<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Sat, 18 Apr 2026 17:24:28 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Bgp”</title>
    <link>https://techsnap.systems/tags/bgp</link>
    <pubDate>Fri, 01 May 2020 00:15:00 -0700</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>428: RAID Reality Check</title>
  <link>https://techsnap.systems/428</link>
  <guid isPermaLink="false">5556e3df-292d-4b0b-8e25-27f071862c06</guid>
  <pubDate>Fri, 01 May 2020 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/5556e3df-292d-4b0b-8e25-27f071862c06.mp3" length="25930419" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We dive deep into the world of  RAID, and discuss how to choose the right topology to optimize performance and resilience.</itunes:subtitle>
  <itunes:duration>36:00</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We dive deep into the world of  RAID, and discuss how to choose the right topology to optimize performance and resilience.
Plus Cloudflare steps up its campaign to secure BGP, and why you might want to trade in cron for systemd timers. 
</description>
  <itunes:keywords>DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, sysadmin podcast, EPYC, Threadripper, AMD, 7FX2, CPU, per-core performance, Intel, Threadripper, TDP, energy efficiency, RAID, md-raid, ZFS, hard disk performance, iops, hard drive, storage, Seagate, Iron Wolf, raidz, raidz2, RAID-5, RAID-6, RAID-10, ZFS, backups, fio, benchmarking, data integrity, BGP, Cloudflare, networking, RPKI, security, cryptography, route leak, routing, isbgpsafeyet, internet, systemd, systemd timers, cron, email, monitoring, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We dive deep into the world of  RAID, and discuss how to choose the right topology to optimize performance and resilience.</p>

<p>Plus Cloudflare steps up its campaign to secure BGP, and why you might want to trade in cron for systemd timers.</p><p>Links:</p><ul><li><a title="AMD Claims World’s Fastest Per-Core Performance with New EPYC Rome 7Fx2 CPUs" rel="nofollow" href="https://www.tomshardware.com/news/amd-worlds-fastest-processor-epyc-rome-7fx2-cpus">AMD Claims World’s Fastest Per-Core Performance with New EPYC Rome 7Fx2 CPUs</a></li><li><a title="AMD EPYC 7F52 Linux Performance - AMD 7FX2 CPUs Further Increasing The Fight Against Intel Xeon Review" rel="nofollow" href="https://www.phoronix.com/scan.php?page=article&amp;item=amd-epyc-7f52&amp;num=1">AMD EPYC 7F52 Linux Performance - AMD 7FX2 CPUs Further Increasing The Fight Against Intel Xeon Review</a></li><li><a title="Understanding RAID: How performance scales from one disk to eight" rel="nofollow" href="https://arstechnica.com/information-technology/2020/04/understanding-raid-how-performance-scales-from-one-disk-to-eight/">Understanding RAID: How performance scales from one disk to eight</a></li><li><a title="New Cloudflare tool can tell you if your ISP has deployed BGP fixes" rel="nofollow" href="https://arstechnica.com/information-technology/2020/04/new-cloudflare-tool-can-tell-you-if-your-isp-has-deployed-bgp-fixes/">New Cloudflare tool can tell you if your ISP has deployed BGP fixes</a></li><li><a title="Is BGP safe yet?" rel="nofollow" href="https://isbgpsafeyet.com/">Is BGP safe yet?</a></li><li><a title="RPKI - The required cryptographic upgrade to BGP routing" rel="nofollow" href="https://blog.cloudflare.com/rpki/">RPKI - The required cryptographic upgrade to BGP routing</a></li><li><a title="Why I Prefer systemd Timers Over Cron – Thomas Stringer" rel="nofollow" href="https://trstringer.com/systemd-timer-vs-cronjob/">Why I Prefer systemd Timers Over Cron – Thomas Stringer</a></li><li><a title="systemd/Timers - ArchWiki" rel="nofollow" href="https://wiki.archlinux.org/index.php/Systemd/Timers">systemd/Timers - ArchWiki</a></li><li><a title="systemd.time (Time format docs)" rel="nofollow" href="https://www.freedesktop.org/software/systemd/man/systemd.time.html">systemd.time (Time format docs)</a></li><li><a title="systemd.timer (Unit docs)" rel="nofollow" href="https://www.freedesktop.org/software/systemd/man/systemd.timer.html">systemd.timer (Unit docs)</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We dive deep into the world of  RAID, and discuss how to choose the right topology to optimize performance and resilience.</p>

<p>Plus Cloudflare steps up its campaign to secure BGP, and why you might want to trade in cron for systemd timers.</p><p>Links:</p><ul><li><a title="AMD Claims World’s Fastest Per-Core Performance with New EPYC Rome 7Fx2 CPUs" rel="nofollow" href="https://www.tomshardware.com/news/amd-worlds-fastest-processor-epyc-rome-7fx2-cpus">AMD Claims World’s Fastest Per-Core Performance with New EPYC Rome 7Fx2 CPUs</a></li><li><a title="AMD EPYC 7F52 Linux Performance - AMD 7FX2 CPUs Further Increasing The Fight Against Intel Xeon Review" rel="nofollow" href="https://www.phoronix.com/scan.php?page=article&amp;item=amd-epyc-7f52&amp;num=1">AMD EPYC 7F52 Linux Performance - AMD 7FX2 CPUs Further Increasing The Fight Against Intel Xeon Review</a></li><li><a title="Understanding RAID: How performance scales from one disk to eight" rel="nofollow" href="https://arstechnica.com/information-technology/2020/04/understanding-raid-how-performance-scales-from-one-disk-to-eight/">Understanding RAID: How performance scales from one disk to eight</a></li><li><a title="New Cloudflare tool can tell you if your ISP has deployed BGP fixes" rel="nofollow" href="https://arstechnica.com/information-technology/2020/04/new-cloudflare-tool-can-tell-you-if-your-isp-has-deployed-bgp-fixes/">New Cloudflare tool can tell you if your ISP has deployed BGP fixes</a></li><li><a title="Is BGP safe yet?" rel="nofollow" href="https://isbgpsafeyet.com/">Is BGP safe yet?</a></li><li><a title="RPKI - The required cryptographic upgrade to BGP routing" rel="nofollow" href="https://blog.cloudflare.com/rpki/">RPKI - The required cryptographic upgrade to BGP routing</a></li><li><a title="Why I Prefer systemd Timers Over Cron – Thomas Stringer" rel="nofollow" href="https://trstringer.com/systemd-timer-vs-cronjob/">Why I Prefer systemd Timers Over Cron – Thomas Stringer</a></li><li><a title="systemd/Timers - ArchWiki" rel="nofollow" href="https://wiki.archlinux.org/index.php/Systemd/Timers">systemd/Timers - ArchWiki</a></li><li><a title="systemd.time (Time format docs)" rel="nofollow" href="https://www.freedesktop.org/software/systemd/man/systemd.time.html">systemd.time (Time format docs)</a></li><li><a title="systemd.timer (Unit docs)" rel="nofollow" href="https://www.freedesktop.org/software/systemd/man/systemd.timer.html">systemd.timer (Unit docs)</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>407: Old School Outages</title>
  <link>https://techsnap.systems/407</link>
  <guid isPermaLink="false">a442674d-ddd6-471a-ac89-448f1d9a3284</guid>
  <pubDate>Wed, 10 Jul 2019 22:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/a442674d-ddd6-471a-ac89-448f1d9a3284.mp3" length="30618354" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Jim shares his Nagios tips and Wes chimes in with some modern monitoring tools as we chat monitoring in the wake of some high-profile outages.</itunes:subtitle>
  <itunes:duration>42:31</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Jim shares his Nagios tips and Wes chimes in with some modern tools as we chat monitoring in the wake of some high-profile outages.
Plus we turn our eye to hardware and get excited about the latest Ryzen line from AMD. 
</description>
  <itunes:keywords>Ryzen, AMD, Epyc, Intel, CPU, server, server builds, performance, benchmarks, internet, xeon, ecc, outages, google, cloudflare, facebook, microsoft, BGP, regex, deployment, verizon, RKPI, bgp leak, internet infrastructure, monitoring, openNMS, libreNMS, nagios, zabbix, prometheus, riemann, time series, metrics, logs, logging, observability, grafana, netdata, NRPE, old school, sysadmin, infosec, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Jim shares his Nagios tips and Wes chimes in with some modern tools as we chat monitoring in the wake of some high-profile outages.</p>

<p>Plus we turn our eye to hardware and get excited about the latest Ryzen line from AMD.</p><p>Links:</p><ul><li><a title="Third parties confirm AMD’s outstanding Ryzen 3000 numbers | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/07/third-parties-confirm-amds-outstanding-ryzen-3000-numbers/">Third parties confirm AMD’s outstanding Ryzen 3000 numbers | Ars Technica</a> &mdash; AMD debuted its new Ryzen 3000 desktop CPU line a few weeks ago at E3, and it looked fantastic. For the first time in 20 years, it looked like AMD could go head to head with Intel's desktop CPU line-up across the board. The question: would independent, third-party testing back up AMD's assertions?</li><li><a title="The Internet broke today: Facebook, Verizon, and more see major outages | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2019/07/facebook-cloudflare-microsoft-and-twitter-suffer-outages/">The Internet broke today: Facebook, Verizon, and more see major outages | Ars Technica</a> &mdash; Last week, Verizon caused a major BGP misroute that took large chunks of the Internet, including CDN company Cloudflare, partially down for a day. This week, the rest of the Internet has apparently asked Verizon to hold its beer.

</li><li><a title="It was a really bad month for the internet | TechCrunch" rel="nofollow" href="https://techcrunch.com/2019/07/05/bad-month-for-the-internet/">It was a really bad month for the internet | TechCrunch</a> &mdash; In the past month there were several major internet outages affecting millions of users across the world. Sites buckled, services broke, images wouldn’t load, direct messages ground to a halt and calendars and email were unavailable for hours at a time.</li><li><a title="Cloudflare outage caused by bad software deploy (updated)" rel="nofollow" href="https://blog.cloudflare.com/cloudflare-outage/">Cloudflare outage caused by bad software deploy (updated)</a> &mdash; For about 30 minutes today, visitors to Cloudflare sites received 502 errors caused by a massive spike in CPU utilization on our network. This CPU spike was caused by a bad software deploy that was rolled back.
</li><li><a title="How Verizon and a BGP Optimizer Knocked Large Parts of the Internet Offline Today" rel="nofollow" href="https://blog.cloudflare.com/how-verizon-and-a-bgp-optimizer-knocked-large-parts-of-the-internet-offline-today/">How Verizon and a BGP Optimizer Knocked Large Parts of the Internet Offline Today</a> &mdash; Today at 10:30UTC, the Internet had a small heart attack. A small company in Northern Pennsylvania became a preferred path of many Internet routes through Verizon (AS701), a major Internet transit provider. </li><li><a title="Getting started | Prometheus" rel="nofollow" href="https://prometheus.io/docs/prometheus/latest/getting_started/">Getting started | Prometheus</a> &mdash; This guide is a "Hello World"-style tutorial which shows how to install, configure, and use Prometheus in a simple example setup. </li><li><a title="prometheus/node_exporter" rel="nofollow" href="https://github.com/prometheus/node_exporter">prometheus/node_exporter</a> &mdash; Prometheus exporter for hardware and OS metrics exposed by *NIX kernels, written in Go with pluggable metric collectors.

</li><li><a title="Using netdata with Prometheus" rel="nofollow" href="https://docs.netdata.cloud/backends/prometheus/">Using netdata with Prometheus</a> &mdash; Prometheus is a distributed monitoring system which offers a very simple setup along with a robust data model. Recently netdata added support for Prometheus.</li><li><a title="prometheus/nagios_plugins" rel="nofollow" href="https://github.com/prometheus/nagios_plugins">prometheus/nagios_plugins</a> &mdash; Nagios plugin for alerting on prometheus query results.</li><li><a title="RobustPerception/nrpe_exporter" rel="nofollow" href="https://github.com/RobustPerception/nrpe_exporter">RobustPerception/nrpe_exporter</a> &mdash; The NRPE exporter exposes metrics on commands sent to a running NRPE daemon.

</li><li><a title="m-lab/prometheus-nagios-exporter" rel="nofollow" href="https://github.com/m-lab/prometheus-nagios-exporter">m-lab/prometheus-nagios-exporter</a> &mdash; The Prometheus Nagios exporter reads status and performance data from nagios plugins via the MK Livestatus Nagios plugin and publishes this in a form that can be scrapped by Prometheus.</li><li><a title="Comparison to alternatives | Prometheus" rel="nofollow" href="https://prometheus.io/docs/introduction/comparison/">Comparison to alternatives | Prometheus</a> &mdash; Prometheus is a full monitoring and trending system that includes built-in and active scraping, storing, querying, graphing, and alerting based on time series data.</li><li><a title="Quality server monitoring solution using NetData/Prometheus/Grafana" rel="nofollow" href="https://nemanja.io/quality-server-monitoring-solution-using-netdata-prometheus-grafana/">Quality server monitoring solution using NetData/Prometheus/Grafana</a> &mdash; I’m going to quickly show you how to install both netdata and Prometheus on the client and server. We can then use grafana pointed at Prometheus to obtain long-term metrics netdata offers.</li><li><a title="Monitoring stack by using Grafana + Prometheus + Netdata" rel="nofollow" href="https://medium.com/@jomzsg/monitoring-stack-by-using-grafana-prometheus-netdata-f9940d6804c8">Monitoring stack by using Grafana + Prometheus + Netdata</a> &mdash; This monitoring stack you can monitoring in real-time by Netdata and see the history by using Grafana.</li><li><a title="Monitoring Agent · NCPA" rel="nofollow" href="https://www.nagios.org/ncpa/">Monitoring Agent · NCPA</a> &mdash; New to NCPA? See some of the awesome features present in the Web GUI and API, available on any operating system.

</li><li><a title="Nagios 101: Understanding the Fundamentals - Nagios" rel="nofollow" href="https://www.nagios.com/nagios-101-understanding-fundamentals/">Nagios 101: Understanding the Fundamentals - Nagios</a></li><li><a title="Nagios Documentation " rel="nofollow" href="https://www.nagios.org/documentation/">Nagios Documentation </a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Jim shares his Nagios tips and Wes chimes in with some modern tools as we chat monitoring in the wake of some high-profile outages.</p>

<p>Plus we turn our eye to hardware and get excited about the latest Ryzen line from AMD.</p><p>Links:</p><ul><li><a title="Third parties confirm AMD’s outstanding Ryzen 3000 numbers | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/07/third-parties-confirm-amds-outstanding-ryzen-3000-numbers/">Third parties confirm AMD’s outstanding Ryzen 3000 numbers | Ars Technica</a> &mdash; AMD debuted its new Ryzen 3000 desktop CPU line a few weeks ago at E3, and it looked fantastic. For the first time in 20 years, it looked like AMD could go head to head with Intel's desktop CPU line-up across the board. The question: would independent, third-party testing back up AMD's assertions?</li><li><a title="The Internet broke today: Facebook, Verizon, and more see major outages | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2019/07/facebook-cloudflare-microsoft-and-twitter-suffer-outages/">The Internet broke today: Facebook, Verizon, and more see major outages | Ars Technica</a> &mdash; Last week, Verizon caused a major BGP misroute that took large chunks of the Internet, including CDN company Cloudflare, partially down for a day. This week, the rest of the Internet has apparently asked Verizon to hold its beer.

</li><li><a title="It was a really bad month for the internet | TechCrunch" rel="nofollow" href="https://techcrunch.com/2019/07/05/bad-month-for-the-internet/">It was a really bad month for the internet | TechCrunch</a> &mdash; In the past month there were several major internet outages affecting millions of users across the world. Sites buckled, services broke, images wouldn’t load, direct messages ground to a halt and calendars and email were unavailable for hours at a time.</li><li><a title="Cloudflare outage caused by bad software deploy (updated)" rel="nofollow" href="https://blog.cloudflare.com/cloudflare-outage/">Cloudflare outage caused by bad software deploy (updated)</a> &mdash; For about 30 minutes today, visitors to Cloudflare sites received 502 errors caused by a massive spike in CPU utilization on our network. This CPU spike was caused by a bad software deploy that was rolled back.
</li><li><a title="How Verizon and a BGP Optimizer Knocked Large Parts of the Internet Offline Today" rel="nofollow" href="https://blog.cloudflare.com/how-verizon-and-a-bgp-optimizer-knocked-large-parts-of-the-internet-offline-today/">How Verizon and a BGP Optimizer Knocked Large Parts of the Internet Offline Today</a> &mdash; Today at 10:30UTC, the Internet had a small heart attack. A small company in Northern Pennsylvania became a preferred path of many Internet routes through Verizon (AS701), a major Internet transit provider. </li><li><a title="Getting started | Prometheus" rel="nofollow" href="https://prometheus.io/docs/prometheus/latest/getting_started/">Getting started | Prometheus</a> &mdash; This guide is a "Hello World"-style tutorial which shows how to install, configure, and use Prometheus in a simple example setup. </li><li><a title="prometheus/node_exporter" rel="nofollow" href="https://github.com/prometheus/node_exporter">prometheus/node_exporter</a> &mdash; Prometheus exporter for hardware and OS metrics exposed by *NIX kernels, written in Go with pluggable metric collectors.

</li><li><a title="Using netdata with Prometheus" rel="nofollow" href="https://docs.netdata.cloud/backends/prometheus/">Using netdata with Prometheus</a> &mdash; Prometheus is a distributed monitoring system which offers a very simple setup along with a robust data model. Recently netdata added support for Prometheus.</li><li><a title="prometheus/nagios_plugins" rel="nofollow" href="https://github.com/prometheus/nagios_plugins">prometheus/nagios_plugins</a> &mdash; Nagios plugin for alerting on prometheus query results.</li><li><a title="RobustPerception/nrpe_exporter" rel="nofollow" href="https://github.com/RobustPerception/nrpe_exporter">RobustPerception/nrpe_exporter</a> &mdash; The NRPE exporter exposes metrics on commands sent to a running NRPE daemon.

</li><li><a title="m-lab/prometheus-nagios-exporter" rel="nofollow" href="https://github.com/m-lab/prometheus-nagios-exporter">m-lab/prometheus-nagios-exporter</a> &mdash; The Prometheus Nagios exporter reads status and performance data from nagios plugins via the MK Livestatus Nagios plugin and publishes this in a form that can be scrapped by Prometheus.</li><li><a title="Comparison to alternatives | Prometheus" rel="nofollow" href="https://prometheus.io/docs/introduction/comparison/">Comparison to alternatives | Prometheus</a> &mdash; Prometheus is a full monitoring and trending system that includes built-in and active scraping, storing, querying, graphing, and alerting based on time series data.</li><li><a title="Quality server monitoring solution using NetData/Prometheus/Grafana" rel="nofollow" href="https://nemanja.io/quality-server-monitoring-solution-using-netdata-prometheus-grafana/">Quality server monitoring solution using NetData/Prometheus/Grafana</a> &mdash; I’m going to quickly show you how to install both netdata and Prometheus on the client and server. We can then use grafana pointed at Prometheus to obtain long-term metrics netdata offers.</li><li><a title="Monitoring stack by using Grafana + Prometheus + Netdata" rel="nofollow" href="https://medium.com/@jomzsg/monitoring-stack-by-using-grafana-prometheus-netdata-f9940d6804c8">Monitoring stack by using Grafana + Prometheus + Netdata</a> &mdash; This monitoring stack you can monitoring in real-time by Netdata and see the history by using Grafana.</li><li><a title="Monitoring Agent · NCPA" rel="nofollow" href="https://www.nagios.org/ncpa/">Monitoring Agent · NCPA</a> &mdash; New to NCPA? See some of the awesome features present in the Web GUI and API, available on any operating system.

</li><li><a title="Nagios 101: Understanding the Fundamentals - Nagios" rel="nofollow" href="https://www.nagios.com/nagios-101-understanding-fundamentals/">Nagios 101: Understanding the Fundamentals - Nagios</a></li><li><a title="Nagios Documentation " rel="nofollow" href="https://www.nagios.org/documentation/">Nagios Documentation </a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>395: The ACME Era</title>
  <link>https://techsnap.systems/395</link>
  <guid isPermaLink="false">26a02c39-f731-48d1-9539-2d910465a6f7</guid>
  <pubDate>Sun, 20 Jan 2019 20:45:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/26a02c39-f731-48d1-9539-2d910465a6f7.mp3" length="28300543" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We welcome Jim to the show, and he and Wes dive deep into all things Let’s Encrypt.</itunes:subtitle>
  <itunes:duration>33:21</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We welcome Jim to the show, and he and Wes dive deep into all things Let’s Encrypt.
The history, the clients, and the from-the-field details you'll want to know. 
</description>
  <itunes:keywords>SSL, TLS, public key cryptography. X.509, EV, DV, Domain Verification, Extended Verification, StartSSL, CSR, SSL certificates, TLS certificates, BGP, ACME, Let’s Encrypt, Certbot, Mozilla, EFF, Automation, NGINX, Apache, Traefik, caddy,  DNS, HTTP,  HTTPS, Encryption, ISRG, TLS-SNI-01, ACME V2, Mail Server, Exim, Dovecot, Postfix, IETF, Security, Networking, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We welcome Jim to the show, and he and Wes dive deep into all things Let’s Encrypt.</p>

<p>The history, the clients, and the from-the-field details you&#39;ll want to know.</p><p>Links:</p><ul><li><a title=" Let’s Encrypt and CertBot – JRS Systems" rel="nofollow" href="http://jrs-s.net/2018/12/22/reverse-proxy-lets-encrypt-certbot/"> Let’s Encrypt and CertBot – JRS Systems</a></li><li><a title="Automatic Certificate Management Environment (ACME)" rel="nofollow" href="https://ietf-wg-acme.github.io/acme/draft-ietf-acme-acme.html#rfc.section.8">Automatic Certificate Management Environment (ACME)</a> &mdash; The surprisingly readable IETF draft.</li><li><a title="How It Works - Let&#39;s Encrypt" rel="nofollow" href="https://letsencrypt.org/how-it-works/">How It Works - Let's Encrypt</a></li><li><a title="ACME Client Implementations" rel="nofollow" href="https://letsencrypt.org/docs/client-options/">ACME Client Implementations</a></li><li><a title="Certbot" rel="nofollow" href="https://github.com/certbot/certbot">Certbot</a> &mdash; Certbot is EFF's tool to obtain certs from Let's Encrypt.</li><li><a title="acme-nginx: python acme client for nginx" rel="nofollow" href="https://github.com/kshcherban/acme-nginx">acme-nginx: python acme client for nginx</a> &mdash; A particularly simple client that is useful for understanding the protocol details.</li><li><a title="Caddy - The HTTP/2 Web Server with Automatic HTTPS" rel="nofollow" href="https://caddyserver.com/">Caddy - The HTTP/2 Web Server with Automatic HTTPS</a></li><li><a title="mod_md: Let&#39;s Encrypt (ACME) support for Apache httpd" rel="nofollow" href="https://github.com/icing/mod_md">mod_md: Let's Encrypt (ACME) support for Apache httpd</a></li><li><a title="Traefik - The Cloud Native Edge Router" rel="nofollow" href="https://traefik.io/">Traefik - The Cloud Native Edge Router</a></li><li><a title="Looking Forward to 2019 - Let&#39;s Encrypt" rel="nofollow" href="https://letsencrypt.org/2018/12/31/looking-forward-to-2019.html">Looking Forward to 2019 - Let's Encrypt</a> &mdash; We’re now serving more than 150 million websites while maintaining a stellar security and compliance track record. Most importantly though, the Web went from 67% encrypted page loads to 77% in 2018, according to statistics from Mozilla. This is an incredible rate of change!</li><li><a title="Let&#39;s Encrypt ACME v2 API Announcements" rel="nofollow" href="https://community.letsencrypt.org/t/staging-endpoint-for-acme-v2/49605">Let's Encrypt ACME v2 API Announcements</a> &mdash; Now that the draft standard is in last-call and the pace of major changes has slowed, we’re able to release a “v2” API that is much closer to what will become the final ACME RFC.</li><li><a title="Let&#39;s Encrypt disables TLS-SNI-01 validation" rel="nofollow" href="https://www.zdnet.com/article/lets-encrypt-disables-tls-sni-01-validation/">Let's Encrypt disables TLS-SNI-01 validation</a> &mdash; The researcher noticed that "at least two" large hosting providers host many users on the same IP address and users are able to upload certificates for arbitrary names without proving they have control of a domain.</li><li><a title="A Technical Deep Dive on Using Certbot to Secure your Mailserver from the EFF" rel="nofollow" href="https://www.eff.org/deeplinks/2019/01/encrypting-web-encrypting-net-primer-using-certbot-secure-your-mailserver">A Technical Deep Dive on Using Certbot to Secure your Mailserver from the EFF</a> &mdash; With the most recent release of Certbot v0.29.1, we’ve added some features which make it much easier to use with both Sendmail and Exim.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We welcome Jim to the show, and he and Wes dive deep into all things Let’s Encrypt.</p>

<p>The history, the clients, and the from-the-field details you&#39;ll want to know.</p><p>Links:</p><ul><li><a title=" Let’s Encrypt and CertBot – JRS Systems" rel="nofollow" href="http://jrs-s.net/2018/12/22/reverse-proxy-lets-encrypt-certbot/"> Let’s Encrypt and CertBot – JRS Systems</a></li><li><a title="Automatic Certificate Management Environment (ACME)" rel="nofollow" href="https://ietf-wg-acme.github.io/acme/draft-ietf-acme-acme.html#rfc.section.8">Automatic Certificate Management Environment (ACME)</a> &mdash; The surprisingly readable IETF draft.</li><li><a title="How It Works - Let&#39;s Encrypt" rel="nofollow" href="https://letsencrypt.org/how-it-works/">How It Works - Let's Encrypt</a></li><li><a title="ACME Client Implementations" rel="nofollow" href="https://letsencrypt.org/docs/client-options/">ACME Client Implementations</a></li><li><a title="Certbot" rel="nofollow" href="https://github.com/certbot/certbot">Certbot</a> &mdash; Certbot is EFF's tool to obtain certs from Let's Encrypt.</li><li><a title="acme-nginx: python acme client for nginx" rel="nofollow" href="https://github.com/kshcherban/acme-nginx">acme-nginx: python acme client for nginx</a> &mdash; A particularly simple client that is useful for understanding the protocol details.</li><li><a title="Caddy - The HTTP/2 Web Server with Automatic HTTPS" rel="nofollow" href="https://caddyserver.com/">Caddy - The HTTP/2 Web Server with Automatic HTTPS</a></li><li><a title="mod_md: Let&#39;s Encrypt (ACME) support for Apache httpd" rel="nofollow" href="https://github.com/icing/mod_md">mod_md: Let's Encrypt (ACME) support for Apache httpd</a></li><li><a title="Traefik - The Cloud Native Edge Router" rel="nofollow" href="https://traefik.io/">Traefik - The Cloud Native Edge Router</a></li><li><a title="Looking Forward to 2019 - Let&#39;s Encrypt" rel="nofollow" href="https://letsencrypt.org/2018/12/31/looking-forward-to-2019.html">Looking Forward to 2019 - Let's Encrypt</a> &mdash; We’re now serving more than 150 million websites while maintaining a stellar security and compliance track record. Most importantly though, the Web went from 67% encrypted page loads to 77% in 2018, according to statistics from Mozilla. This is an incredible rate of change!</li><li><a title="Let&#39;s Encrypt ACME v2 API Announcements" rel="nofollow" href="https://community.letsencrypt.org/t/staging-endpoint-for-acme-v2/49605">Let's Encrypt ACME v2 API Announcements</a> &mdash; Now that the draft standard is in last-call and the pace of major changes has slowed, we’re able to release a “v2” API that is much closer to what will become the final ACME RFC.</li><li><a title="Let&#39;s Encrypt disables TLS-SNI-01 validation" rel="nofollow" href="https://www.zdnet.com/article/lets-encrypt-disables-tls-sni-01-validation/">Let's Encrypt disables TLS-SNI-01 validation</a> &mdash; The researcher noticed that "at least two" large hosting providers host many users on the same IP address and users are able to upload certificates for arbitrary names without proving they have control of a domain.</li><li><a title="A Technical Deep Dive on Using Certbot to Secure your Mailserver from the EFF" rel="nofollow" href="https://www.eff.org/deeplinks/2019/01/encrypting-web-encrypting-net-primer-using-certbot-secure-your-mailserver">A Technical Deep Dive on Using Certbot to Secure your Mailserver from the EFF</a> &mdash; With the most recent release of Certbot v0.29.1, we’ve added some features which make it much easier to use with both Sendmail and Exim.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 391: Firecracker Fundamentals</title>
  <link>https://techsnap.systems/391</link>
  <guid isPermaLink="false">85bdbb45-28a2-4d50-bed1-ade6768e3fa3</guid>
  <pubDate>Thu, 29 Nov 2018 14:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/85bdbb45-28a2-4d50-bed1-ade6768e3fa3.mp3" length="18175107" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different than the options on the market now.</itunes:subtitle>
  <itunes:duration>21:17</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different from the options on the market now.
Plus some good news for OpenBGP and the wider internet community, and a handy tool for inspecting docker images.
</description>
  <itunes:keywords>Firecracker, AWS, Amazon, Serverless, Lambda, Fargate, QEMU, KVM, Virtualization, Virtual Machines, VENOM, Rust,  BGP, OpenBSD, RPKI, MITM, dive, Docker, evilginx2, proxy, Sennheiser, TLS, SSL, OpenBGPD, RIPE, LSI, RAID, Allan Jude, Security, Networking, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different from the options on the market now.</p>

<p>Plus some good news for OpenBGP and the wider internet community, and a handy tool for inspecting docker images.</p><p>Links:</p><ul><li><a title="Firecracker – Lightweight Virtualization for Serverless Computing" rel="nofollow" href="https://aws.amazon.com/blogs/aws/firecracker-lightweight-virtualization-for-serverless-computing/">Firecracker – Lightweight Virtualization for Serverless Computing</a> &mdash; Firecracker is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant containers and functions-based services.</li><li><a title="Firecracker" rel="nofollow" href="https://firecracker-microvm.github.io/">Firecracker</a> &mdash; Firecracker is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant containers and functions-based services.</li><li><a title="Firecracker Design Docs" rel="nofollow" href="https://github.com/firecracker-microvm/firecracker/blob/master/docs/design.md">Firecracker Design Docs</a></li><li><a title="Firecracker Roadmap" rel="nofollow" href="https://github.com/firecracker-microvm/firecracker/labels/Roadmap">Firecracker Roadmap</a></li><li><a title="QEMU" rel="nofollow" href="https://www.qemu.org/">QEMU</a> &mdash; QEMU is a generic and open source machine emulator and virtualizer.</li><li><a title="Qemu : Security vulnerabilities" rel="nofollow" href="https://www.cvedetails.com/vulnerability-list/vendor_id-7506/Qemu.html">Qemu : Security vulnerabilities</a></li><li><a title="VENOM Vulnerability" rel="nofollow" href="https://venom.crowdstrike.com/">VENOM Vulnerability</a> &mdash; VENOM, CVE-2015-3456, is a security vulnerability in the virtual floppy drive code used by many computer virtualization platforms. This vulnerability may allow an attacker to escape from the confines of an affected virtual machine (VM) guest and potentially obtain code-execution access to the host.</li><li><a title="s2n" rel="nofollow" href="https://github.com/awslabs/s2n">s2n</a> &mdash; s2n is a C99 implementation of the TLS/SSL protocols that is designed to be simple, small, fast, and with security as a priority.</li><li><a title="OpenBGPD - Adding Diversity to the Route Server Landscape" rel="nofollow" href="https://labs.ripe.net/Members/claudio_jeker/openbgpd-adding-diversity-to-route-server-landscape">OpenBGPD - Adding Diversity to the Route Server Landscape</a> &mdash; Thanks to the RIPE NCC Community Project Fund we were able to revive the OpenBGPD daemon and bring more diversity to the Route Server landscape.</li><li><a title="OpenBGPD" rel="nofollow" href="http://www.openbgpd.org/">OpenBGPD</a> &mdash; OpenBGPD is a FREE implementation of the Border Gateway Protocol, Version 4. It allows ordinary machines to be used as routers exchanging routes with other systems speaking the BGP protocol.</li><li><a title="LSI Questions from Anton" rel="nofollow" href="https://pastebin.com/rJxLBFBQ">LSI Questions from Anton</a></li><li><a title="ServeTheHome" rel="nofollow" href="https://www.servethehome.com/">ServeTheHome</a></li><li><a title="Sennheiser Headset Software Could Allow Man-in-the-Middle SSL Attacks" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/sennheiser-headset-software-could-allow-man-in-the-middle-ssl-attacks/">Sennheiser Headset Software Could Allow Man-in-the-Middle SSL Attacks</a> &mdash; When users have been installing Sennheiser's HeadSetup software, little did they know that the software was also installing a root certificate into the Trusted Root CA Certificate store.  To make matters worse, the software was also installing an encrypted version of the certificate's private key that was not as secure as the developers may have thought.

</li><li><a title="evilginx2: Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication" rel="nofollow" href="https://github.com/kgretzky/evilginx2">evilginx2: Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication</a></li><li><a title="dive: A tool for exploring each layer in a docker image" rel="nofollow" href="https://github.com/wagoodman/dive">dive: A tool for exploring each layer in a docker image</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different from the options on the market now.</p>

<p>Plus some good news for OpenBGP and the wider internet community, and a handy tool for inspecting docker images.</p><p>Links:</p><ul><li><a title="Firecracker – Lightweight Virtualization for Serverless Computing" rel="nofollow" href="https://aws.amazon.com/blogs/aws/firecracker-lightweight-virtualization-for-serverless-computing/">Firecracker – Lightweight Virtualization for Serverless Computing</a> &mdash; Firecracker is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant containers and functions-based services.</li><li><a title="Firecracker" rel="nofollow" href="https://firecracker-microvm.github.io/">Firecracker</a> &mdash; Firecracker is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant containers and functions-based services.</li><li><a title="Firecracker Design Docs" rel="nofollow" href="https://github.com/firecracker-microvm/firecracker/blob/master/docs/design.md">Firecracker Design Docs</a></li><li><a title="Firecracker Roadmap" rel="nofollow" href="https://github.com/firecracker-microvm/firecracker/labels/Roadmap">Firecracker Roadmap</a></li><li><a title="QEMU" rel="nofollow" href="https://www.qemu.org/">QEMU</a> &mdash; QEMU is a generic and open source machine emulator and virtualizer.</li><li><a title="Qemu : Security vulnerabilities" rel="nofollow" href="https://www.cvedetails.com/vulnerability-list/vendor_id-7506/Qemu.html">Qemu : Security vulnerabilities</a></li><li><a title="VENOM Vulnerability" rel="nofollow" href="https://venom.crowdstrike.com/">VENOM Vulnerability</a> &mdash; VENOM, CVE-2015-3456, is a security vulnerability in the virtual floppy drive code used by many computer virtualization platforms. This vulnerability may allow an attacker to escape from the confines of an affected virtual machine (VM) guest and potentially obtain code-execution access to the host.</li><li><a title="s2n" rel="nofollow" href="https://github.com/awslabs/s2n">s2n</a> &mdash; s2n is a C99 implementation of the TLS/SSL protocols that is designed to be simple, small, fast, and with security as a priority.</li><li><a title="OpenBGPD - Adding Diversity to the Route Server Landscape" rel="nofollow" href="https://labs.ripe.net/Members/claudio_jeker/openbgpd-adding-diversity-to-route-server-landscape">OpenBGPD - Adding Diversity to the Route Server Landscape</a> &mdash; Thanks to the RIPE NCC Community Project Fund we were able to revive the OpenBGPD daemon and bring more diversity to the Route Server landscape.</li><li><a title="OpenBGPD" rel="nofollow" href="http://www.openbgpd.org/">OpenBGPD</a> &mdash; OpenBGPD is a FREE implementation of the Border Gateway Protocol, Version 4. It allows ordinary machines to be used as routers exchanging routes with other systems speaking the BGP protocol.</li><li><a title="LSI Questions from Anton" rel="nofollow" href="https://pastebin.com/rJxLBFBQ">LSI Questions from Anton</a></li><li><a title="ServeTheHome" rel="nofollow" href="https://www.servethehome.com/">ServeTheHome</a></li><li><a title="Sennheiser Headset Software Could Allow Man-in-the-Middle SSL Attacks" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/sennheiser-headset-software-could-allow-man-in-the-middle-ssl-attacks/">Sennheiser Headset Software Could Allow Man-in-the-Middle SSL Attacks</a> &mdash; When users have been installing Sennheiser's HeadSetup software, little did they know that the software was also installing a root certificate into the Trusted Root CA Certificate store.  To make matters worse, the software was also installing an encrypted version of the certificate's private key that was not as secure as the developers may have thought.

</li><li><a title="evilginx2: Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication" rel="nofollow" href="https://github.com/kgretzky/evilginx2">evilginx2: Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication</a></li><li><a title="dive: A tool for exploring each layer in a docker image" rel="nofollow" href="https://github.com/wagoodman/dive">dive: A tool for exploring each layer in a docker image</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 389: The Future of HTTP</title>
  <link>https://techsnap.systems/389</link>
  <guid isPermaLink="false">a3776de2-0fab-45fc-8d29-dcd0f2e6da03</guid>
  <pubDate>Thu, 15 Nov 2018 15:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/a3776de2-0fab-45fc-8d29-dcd0f2e6da03.mp3" length="37053157" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Wes is joined by special guest Jim Salter to discuss Google's recent BGP outage and the future of HTTP.</itunes:subtitle>
  <itunes:duration>43:46</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Wes is joined by special guest Jim Salter to discuss Google's recent BGP outage and the future of HTTP.
Plus the latest router botnet, why you should never go full UPnP, and the benefits of building your own home router. Special Guest: Jim Salter.
</description>
  <itunes:keywords>BGP, Google, MainOne, China Telecom, BGP Security, RPKI, BGP Leak, BGP Hijack, HTTP, TLS, QUIC, HTTP/3, Encryption, UDP, Spam, Router, UPnP, Botnet, Broadcom, BCMUPnP_Hunter, format string vulnerability, HTTP-over-QUIC, Router Security, WireGuard, Homebrew Router, Wifi, Jim Salter, Ars Technica, Sanoid, Security, Networking, SysAdmin, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Wes is joined by special guest Jim Salter to discuss Google&#39;s recent BGP outage and the future of HTTP.</p>

<p>Plus the latest router botnet, why you should never go full UPnP, and the benefits of building your own home router.</p><p>Special Guest: Jim Salter.</p><p>Links:</p><ul><li><a title="Google goes down after major BGP mishap routes traffic through China" rel="nofollow" href="https://arstechnica.com/information-technology/2018/11/major-bgp-mishap-takes-down-google-as-traffic-improperly-travels-to-china/">Google goes down after major BGP mishap routes traffic through China</a> &mdash; Google lost control of several million of its IP addresses for more than an hour on Monday in an event that intermittently made its search and other services unavailable to many users.</li><li><a title="Internet Vulnerability Takes Down Google" rel="nofollow" href="https://blog.thousandeyes.com/internet-vulnerability-takes-down-google/">Internet Vulnerability Takes Down Google</a></li><li><a title="China has been &#39;hijacking the vital internet backbone of western countries&#39;" rel="nofollow" href="https://www.zdnet.com/article/china-has-been-hijacking-the-vital-internet-backbone-of-western-countries/">China has been 'hijacking the vital internet backbone of western countries'</a></li><li><a title="RPKI - The required cryptographic upgrade to BGP routing" rel="nofollow" href="https://blog.cloudflare.com/rpki/">RPKI - The required cryptographic upgrade to BGP routing</a></li><li><a title="HTTP/3" rel="nofollow" href="https://daniel.haxx.se/blog/2018/11/11/http-3/">HTTP/3</a> &mdash; The protocol that's been called HTTP-over-QUIC for quite some time has now changed name and will officially become HTTP/3.</li><li><a title="HTTP/3: Come for the speed, stay for the security" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/11/14/http-3-come-for-the-speed-stay-for-the-security/">HTTP/3: Come for the speed, stay for the security</a></li><li><a title="The Road to QUIC" rel="nofollow" href="https://blog.cloudflare.com/the-road-to-quic/">The Road to QUIC</a></li><li><a title="Botnet pwns 100,000 routers using ancient security flaw" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/11/12/botnet-pwns-100000-routers-using-ancient-security-flaw/">Botnet pwns 100,000 routers using ancient security flaw</a> &mdash; Researchers have stumbled on another large botnet that’s been quietly hijacking home routers while nobody was paying attention</li><li><a title="BCMPUPnP_Hunter: A 100k Botnet Turns Home Routers to Email Spammers" rel="nofollow" href="http://www.dcwg.org/bcmpupnp_hunter-a-100k-botnet-turns-home-routers-to-email-spammers/">BCMPUPnP_Hunter: A 100k Botnet Turns Home Routers to Email Spammers</a></li><li><a title="From Zero to ZeroDay Journey: Router Hacking" rel="nofollow" href="http://defensecode.com/whitepapers/From_Zero_To_ZeroDay_Network_Devices_Exploitation.txt">From Zero to ZeroDay Journey: Router Hacking</a></li><li><a title="The Ars guide to building a Linux router from scratch" rel="nofollow" href="https://arstechnica.com/gadgets/2016/04/the-ars-guide-to-building-a-linux-router-from-scratch/">The Ars guide to building a Linux router from scratch</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Wes is joined by special guest Jim Salter to discuss Google&#39;s recent BGP outage and the future of HTTP.</p>

<p>Plus the latest router botnet, why you should never go full UPnP, and the benefits of building your own home router.</p><p>Special Guest: Jim Salter.</p><p>Links:</p><ul><li><a title="Google goes down after major BGP mishap routes traffic through China" rel="nofollow" href="https://arstechnica.com/information-technology/2018/11/major-bgp-mishap-takes-down-google-as-traffic-improperly-travels-to-china/">Google goes down after major BGP mishap routes traffic through China</a> &mdash; Google lost control of several million of its IP addresses for more than an hour on Monday in an event that intermittently made its search and other services unavailable to many users.</li><li><a title="Internet Vulnerability Takes Down Google" rel="nofollow" href="https://blog.thousandeyes.com/internet-vulnerability-takes-down-google/">Internet Vulnerability Takes Down Google</a></li><li><a title="China has been &#39;hijacking the vital internet backbone of western countries&#39;" rel="nofollow" href="https://www.zdnet.com/article/china-has-been-hijacking-the-vital-internet-backbone-of-western-countries/">China has been 'hijacking the vital internet backbone of western countries'</a></li><li><a title="RPKI - The required cryptographic upgrade to BGP routing" rel="nofollow" href="https://blog.cloudflare.com/rpki/">RPKI - The required cryptographic upgrade to BGP routing</a></li><li><a title="HTTP/3" rel="nofollow" href="https://daniel.haxx.se/blog/2018/11/11/http-3/">HTTP/3</a> &mdash; The protocol that's been called HTTP-over-QUIC for quite some time has now changed name and will officially become HTTP/3.</li><li><a title="HTTP/3: Come for the speed, stay for the security" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/11/14/http-3-come-for-the-speed-stay-for-the-security/">HTTP/3: Come for the speed, stay for the security</a></li><li><a title="The Road to QUIC" rel="nofollow" href="https://blog.cloudflare.com/the-road-to-quic/">The Road to QUIC</a></li><li><a title="Botnet pwns 100,000 routers using ancient security flaw" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/11/12/botnet-pwns-100000-routers-using-ancient-security-flaw/">Botnet pwns 100,000 routers using ancient security flaw</a> &mdash; Researchers have stumbled on another large botnet that’s been quietly hijacking home routers while nobody was paying attention</li><li><a title="BCMPUPnP_Hunter: A 100k Botnet Turns Home Routers to Email Spammers" rel="nofollow" href="http://www.dcwg.org/bcmpupnp_hunter-a-100k-botnet-turns-home-routers-to-email-spammers/">BCMPUPnP_Hunter: A 100k Botnet Turns Home Routers to Email Spammers</a></li><li><a title="From Zero to ZeroDay Journey: Router Hacking" rel="nofollow" href="http://defensecode.com/whitepapers/From_Zero_To_ZeroDay_Network_Devices_Exploitation.txt">From Zero to ZeroDay Journey: Router Hacking</a></li><li><a title="The Ars guide to building a Linux router from scratch" rel="nofollow" href="https://arstechnica.com/gadgets/2016/04/the-ars-guide-to-building-a-linux-router-from-scratch/">The Ars guide to building a Linux router from scratch</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 382: Domestic Disappointments</title>
  <link>https://techsnap.systems/382</link>
  <guid isPermaLink="false">20c841ff-5ccf-4058-8e2d-f59364827c26</guid>
  <pubDate>Thu, 06 Sep 2018 19:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/20c841ff-5ccf-4058-8e2d-f59364827c26.mp3" length="38035774" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We’re joined by a special guest to discuss the failures of campaign security, the disastrous consequences of a mismanaged firewall, and the suspicious case of Speck.</itunes:subtitle>
  <itunes:duration>44:56</itunes:duration>
  <itunes:explicit>yes</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We’re joined by a special guest to discuss the failures of campaign security, the disastrous consequences of a mismanaged firewall, and the suspicious case of Speck.
Plus the latest vulnerabilities in Wireshark and OpenSSH, the new forensic hotness from Netflix, and some great introductions to cryptography. 
 Special Guest: Martin Wimpress.
</description>
  <itunes:keywords>eMail, Elections, Election Security, Espionage, Attachments, Security Keys, CIA, USA, Firewall, China, NSA, Speck, Android, Google, OpenSSH, SSH, Wireshark, CVE, CVSS, Security, TCP, ISP, BGP, 500 mile email, TCP RST, Diffy, Netflix, crypto, cryptography, diffy, netflix, manga, linux, devops, podcast</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We’re joined by a special guest to discuss the failures of campaign security, the disastrous consequences of a mismanaged firewall, and the suspicious case of Speck.</p>

<p>Plus the latest vulnerabilities in Wireshark and OpenSSH, the new forensic hotness from Netflix, and some great introductions to cryptography. </p><p>Special Guest: Martin Wimpress.</p><p>Links:</p><ul><li><a title="I’m teaching email security to Democratic campaigns. It’s as bad as 2016." rel="nofollow" href="https://www.washingtonpost.com/outlook/2018/09/04/im-teaching-email-security-democratic-campaigns-its-bad/">I’m teaching email security to Democratic campaigns. It’s as bad as 2016.</a></li><li><a title="Botched CIA Communications System Helped Blow Cover of Chinese Agents" rel="nofollow" href="https://foreignpolicy.com/2018/08/15/botched-cia-communications-system-helped-blow-cover-chinese-agents-intelligence/">Botched CIA Communications System Helped Blow Cover of Chinese Agents</a></li><li><a title="NSA-Designed Speck Algorithm to Be Removed From Linux 4.20" rel="nofollow" href="https://www.tomshardware.com/news/nsa-speck-removed-linux-4-20,37747.html">NSA-Designed Speck Algorithm to Be Removed From Linux 4.20</a></li><li><a title="Vulnerability Affects All OpenSSH Versions Released in the Past Two Decades" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/vulnerability-affects-all-openssh-versions-released-in-the-past-two-decades/">Vulnerability Affects All OpenSSH Versions Released in the Past Two Decades</a></li><li><a title="Wireshark can be crashed via malicious packet trace files" rel="nofollow" href="https://www.helpnetsecurity.com/2018/08/31/wireshark-dos-vulnerabilities/">Wireshark can be crashed via malicious packet trace files</a></li><li><a title="Service provider story about tracking down TCP RSTs" rel="nofollow" href="https://mailman.nanog.org/pipermail/nanog/2018-September/096871.html">Service provider story about tracking down TCP RSTs</a></li><li><a title="The case of the 500-mile email" rel="nofollow" href="http://www.ibiblio.org/harris/500milemail.html">The case of the 500-mile email</a></li><li><a title="Diffy: A cloud-centric triage tool for digital forensics and incident response" rel="nofollow" href="https://github.com/Netflix-Skunkworks/diffy">Diffy: A cloud-centric triage tool for digital forensics and incident response</a></li><li><a title="An intensive introduction to Cryptography" rel="nofollow" href="https://intensecrypto.org/public/">An intensive introduction to Cryptography</a></li><li><a title="The Manga Guide to Cryptography | No Starch Press" rel="nofollow" href="https://nostarch.com/mangacrypto">The Manga Guide to Cryptography | No Starch Press</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We’re joined by a special guest to discuss the failures of campaign security, the disastrous consequences of a mismanaged firewall, and the suspicious case of Speck.</p>

<p>Plus the latest vulnerabilities in Wireshark and OpenSSH, the new forensic hotness from Netflix, and some great introductions to cryptography. </p><p>Special Guest: Martin Wimpress.</p><p>Links:</p><ul><li><a title="I’m teaching email security to Democratic campaigns. It’s as bad as 2016." rel="nofollow" href="https://www.washingtonpost.com/outlook/2018/09/04/im-teaching-email-security-democratic-campaigns-its-bad/">I’m teaching email security to Democratic campaigns. It’s as bad as 2016.</a></li><li><a title="Botched CIA Communications System Helped Blow Cover of Chinese Agents" rel="nofollow" href="https://foreignpolicy.com/2018/08/15/botched-cia-communications-system-helped-blow-cover-chinese-agents-intelligence/">Botched CIA Communications System Helped Blow Cover of Chinese Agents</a></li><li><a title="NSA-Designed Speck Algorithm to Be Removed From Linux 4.20" rel="nofollow" href="https://www.tomshardware.com/news/nsa-speck-removed-linux-4-20,37747.html">NSA-Designed Speck Algorithm to Be Removed From Linux 4.20</a></li><li><a title="Vulnerability Affects All OpenSSH Versions Released in the Past Two Decades" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/vulnerability-affects-all-openssh-versions-released-in-the-past-two-decades/">Vulnerability Affects All OpenSSH Versions Released in the Past Two Decades</a></li><li><a title="Wireshark can be crashed via malicious packet trace files" rel="nofollow" href="https://www.helpnetsecurity.com/2018/08/31/wireshark-dos-vulnerabilities/">Wireshark can be crashed via malicious packet trace files</a></li><li><a title="Service provider story about tracking down TCP RSTs" rel="nofollow" href="https://mailman.nanog.org/pipermail/nanog/2018-September/096871.html">Service provider story about tracking down TCP RSTs</a></li><li><a title="The case of the 500-mile email" rel="nofollow" href="http://www.ibiblio.org/harris/500milemail.html">The case of the 500-mile email</a></li><li><a title="Diffy: A cloud-centric triage tool for digital forensics and incident response" rel="nofollow" href="https://github.com/Netflix-Skunkworks/diffy">Diffy: A cloud-centric triage tool for digital forensics and incident response</a></li><li><a title="An intensive introduction to Cryptography" rel="nofollow" href="https://intensecrypto.org/public/">An intensive introduction to Cryptography</a></li><li><a title="The Manga Guide to Cryptography | No Starch Press" rel="nofollow" href="https://nostarch.com/mangacrypto">The Manga Guide to Cryptography | No Starch Press</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 378: Two-Factor Fraud</title>
  <link>https://techsnap.systems/378</link>
  <guid isPermaLink="false">3ec742ee-24f7-4eee-a5a0-c40c5248e31b</guid>
  <pubDate>Thu, 02 Aug 2018 18:30:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/3ec742ee-24f7-4eee-a5a0-c40c5248e31b.mp3" length="27355773" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Reddit’s Two Factor procedures fail, while Google’s prevents years of attacks. We’ll look at the different approaches, and discuss the fundamental weakness of Reddit’s approach.</itunes:subtitle>
  <itunes:duration>31:56</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Reddit’s Two Factor procedures fail, while Google’s prevents years of attacks. We’ll look at the different approaches, and discuss the fundamental weakness of Reddit’s approach.
Plus a Spectre attack over the network, BGP issues take out Telegram, and more! 
</description>
  <itunes:keywords>Spectre, NetSpectre, Verizon leak, S3, NICE, BGP, Telegram, Duo Security, Cisco, Two-Factor Authentication, SMS, Sysadmin Podcast, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Reddit’s Two Factor procedures fail, while Google’s prevents years of attacks. We’ll look at the different approaches, and discuss the fundamental weakness of Reddit’s approach.</p>

<p>Plus a Spectre attack over the network, BGP issues take out Telegram, and more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Hey, don&#39;t route the messenger! Telegram redirected through Iran by baffling BGP leak" rel="nofollow" href="https://www.theregister.co.uk/2018/08/01/bgp_route_leak_telegram_iran/">Hey, don't route the messenger! Telegram redirected through Iran by baffling BGP leak</a></li><li><a title="Finding and Diagnosing BGP Route Leaks" rel="nofollow" href="https://blog.thousandeyes.com/finding-and-diagnosing-bgp-route-leaks/">Finding and Diagnosing BGP Route Leaks</a></li><li><a title="Cloud Leak: How A Verizon Partner Exposed Millions of Customer Accounts" rel="nofollow" href="https://www.upguard.com/breaches/verizon-cloud-leak">Cloud Leak: How A Verizon Partner Exposed Millions of Customer Accounts</a></li><li><a title="New Spectre attack enables secrets to be leaked over a network" rel="nofollow" href="https://arstechnica.com/gadgets/2018/07/new-spectre-attack-enables-secrets-to-be-leaked-over-a-network/">New Spectre attack enables secrets to be leaked over a network</a></li><li><a title="NetSpectre: Read Arbitrary Memory over Network" rel="nofollow" href="https://arxiv.org/abs/1807.10535">NetSpectre: Read Arbitrary Memory over Network</a></li><li><a title="Password breach teaches Reddit that, yes, phone-based 2FA is that bad" rel="nofollow" href="https://arstechnica.com/information-technology/2018/08/password-breach-teaches-reddit-that-yes-phone-based-2fa-is-that-bad/">Password breach teaches Reddit that, yes, phone-based 2FA is that bad</a></li><li><a title="We had a security incident." rel="nofollow" href="https://www.reddit.com/r/announcements/comments/93qnm5/we_had_a_security_incident_heres_what_you_need_to/?st=JKBEHH8G&amp;sh=562ab497">We had a security incident.</a></li><li><a title="Google Employees Use a Physical Token as Their Second Authentication Factor" rel="nofollow" href="https://www.schneier.com/blog/archives/2018/07/google_employee.html">Google Employees Use a Physical Token as Their Second Authentication Factor</a></li><li><a title="Cisco is buying Duo Security for $2.35B in cash" rel="nofollow" href="https://techcrunch.com/2018/08/02/cisco-is-buying-duo-security-for-2-35b-in-cash/">Cisco is buying Duo Security for $2.35B in cash</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Reddit’s Two Factor procedures fail, while Google’s prevents years of attacks. We’ll look at the different approaches, and discuss the fundamental weakness of Reddit’s approach.</p>

<p>Plus a Spectre attack over the network, BGP issues take out Telegram, and more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Hey, don&#39;t route the messenger! Telegram redirected through Iran by baffling BGP leak" rel="nofollow" href="https://www.theregister.co.uk/2018/08/01/bgp_route_leak_telegram_iran/">Hey, don't route the messenger! Telegram redirected through Iran by baffling BGP leak</a></li><li><a title="Finding and Diagnosing BGP Route Leaks" rel="nofollow" href="https://blog.thousandeyes.com/finding-and-diagnosing-bgp-route-leaks/">Finding and Diagnosing BGP Route Leaks</a></li><li><a title="Cloud Leak: How A Verizon Partner Exposed Millions of Customer Accounts" rel="nofollow" href="https://www.upguard.com/breaches/verizon-cloud-leak">Cloud Leak: How A Verizon Partner Exposed Millions of Customer Accounts</a></li><li><a title="New Spectre attack enables secrets to be leaked over a network" rel="nofollow" href="https://arstechnica.com/gadgets/2018/07/new-spectre-attack-enables-secrets-to-be-leaked-over-a-network/">New Spectre attack enables secrets to be leaked over a network</a></li><li><a title="NetSpectre: Read Arbitrary Memory over Network" rel="nofollow" href="https://arxiv.org/abs/1807.10535">NetSpectre: Read Arbitrary Memory over Network</a></li><li><a title="Password breach teaches Reddit that, yes, phone-based 2FA is that bad" rel="nofollow" href="https://arstechnica.com/information-technology/2018/08/password-breach-teaches-reddit-that-yes-phone-based-2fa-is-that-bad/">Password breach teaches Reddit that, yes, phone-based 2FA is that bad</a></li><li><a title="We had a security incident." rel="nofollow" href="https://www.reddit.com/r/announcements/comments/93qnm5/we_had_a_security_incident_heres_what_you_need_to/?st=JKBEHH8G&amp;sh=562ab497">We had a security incident.</a></li><li><a title="Google Employees Use a Physical Token as Their Second Authentication Factor" rel="nofollow" href="https://www.schneier.com/blog/archives/2018/07/google_employee.html">Google Employees Use a Physical Token as Their Second Authentication Factor</a></li><li><a title="Cisco is buying Duo Security for $2.35B in cash" rel="nofollow" href="https://techcrunch.com/2018/08/02/cisco-is-buying-duo-security-for-2-35b-in-cash/">Cisco is buying Duo Security for $2.35B in cash</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
