Automatic Certificate Management Environment (ACME)" rel="nofollow" href="https://ietf-wg-acme.github.io/acme/draft-ietf-acme-acme.html#rfc.section.8">Automatic Certificate Management Environment (ACME)</a> &mdash; The surprisingly readable IETF draft.</li><li><a title="How It Works - Let&#39;s Encrypt" rel="nofollow" href="https://letsencrypt.org/how-it-works/">How It Works - Let's Encrypt</a></li><li><a title="ACME Client Implementations" rel="nofollow" href="https://letsencrypt.org/docs/client-options/">ACME Client Implementations</a></li><li><a title="Certbot" rel="nofollow" href="https://github.com/certbot/certbot">Certbot</a> &mdash; Certbot is EFF's tool to obtain certs from Let's Encrypt.</li><li><a title="acme-nginx: python acme client for nginx" rel="nofollow" href="https://github.com/kshcherban/acme-nginx">acme-nginx: python acme client for nginx</a> &mdash; A particularly simple client that is useful for understanding the protocol details.</li><li><a title="Caddy - The HTTP/2 Web Server with Automatic HTTPS" rel="nofollow" href="https://caddyserver.com/">Caddy - The HTTP/2 Web Server with Automatic HTTPS</a></li><li><a title="mod_md: Let&#39;s Encrypt (ACME) support for Apache httpd" rel="nofollow" href="https://github.com/icing/mod_md">mod_md: Let's Encrypt (ACME) support for Apache httpd</a></li><li><a title="Traefik - The Cloud Native Edge Router" rel="nofollow" href="https://traefik.io/">Traefik - The Cloud Native Edge Router</a></li><li><a title="Looking Forward to 2019 - Let&#39;s Encrypt" rel="nofollow" href="https://letsencrypt.org/2018/12/31/looking-forward-to-2019.html">Looking Forward to 2019 - Let's Encrypt</a> &mdash; We’re now serving more than 150 million websites while maintaining a stellar security and compliance track record. Most importantly though, the Web went from 67% encrypted page loads to 77% in 2018, according to statistics from Mozilla. This is an incredible rate of change!</li><li><a title="Let&#39;s Encrypt ACME v2 API Announcements" rel="nofollow" href="https://community.letsencrypt.org/t/staging-endpoint-for-acme-v2/49605">Let's Encrypt ACME v2 API Announcements</a> &mdash; Now that the draft standard is in last-call and the pace of major changes has slowed, we’re able to release a “v2” API that is much closer to what will become the final ACME RFC.</li><li><a title="Let&#39;s Encrypt disables TLS-SNI-01 validation" rel="nofollow" href="https://www.zdnet.com/article/lets-encrypt-disables-tls-sni-01-validation/">Let's Encrypt disables TLS-SNI-01 validation</a> &mdash; The researcher noticed that "at least two" large hosting providers host many users on the same IP address and users are able to upload certificates for arbitrary names without proving they have control of a domain.</li><li><a title="A Technical Deep Dive on Using Certbot to Secure your Mailserver from the EFF" rel="nofollow" href="https://www.eff.org/deeplinks/2019/01/encrypting-web-encrypting-net-primer-using-certbot-secure-your-mailserver">A Technical Deep Dive on Using Certbot to Secure your Mailserver from the EFF</a> &mdash; With the most recent release of Certbot v0.29.1, we’ve added some features which make it much easier to use with both Sendmail and Exim.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 359: Netflix’s Dark Capacity</title>
  <link>https://techsnap.systems/359</link>
  <guid isPermaLink="false">c63e4421-989c-4e30-813c-cb967a5ab29b</guid>
  <pubDate>Thu, 15 Mar 2018 20:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/c63e4421-989c-4e30-813c-cb967a5ab29b.mp3" length="23670639" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Netflix has a few tricks we can learn from, and the story of clever malware that was operating undetected since 2012. 
</itunes:subtitle>
  <itunes:duration>31:49</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Netflix has a few tricks we can learn from, and the story of clever malware that was operating undetected since 2012. 
Plus we discuss Let's Encrypt’s Wildcard support and explain what ACME v2 is.
Then we detail the bad position Samba 4 admins are in, and the real cause of these recent 1.7Tbps DDoS attacks. 
</description>
  <content:encoded>
    <![CDATA[<p>Netflix has a few tricks we can learn from, and the story of clever malware that was operating undetected since 2012. </p>

<p>Plus we discuss Let&#39;s Encrypt’s Wildcard support and explain what ACME v2 is.</p>

<p>Then we detail the bad position Samba 4 admins are in, and the real cause of these recent 1.7Tbps DDoS attacks.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Hardcoded Password Found in Cisco Software" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/hardcoded-password-found-in-cisco-software/">Hardcoded Password Found in Cisco Software</a> &mdash; Cisco says that an attacker could exploit this vulnerability (CVE-2018-0141) by connecting to the affected system via Secure Shell (SSH) using the hardcoded password.</li><li><a title="Potent malware that hid for six years spread through routers " rel="nofollow" href="https://arstechnica.com/information-technology/2018/03/potent-malware-that-hid-for-six-years-spread-through-routers/">Potent malware that hid for six years spread through routers </a> &mdash; "The malware is highly advanced, solving all sorts of problems from a technical perspective and often in a very elegant way, combining older and newer components in a thoroughly thought-through, long-term operation, something to expect from a top-notch well-resourced actor."</li><li><a title="CVE 2018-1057: Authenticated Samba users can change other users&#39; password " rel="nofollow" href="https://www.samba.org/samba/security/CVE-2018-1057.html">CVE 2018-1057: Authenticated Samba users can change other users' password </a> &mdash;  On a Samba 4 AD DC the LDAP server in all versions of Samba from
4.0.0 onwards incorrectly validates permissions to modify passwords
over LDAP allowing authenticated users to change any other users'
passwords, including administrative users and privileged service
accounts (eg Domain Controllers).</li><li><a title="CVE-2018-1057 - SambaWiki Workarounds " rel="nofollow" href="https://wiki.samba.org/index.php/CVE-2018-1057#Workarounds">CVE-2018-1057 - SambaWiki Workarounds </a> &mdash; Revoke the change passwords right for 'the world' from all user objects (including computers) in the directory, leaving only the right to change a user's own password.</li><li><a title="ACME v2 and Wildcard Certificate Support is Live" rel="nofollow" href="https://community.letsencrypt.org/t/acme-v2-and-wildcard-certificate-support-is-live/55579">ACME v2 and Wildcard Certificate Support is Live</a> &mdash; We’re pleased to announce that ACMEv2 and wildcard certificate support is live! </li><li><a title="It just got much easier to wage record-breaking DDoSes " rel="nofollow" href="https://arstechnica.com/information-technology/2018/03/it-just-got-much-easier-to-wage-record-breaking-ddoses/">It just got much easier to wage record-breaking DDoSes </a> &mdash; Within days of the new technique going public, security firms reported it being used in a record-setting 1.3 terabit-per-second DDoS against Github and then, two days later, a record-topping 1.7 Tbps attack against an unnamed US-based service provider.</li><li><a title="The real cause of large DDoS " rel="nofollow" href="https://blog.cloudflare.com/the-root-cause-of-large-ddos-ip-spoofing/">The real cause of large DDoS </a> &mdash; All the gigantic headline-grabbing attacks are what we call "L3" (Layer 3 OSI[1]). This kind of attack has a common trait - the malicious software sends as many packets as possible onto the network. </li><li><a title="Project Nimble – Netflix TechBlog" rel="nofollow" href="https://medium.com/netflix-techblog/project-nimble-region-evacuation-reimagined-d0d0568254d4">Project Nimble – Netflix TechBlog</a> &mdash; We set ourselves an aggressive goal of being able to fail over traffic in less than 10 minutes. </li><li><a title="Follow Up: Alex has a tip for Alex" rel="nofollow" href="https://pastebin.com/g97N8teu">Follow Up: Alex has a tip for Alex</a></li><li><a title="Question: Oliver asks about a fail2ban replacement " rel="nofollow" href="https://pastebin.com/wrGGUyBp">Question: Oliver asks about a fail2ban replacement </a></li><li><a title="S3Scanner" rel="nofollow" href="https://github.com/sa7mon/S3Scanner">S3Scanner</a> &mdash; Scan for open S3 buckets and dump </li><li><a title="Chromium is also a Snap" rel="nofollow" href="https://snapcraft.io/chromium">Chromium is also a Snap</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Netflix has a few tricks we can learn from, and the story of clever malware that was operating undetected since 2012. </p>

<p>Plus we discuss Let&#39;s Encrypt’s Wildcard support and explain what ACME v2 is.</p>

<p>Then we detail the bad position Samba 4 admins are in, and the real cause of these recent 1.7Tbps DDoS attacks.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Hardcoded Password Found in Cisco Software" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/hardcoded-password-found-in-cisco-software/">Hardcoded Password Found in Cisco Software</a> &mdash; Cisco says that an attacker could exploit this vulnerability (CVE-2018-0141) by connecting to the affected system via Secure Shell (SSH) using the hardcoded password.</li><li><a title="Potent malware that hid for six years spread through routers " rel="nofollow" href="https://arstechnica.com/information-technology/2018/03/potent-malware-that-hid-for-six-years-spread-through-routers/">Potent malware that hid for six years spread through routers </a> &mdash; "The malware is highly advanced, solving all sorts of problems from a technical perspective and often in a very elegant way, combining older and newer components in a thoroughly thought-through, long-term operation, something to expect from a top-notch well-resourced actor."</li><li><a title="CVE 2018-1057: Authenticated Samba users can change other users&#39; password " rel="nofollow" href="https://www.samba.org/samba/security/CVE-2018-1057.html">CVE 2018-1057: Authenticated Samba users can change other users' password </a> &mdash;  On a Samba 4 AD DC the LDAP server in all versions of Samba from
4.0.0 onwards incorrectly validates permissions to modify passwords
over LDAP allowing authenticated users to change any other users'
passwords, including administrative users and privileged service
accounts (eg Domain Controllers).</li><li><a title="CVE-2018-1057 - SambaWiki Workarounds " rel="nofollow" href="https://wiki.samba.org/index.php/CVE-2018-1057#Workarounds">CVE-2018-1057 - SambaWiki Workarounds </a> &mdash; Revoke the change passwords right for 'the world' from all user objects (including computers) in the directory, leaving only the right to change a user's own password.</li><li><a title="ACME v2 and Wildcard Certificate Support is Live" rel="nofollow" href="https://community.letsencrypt.org/t/acme-v2-and-wildcard-certificate-support-is-live/55579">ACME v2 and Wildcard Certificate Support is Live</a> &mdash; We’re pleased to announce that ACMEv2 and wildcard certificate support is live! </li><li><a title="It just got much easier to wage record-breaking DDoSes " rel="nofollow" href="https://arstechnica.com/information-technology/2018/03/it-just-got-much-easier-to-wage-record-breaking-ddoses/">It just got much easier to wage record-breaking DDoSes </a> &mdash; Within days of the new technique going public, security firms reported it being used in a record-setting 1.3 terabit-per-second DDoS against Github and then, two days later, a record-topping 1.7 Tbps attack against an unnamed US-based service provider.</li><li><a title="The real cause of large DDoS " rel="nofollow" href="https://blog.cloudflare.com/the-root-cause-of-large-ddos-ip-spoofing/">The real cause of large DDoS </a> &mdash; All the gigantic headline-grabbing attacks are what we call "L3" (Layer 3 OSI[1]). This kind of attack has a common trait - the malicious software sends as many packets as possible onto the network. </li><li><a title="Project Nimble – Netflix TechBlog" rel="nofollow" href="https://medium.com/netflix-techblog/project-nimble-region-evacuation-reimagined-d0d0568254d4">Project Nimble – Netflix TechBlog</a> &mdash; We set ourselves an aggressive goal of being able to fail over traffic in less than 10 minutes. </li><li><a title="Follow Up: Alex has a tip for Alex" rel="nofollow" href="https://pastebin.com/g97N8teu">Follow Up: Alex has a tip for Alex</a></li><li><a title="Question: Oliver asks about a fail2ban replacement " rel="nofollow" href="https://pastebin.com/wrGGUyBp">Question: Oliver asks about a fail2ban replacement </a></li><li><a title="S3Scanner" rel="nofollow" href="https://github.com/sa7mon/S3Scanner">S3Scanner</a> &mdash; Scan for open S3 buckets and dump </li><li><a title="Chromium is also a Snap" rel="nofollow" href="https://snapcraft.io/chromium">Chromium is also a Snap</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
