<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Sat, 25 Apr 2026 11:07:41 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Linux”</title>
    <link>https://techsnap.systems/tags/linux</link>
    <pubDate>Fri, 29 May 2020 00:15:00 -0700</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>430: All Good Things</title>
  <link>https://techsnap.systems/430</link>
  <guid isPermaLink="false">697f849c-00de-4c27-9231-6c039bb93a67</guid>
  <pubDate>Fri, 29 May 2020 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/697f849c-00de-4c27-9231-6c039bb93a67.mp3" length="37553551" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>It's a storage showdown as Jim and Wes bust some performance myths about RAID and ZFS.</itunes:subtitle>
  <itunes:duration>52:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>It's a storage showdown as Jim and Wes bust some performance myths about RAID and ZFS.
Plus our favorite features from Fedora 32, and why Wes loves DNF. 
</description>
  <itunes:keywords>DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, sysadmin podcast, Fedora, Fedora 32, Fedora Workstation, Ubuntu, Anaconda, Wayland, X11, Red Hat, CentOS, DNF, blivet, systemd, Linux, GNOME, Dash to Dock, Matthew Miller, LTS, rolling release, FUSE, OOM, EarlyOOM, ZFS, OpenZFS, DKMS, PPA, RAID, RAIDz, raid6, copy-on-write, vdev, storage, hard drive, SSD, HDD, spindle count, zpool, parity, filesystem, throughput, iops, chunk, block size, benchmarking</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>It&#39;s a storage showdown as Jim and Wes bust some performance myths about RAID and ZFS.</p>

<p>Plus our favorite features from Fedora 32, and why Wes loves DNF.</p><p>Links:</p><ul><li><a title="What&#39;s new in Fedora 32 Workstation" rel="nofollow" href="https://fedoramagazine.org/whats-new-fedora-32-workstation/">What's new in Fedora 32 Workstation</a></li><li><a title="Fedora 32 ChangeSet" rel="nofollow" href="https://fedoraproject.org/wiki/Releases/32/ChangeSet">Fedora 32 ChangeSet</a></li><li><a title="Linux distro review: Fedora Workstation 32" rel="nofollow" href="https://arstechnica.com/gadgets/2020/05/linux-distro-review-fedora-workstation-32/">Linux distro review: Fedora Workstation 32</a></li><li><a title="TechSNAP 428: RAID Reality Check" rel="nofollow" href="https://techsnap.systems/428">TechSNAP 428: RAID Reality Check</a></li><li><a title="ZFS versus RAID: Eight Ironwolf disks, two filesystems, one winner" rel="nofollow" href="https://arstechnica.com/gadgets/2020/05/zfs-versus-raid-eight-ironwolf-disks-two-filesystems-one-winner/">ZFS versus RAID: Eight Ironwolf disks, two filesystems, one winner</a></li><li><a title="Understanding RAID: How performance scales from one disk to eight" rel="nofollow" href="https://arstechnica.com/information-technology/2020/04/understanding-raid-how-performance-scales-from-one-disk-to-eight/">Understanding RAID: How performance scales from one disk to eight</a></li><li><a title="Find Jim on 2.5 Admins" rel="nofollow" href="https://2.5admins.com/">Find Jim on 2.5 Admins</a></li><li><a title="Find Wes on LINUX Unplugged" rel="nofollow" href="https://linuxunplugged.com/">Find Wes on LINUX Unplugged</a></li><li><a title="TechSNAP 1: First episode of TechSNAP (in 2011!)" rel="nofollow" href="https://www.youtube.com/watch?v=n7La9Z-XrCE">TechSNAP 1: First episode of TechSNAP (in 2011!)</a></li><li><a title="TechSNAP 300: End of the Allan and Chris era (2017)" rel="nofollow" href="https://www.jupiterbroadcasting.com/106026/2089-days-uptime-techsnap-300/">TechSNAP 300: End of the Allan and Chris era (2017)</a></li><li><a title="TechSNAP 301: Enter Dan and Wes " rel="nofollow" href="https://www.jupiterbroadcasting.com/106086/the-next-generation-techsnap-301/">TechSNAP 301: Enter Dan and Wes </a></li><li><a title="TechSNAP 347: A Farewell to Dan" rel="nofollow" href="https://www.jupiterbroadcasting.com/120317/a-farewell-to-dan-techsnap-347/">TechSNAP 347: A Farewell to Dan</a></li><li><a title="TechSNAP 348: Chris is back!" rel="nofollow" href="https://www.jupiterbroadcasting.com/120687/server-neglect-techsnap-348/">TechSNAP 348: Chris is back!</a></li><li><a title="TechSNAP 389: Jim&#39;s first time as a guest" rel="nofollow" href="https://www.jupiterbroadcasting.com/128101/the-future-of-http-techsnap-389/">TechSNAP 389: Jim's first time as a guest</a></li><li><a title="TechSNAP 390: Jim&#39;s second guest appearance" rel="nofollow" href="https://techsnap.systems/390">TechSNAP 390: Jim's second guest appearance</a></li><li><a title="TechSNAP 393: Chris says goodbye" rel="nofollow" href="https://www.jupiterbroadcasting.com/128656/back-to-our-roots-techsnap-393/">TechSNAP 393: Chris says goodbye</a></li><li><a title="TechSNAP 395: Jim joins the show" rel="nofollow" href="https://www.jupiterbroadcasting.com/128941/the-acme-era-techsnap-395/">TechSNAP 395: Jim joins the show</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>It&#39;s a storage showdown as Jim and Wes bust some performance myths about RAID and ZFS.</p>

<p>Plus our favorite features from Fedora 32, and why Wes loves DNF.</p><p>Links:</p><ul><li><a title="What&#39;s new in Fedora 32 Workstation" rel="nofollow" href="https://fedoramagazine.org/whats-new-fedora-32-workstation/">What's new in Fedora 32 Workstation</a></li><li><a title="Fedora 32 ChangeSet" rel="nofollow" href="https://fedoraproject.org/wiki/Releases/32/ChangeSet">Fedora 32 ChangeSet</a></li><li><a title="Linux distro review: Fedora Workstation 32" rel="nofollow" href="https://arstechnica.com/gadgets/2020/05/linux-distro-review-fedora-workstation-32/">Linux distro review: Fedora Workstation 32</a></li><li><a title="TechSNAP 428: RAID Reality Check" rel="nofollow" href="https://techsnap.systems/428">TechSNAP 428: RAID Reality Check</a></li><li><a title="ZFS versus RAID: Eight Ironwolf disks, two filesystems, one winner" rel="nofollow" href="https://arstechnica.com/gadgets/2020/05/zfs-versus-raid-eight-ironwolf-disks-two-filesystems-one-winner/">ZFS versus RAID: Eight Ironwolf disks, two filesystems, one winner</a></li><li><a title="Understanding RAID: How performance scales from one disk to eight" rel="nofollow" href="https://arstechnica.com/information-technology/2020/04/understanding-raid-how-performance-scales-from-one-disk-to-eight/">Understanding RAID: How performance scales from one disk to eight</a></li><li><a title="Find Jim on 2.5 Admins" rel="nofollow" href="https://2.5admins.com/">Find Jim on 2.5 Admins</a></li><li><a title="Find Wes on LINUX Unplugged" rel="nofollow" href="https://linuxunplugged.com/">Find Wes on LINUX Unplugged</a></li><li><a title="TechSNAP 1: First episode of TechSNAP (in 2011!)" rel="nofollow" href="https://www.youtube.com/watch?v=n7La9Z-XrCE">TechSNAP 1: First episode of TechSNAP (in 2011!)</a></li><li><a title="TechSNAP 300: End of the Allan and Chris era (2017)" rel="nofollow" href="https://www.jupiterbroadcasting.com/106026/2089-days-uptime-techsnap-300/">TechSNAP 300: End of the Allan and Chris era (2017)</a></li><li><a title="TechSNAP 301: Enter Dan and Wes " rel="nofollow" href="https://www.jupiterbroadcasting.com/106086/the-next-generation-techsnap-301/">TechSNAP 301: Enter Dan and Wes </a></li><li><a title="TechSNAP 347: A Farewell to Dan" rel="nofollow" href="https://www.jupiterbroadcasting.com/120317/a-farewell-to-dan-techsnap-347/">TechSNAP 347: A Farewell to Dan</a></li><li><a title="TechSNAP 348: Chris is back!" rel="nofollow" href="https://www.jupiterbroadcasting.com/120687/server-neglect-techsnap-348/">TechSNAP 348: Chris is back!</a></li><li><a title="TechSNAP 389: Jim&#39;s first time as a guest" rel="nofollow" href="https://www.jupiterbroadcasting.com/128101/the-future-of-http-techsnap-389/">TechSNAP 389: Jim's first time as a guest</a></li><li><a title="TechSNAP 390: Jim&#39;s second guest appearance" rel="nofollow" href="https://techsnap.systems/390">TechSNAP 390: Jim's second guest appearance</a></li><li><a title="TechSNAP 393: Chris says goodbye" rel="nofollow" href="https://www.jupiterbroadcasting.com/128656/back-to-our-roots-techsnap-393/">TechSNAP 393: Chris says goodbye</a></li><li><a title="TechSNAP 395: Jim joins the show" rel="nofollow" href="https://www.jupiterbroadcasting.com/128941/the-acme-era-techsnap-395/">TechSNAP 395: Jim joins the show</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>423: Hopeful for HAMR</title>
  <link>https://techsnap.systems/423</link>
  <guid isPermaLink="false">579b3028-f4b8-408a-ad04-ee0f8d017f78</guid>
  <pubDate>Fri, 21 Feb 2020 18:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/579b3028-f4b8-408a-ad04-ee0f8d017f78.mp3" length="21313956" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We explore the potential of heat-assisted magnetic recording and get excited about a possibly persistent L2ARC.</itunes:subtitle>
  <itunes:duration>29:36</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We explore the potential of heat-assisted magnetic recording and get excited about a possibly persistent L2ARC. 
Plus Jim's journeys with Clear Linux, and why Ubuntu 18.04.4 is a maintenance release worth talking about. 
</description>
  <itunes:keywords>Ubuntu, 18.04.4, 18.04, LTS, Linux, WiFi, hardware enablement, maintenance release, Clear Linux OS, Linux desktop, Intel, Clear Linux, benchmarks, performance, swupd, ZFS, ZFS on Linux, ZoL, MobaXterm,  LRU, WSL, Windows, Microsoft, L2ARC, ARC, filesystems, cache, caching, HDD, storage, hard drives, HAMR, SMR, MAMR, Seagate, Western Digital, latency, throughput, DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, Linux Academy, sysadmin podcast, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We explore the potential of heat-assisted magnetic recording and get excited about a possibly persistent L2ARC. </p>

<p>Plus Jim&#39;s journeys with Clear Linux, and why Ubuntu 18.04.4 is a maintenance release worth talking about.</p><p>Links:</p><ul><li><a title="Ubuntu 18.04.4 LTS: here&#39;s what&#39;s new" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/ubuntu-18-04-4-lts-released-wednesday-heres-whats-new/">Ubuntu 18.04.4 LTS: here's what's new</a> &mdash; It's not as shiny and exciting as entirely new versions, of course, but it does pack in some worthwhile security and bugfix upgrades, as well as support for more and newer hardware.</li><li><a title="18.04.4 - Ubuntu Wiki" rel="nofollow" href="https://wiki.ubuntu.com/BionicBeaver/ReleaseNotes/ChangeSummary/18.04.4">18.04.4 - Ubuntu Wiki</a></li><li><a title="MobaXterm" rel="nofollow" href="https://mobaxterm.mobatek.net/">MobaXterm</a> &mdash; Enhanced terminal for Windows with X11 server, tabbed SSH client, network tools and much more.</li><li><a title="Linux distro review: Intel’s own Clear Linux OS" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/linux-distro-review-intels-own-clear-linux-os/?comments=1">Linux distro review: Intel’s own Clear Linux OS</a> &mdash; There's not much question that Clear Linux is your best bet if you want to turn in the best possible benchmark numbers. The question not addressed here is, what's it like to run Clear Linux as a daily driver? We were curious, so we took it for a spin.</li><li><a title="Clear Linux* Project" rel="nofollow" href="https://clearlinux.org/">Clear Linux* Project</a> &mdash; Clear Linux OS is an open source, rolling release Linux distribution optimized for performance and security, from the Cloud to the Edge, designed for customization, and manageability.</li><li><a title="swupd — Documentation for Clear Linux* project" rel="nofollow" href="https://docs.01.org/clearlinux/latest/guides/clear/swupd.html">swupd — Documentation for Clear Linux* project</a></li><li><a title="clr-boot-manager: Kernel &amp; Boot Loader Management" rel="nofollow" href="https://github.com/clearlinux/clr-boot-manager">clr-boot-manager: Kernel &amp; Boot Loader Management</a></li><li><a title="Cannot compile zfs for 5.5-rc2 · Issue #9745 · zfsonlinux/zfs" rel="nofollow" href="https://github.com/zfsonlinux/zfs/issues/9745">Cannot compile zfs for 5.5-rc2 · Issue #9745 · zfsonlinux/zfs</a></li><li><a title="Persistent L2ARC might be coming to ZFS on Linux" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/zfs-on-linux-should-get-a-persistent-ssd-read-cache-feature-soon/">Persistent L2ARC might be coming to ZFS on Linux</a> &mdash; The primary ARC is kept in system RAM, but an L2ARC device can be created from one or more fast disks. In a ZFS pool with one or more L2ARC devices, when blocks are evicted from the primary ARC in RAM, they are moved down to L2ARC rather than being thrown away entirely. In the past, this feature has been of limited value, both because indexing a large L2ARC occupies system RAM which could have been better used for primary ARC and because L2ARC was not persistent across reboots.</li><li><a title="Persistent L2ARC by gamanakis · Pull Request #9582 · zfsonlinux/zfs" rel="nofollow" href="https://github.com/zfsonlinux/zfs/pull/9582">Persistent L2ARC by gamanakis · Pull Request #9582 · zfsonlinux/zfs</a> &mdash; This feature implements a light-weight persistent L2ARC metadata structure that allows L2ARC contents to be recovered after a reboot. This significantly eases the impact a reboot has on read performance on systems with large caches.</li><li><a title="LINUX Unplugged 303: Stateless and Dateless" rel="nofollow" href="https://linuxunplugged.com/303">LINUX Unplugged 303: Stateless and Dateless</a> &mdash; We visit Intel to figure out what Clear Linux is all about and explain a few tricks that make it unique.</li><li><a title="LINUX Unplugged Blog: Clear Linux OS 2019" rel="nofollow" href="https://linuxunplugged.com/articles/clear-linux-os-2019">LINUX Unplugged Blog: Clear Linux OS 2019</a></li><li><a title="HAMR don’t hurt ’em: laser-assisted hard drives are coming in 2020" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/hamr-dont-hurt-em-laser-assisted-hard-drives-are-coming-in-2020/">HAMR don’t hurt ’em: laser-assisted hard drives are coming in 2020</a> &mdash; Although the 2012 "just around the corner" HAMR drives seem to have been mostly vapor, the technology is a reality now. Seagate has been trialing 16TB HAMR drives with select customers for more than a year and claims that the trials have proved that its HAMR drives are "plug and play replacements" for traditional CMR drives, requiring no special care and having no particular poor use cases compared to the drives we're all used to.</li><li><a title="HAMR Milestone: Seagate Achieves 16TB Capacity on Internal HAMR Test Units" rel="nofollow" href="https://blog.seagate.com/craftsman-ship/hamr-milestone-seagate-achieves-16tb-capacity-on-internal-hamr-test-units/">HAMR Milestone: Seagate Achieves 16TB Capacity on Internal HAMR Test Units</a></li><li><a title="Western Digital debuts 18TB and 20TB near-MAMR disk drives" rel="nofollow" href="https://blocksandfiles.com/2019/09/03/western-digital-18tb-and-20tb-mamr-disk-drives/">Western Digital debuts 18TB and 20TB near-MAMR disk drives</a></li><li><a title="Previously on TechSNAP 341: HAMR Time" rel="nofollow" href="https://techsnap.systems/341">Previously on TechSNAP 341: HAMR Time</a> &mdash; We've got bad news for Wifi-lovers as the KRACK hack takes the world by storm; We have the details &amp; some places to watch to make sure you stay patched. Plus, some distressing revelations about third party access to your personal information through some US mobile carriers. Then we cover the ongoing debate over HAMR, MAMR, and the future of hard drive technology &amp; take a mini deep dive into the world of elliptic curve cryptography.

</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We explore the potential of heat-assisted magnetic recording and get excited about a possibly persistent L2ARC. </p>

<p>Plus Jim&#39;s journeys with Clear Linux, and why Ubuntu 18.04.4 is a maintenance release worth talking about.</p><p>Links:</p><ul><li><a title="Ubuntu 18.04.4 LTS: here&#39;s what&#39;s new" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/ubuntu-18-04-4-lts-released-wednesday-heres-whats-new/">Ubuntu 18.04.4 LTS: here's what's new</a> &mdash; It's not as shiny and exciting as entirely new versions, of course, but it does pack in some worthwhile security and bugfix upgrades, as well as support for more and newer hardware.</li><li><a title="18.04.4 - Ubuntu Wiki" rel="nofollow" href="https://wiki.ubuntu.com/BionicBeaver/ReleaseNotes/ChangeSummary/18.04.4">18.04.4 - Ubuntu Wiki</a></li><li><a title="MobaXterm" rel="nofollow" href="https://mobaxterm.mobatek.net/">MobaXterm</a> &mdash; Enhanced terminal for Windows with X11 server, tabbed SSH client, network tools and much more.</li><li><a title="Linux distro review: Intel’s own Clear Linux OS" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/linux-distro-review-intels-own-clear-linux-os/?comments=1">Linux distro review: Intel’s own Clear Linux OS</a> &mdash; There's not much question that Clear Linux is your best bet if you want to turn in the best possible benchmark numbers. The question not addressed here is, what's it like to run Clear Linux as a daily driver? We were curious, so we took it for a spin.</li><li><a title="Clear Linux* Project" rel="nofollow" href="https://clearlinux.org/">Clear Linux* Project</a> &mdash; Clear Linux OS is an open source, rolling release Linux distribution optimized for performance and security, from the Cloud to the Edge, designed for customization, and manageability.</li><li><a title="swupd — Documentation for Clear Linux* project" rel="nofollow" href="https://docs.01.org/clearlinux/latest/guides/clear/swupd.html">swupd — Documentation for Clear Linux* project</a></li><li><a title="clr-boot-manager: Kernel &amp; Boot Loader Management" rel="nofollow" href="https://github.com/clearlinux/clr-boot-manager">clr-boot-manager: Kernel &amp; Boot Loader Management</a></li><li><a title="Cannot compile zfs for 5.5-rc2 · Issue #9745 · zfsonlinux/zfs" rel="nofollow" href="https://github.com/zfsonlinux/zfs/issues/9745">Cannot compile zfs for 5.5-rc2 · Issue #9745 · zfsonlinux/zfs</a></li><li><a title="Persistent L2ARC might be coming to ZFS on Linux" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/zfs-on-linux-should-get-a-persistent-ssd-read-cache-feature-soon/">Persistent L2ARC might be coming to ZFS on Linux</a> &mdash; The primary ARC is kept in system RAM, but an L2ARC device can be created from one or more fast disks. In a ZFS pool with one or more L2ARC devices, when blocks are evicted from the primary ARC in RAM, they are moved down to L2ARC rather than being thrown away entirely. In the past, this feature has been of limited value, both because indexing a large L2ARC occupies system RAM which could have been better used for primary ARC and because L2ARC was not persistent across reboots.</li><li><a title="Persistent L2ARC by gamanakis · Pull Request #9582 · zfsonlinux/zfs" rel="nofollow" href="https://github.com/zfsonlinux/zfs/pull/9582">Persistent L2ARC by gamanakis · Pull Request #9582 · zfsonlinux/zfs</a> &mdash; This feature implements a light-weight persistent L2ARC metadata structure that allows L2ARC contents to be recovered after a reboot. This significantly eases the impact a reboot has on read performance on systems with large caches.</li><li><a title="LINUX Unplugged 303: Stateless and Dateless" rel="nofollow" href="https://linuxunplugged.com/303">LINUX Unplugged 303: Stateless and Dateless</a> &mdash; We visit Intel to figure out what Clear Linux is all about and explain a few tricks that make it unique.</li><li><a title="LINUX Unplugged Blog: Clear Linux OS 2019" rel="nofollow" href="https://linuxunplugged.com/articles/clear-linux-os-2019">LINUX Unplugged Blog: Clear Linux OS 2019</a></li><li><a title="HAMR don’t hurt ’em: laser-assisted hard drives are coming in 2020" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/hamr-dont-hurt-em-laser-assisted-hard-drives-are-coming-in-2020/">HAMR don’t hurt ’em: laser-assisted hard drives are coming in 2020</a> &mdash; Although the 2012 "just around the corner" HAMR drives seem to have been mostly vapor, the technology is a reality now. Seagate has been trialing 16TB HAMR drives with select customers for more than a year and claims that the trials have proved that its HAMR drives are "plug and play replacements" for traditional CMR drives, requiring no special care and having no particular poor use cases compared to the drives we're all used to.</li><li><a title="HAMR Milestone: Seagate Achieves 16TB Capacity on Internal HAMR Test Units" rel="nofollow" href="https://blog.seagate.com/craftsman-ship/hamr-milestone-seagate-achieves-16tb-capacity-on-internal-hamr-test-units/">HAMR Milestone: Seagate Achieves 16TB Capacity on Internal HAMR Test Units</a></li><li><a title="Western Digital debuts 18TB and 20TB near-MAMR disk drives" rel="nofollow" href="https://blocksandfiles.com/2019/09/03/western-digital-18tb-and-20tb-mamr-disk-drives/">Western Digital debuts 18TB and 20TB near-MAMR disk drives</a></li><li><a title="Previously on TechSNAP 341: HAMR Time" rel="nofollow" href="https://techsnap.systems/341">Previously on TechSNAP 341: HAMR Time</a> &mdash; We've got bad news for Wifi-lovers as the KRACK hack takes the world by storm; We have the details &amp; some places to watch to make sure you stay patched. Plus, some distressing revelations about third party access to your personal information through some US mobile carriers. Then we cover the ongoing debate over HAMR, MAMR, and the future of hard drive technology &amp; take a mini deep dive into the world of elliptic curve cryptography.

</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>422: Multipath Musings</title>
  <link>https://techsnap.systems/422</link>
  <guid isPermaLink="false">7c9cef4d-3995-411c-9613-8e74e8156f5a</guid>
  <pubDate>Fri, 07 Feb 2020 00:15:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/7c9cef4d-3995-411c-9613-8e74e8156f5a.mp3" length="17013783" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We take a look at a few exciting features coming to Linux kernel 5.6, including the first steps to multipath TCP.</itunes:subtitle>
  <itunes:duration>23:37</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We take a look at a few exciting features coming to Linux kernel 5.6, including the first steps to multipath TCP. 
Plus the latest Intel speculative execution vulnerability, and Microsoft's troubled history with certificate renewal. 
</description>
  <itunes:keywords>Automation, Let's Encrypt, SSL, TLS, CacheOut, Microsoft, Teams, Nagios, Monitoring, Linux, WireGuard, VPN, Edge, Edgium, browser wars, Chrome, blink, Chromium, Firefox, open standards, world wide web, Linux 5.6, Ubuntu 20.04, poly1305, Jason Donenfeld, networking, crypto, cryptography, mptcp, Multipath TCP, iOS, Apple, mobile, LTE, 5G, failover, 3GPP, Intel, speculative execution, ZombieLoad, TSX, SGX, cloud, virtualization, buffer overflow, stack smashing, stack canary, ASLR, DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, Linux Academy, sysadmin podcast, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We take a look at a few exciting features coming to Linux kernel 5.6, including the first steps to multipath TCP. </p>

<p>Plus the latest Intel speculative execution vulnerability, and Microsoft&#39;s troubled history with certificate renewal.</p><p>Links:</p><ul><li><a title="Oregon company makes top bid for Microsoft check - CNET" rel="nofollow" href="https://www.cnet.com/news/oregon-company-makes-top-bid-for-microsoft-check/">Oregon company makes top bid for Microsoft check - CNET</a></li><li><a title="Microsoft’s failures to renew: Teams, Hotmail, and Hotmail.co.uk | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/yesterdays-multi-hour-teams-outage-was-due-to-an-expired-ssl-certificate/">Microsoft’s failures to renew: Teams, Hotmail, and Hotmail.co.uk | Ars Technica</a></li><li><a title="Microsoft Teams goes down after Microsoft forgot to renew a certificate - The Verge" rel="nofollow" href="https://www.theverge.com/2020/2/3/21120248/microsoft-teams-down-outage-certificate-issue-status">Microsoft Teams goes down after Microsoft forgot to renew a certificate - The Verge</a></li><li><a title="Browser review: Microsoft’s new “Edgium” Chromium-based Edge | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/01/browser-review-microsofts-new-edgium-chromium-based-edge/">Browser review: Microsoft’s new “Edgium” Chromium-based Edge | Ars Technica</a></li><li><a title="Linus Torvalds pulled WireGuard VPN into the 5.6 kernel source tree | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/01/linus-torvalds-pulled-wireguard-vpn-into-the-5-6-kernel-source-tree/">Linus Torvalds pulled WireGuard VPN into the 5.6 kernel source tree | Ars Technica</a></li><li><a title="Ubuntu 20.04 LTS Adds WireGuard Support - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Ubuntu-20.04-Adds-WireGuard">Ubuntu 20.04 LTS Adds WireGuard Support - Phoronix</a></li><li><a title="Multipath TCP Support Is Working Its Upstream - First Bits Landing With Linux 5.6 - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-5.6-Starts-Multipath-TCP">Multipath TCP Support Is Working Its Upstream - First Bits Landing With Linux 5.6 - Phoronix</a></li><li><a title="MultiPath TCP - Linux Kernel implementation" rel="nofollow" href="https://www.multipath-tcp.org/">MultiPath TCP - Linux Kernel implementation</a></li><li><a title="Upstreaming multipath TCP" rel="nofollow" href="https://lwn.net/Articles/800501/">Upstreaming multipath TCP</a></li><li><a title="LPC2019 - Multipath TCP Upstreaming - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=Y64n_R14GtI">LPC2019 - Multipath TCP Upstreaming - YouTube</a></li><li><a title="LPC2019 - Multipath TCP Upstreaming - Slides" rel="nofollow" href="https://linuxplumbersconf.org/event/4/contributions/435/attachments/247/438/LPC2019-Upstreaming-MPTCP-slides.pdf">LPC2019 - Multipath TCP Upstreaming - Slides</a></li><li><a title="LPC2019 - Multipath TCP Upstreaming - Paper" rel="nofollow" href="https://linuxplumbersconf.org/event/4/contributions/435/attachments/246/428/LPC2019-Upstreaming-MPTCP-paper.pdf">LPC2019 - Multipath TCP Upstreaming - Paper</a></li><li><a title="Using MultiPath TCP to enhance home networks" rel="nofollow" href="https://www.sajalkayan.com/post/fun-with-mptcp.html">Using MultiPath TCP to enhance home networks</a></li><li><a title="Linux 5.6 Crypto Getting AVX/AVX2/AVX-512 Optimized Poly1305" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-5.6-Crypto-AVX-Poly1305">Linux 5.6 Crypto Getting AVX/AVX2/AVX-512 Optimized Poly1305</a></li><li><a title="Poly1305" rel="nofollow" href="https://en.wikipedia.org/wiki/Poly1305">Poly1305</a></li><li><a title="CacheOut" rel="nofollow" href="https://cacheoutattack.com/">CacheOut</a></li><li><a title="CacheOut Paper" rel="nofollow" href="https://cacheoutattack.com/CacheOut.pdf">CacheOut Paper</a></li><li><a title="Intel Responds to ZombieLoad and CacheOut Attacks | Tom&#39;s Hardware" rel="nofollow" href="https://www.tomshardware.com/news/intel-responds-to-zombieload-and-cacheout-attacks">Intel Responds to ZombieLoad and CacheOut Attacks | Tom's Hardware</a></li><li><a title="New CacheOut Attack Targets Intel CPUs, Leaks Data From VMs And Secure Enclave" rel="nofollow" href="https://hothardware.com/news/cacheout-attack-intel-cpus-leaks-data-vms-secure-enclave">New CacheOut Attack Targets Intel CPUs, Leaks Data From VMs And Secure Enclave</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We take a look at a few exciting features coming to Linux kernel 5.6, including the first steps to multipath TCP. </p>

<p>Plus the latest Intel speculative execution vulnerability, and Microsoft&#39;s troubled history with certificate renewal.</p><p>Links:</p><ul><li><a title="Oregon company makes top bid for Microsoft check - CNET" rel="nofollow" href="https://www.cnet.com/news/oregon-company-makes-top-bid-for-microsoft-check/">Oregon company makes top bid for Microsoft check - CNET</a></li><li><a title="Microsoft’s failures to renew: Teams, Hotmail, and Hotmail.co.uk | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/yesterdays-multi-hour-teams-outage-was-due-to-an-expired-ssl-certificate/">Microsoft’s failures to renew: Teams, Hotmail, and Hotmail.co.uk | Ars Technica</a></li><li><a title="Microsoft Teams goes down after Microsoft forgot to renew a certificate - The Verge" rel="nofollow" href="https://www.theverge.com/2020/2/3/21120248/microsoft-teams-down-outage-certificate-issue-status">Microsoft Teams goes down after Microsoft forgot to renew a certificate - The Verge</a></li><li><a title="Browser review: Microsoft’s new “Edgium” Chromium-based Edge | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/01/browser-review-microsofts-new-edgium-chromium-based-edge/">Browser review: Microsoft’s new “Edgium” Chromium-based Edge | Ars Technica</a></li><li><a title="Linus Torvalds pulled WireGuard VPN into the 5.6 kernel source tree | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/01/linus-torvalds-pulled-wireguard-vpn-into-the-5-6-kernel-source-tree/">Linus Torvalds pulled WireGuard VPN into the 5.6 kernel source tree | Ars Technica</a></li><li><a title="Ubuntu 20.04 LTS Adds WireGuard Support - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Ubuntu-20.04-Adds-WireGuard">Ubuntu 20.04 LTS Adds WireGuard Support - Phoronix</a></li><li><a title="Multipath TCP Support Is Working Its Upstream - First Bits Landing With Linux 5.6 - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-5.6-Starts-Multipath-TCP">Multipath TCP Support Is Working Its Upstream - First Bits Landing With Linux 5.6 - Phoronix</a></li><li><a title="MultiPath TCP - Linux Kernel implementation" rel="nofollow" href="https://www.multipath-tcp.org/">MultiPath TCP - Linux Kernel implementation</a></li><li><a title="Upstreaming multipath TCP" rel="nofollow" href="https://lwn.net/Articles/800501/">Upstreaming multipath TCP</a></li><li><a title="LPC2019 - Multipath TCP Upstreaming - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=Y64n_R14GtI">LPC2019 - Multipath TCP Upstreaming - YouTube</a></li><li><a title="LPC2019 - Multipath TCP Upstreaming - Slides" rel="nofollow" href="https://linuxplumbersconf.org/event/4/contributions/435/attachments/247/438/LPC2019-Upstreaming-MPTCP-slides.pdf">LPC2019 - Multipath TCP Upstreaming - Slides</a></li><li><a title="LPC2019 - Multipath TCP Upstreaming - Paper" rel="nofollow" href="https://linuxplumbersconf.org/event/4/contributions/435/attachments/246/428/LPC2019-Upstreaming-MPTCP-paper.pdf">LPC2019 - Multipath TCP Upstreaming - Paper</a></li><li><a title="Using MultiPath TCP to enhance home networks" rel="nofollow" href="https://www.sajalkayan.com/post/fun-with-mptcp.html">Using MultiPath TCP to enhance home networks</a></li><li><a title="Linux 5.6 Crypto Getting AVX/AVX2/AVX-512 Optimized Poly1305" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-5.6-Crypto-AVX-Poly1305">Linux 5.6 Crypto Getting AVX/AVX2/AVX-512 Optimized Poly1305</a></li><li><a title="Poly1305" rel="nofollow" href="https://en.wikipedia.org/wiki/Poly1305">Poly1305</a></li><li><a title="CacheOut" rel="nofollow" href="https://cacheoutattack.com/">CacheOut</a></li><li><a title="CacheOut Paper" rel="nofollow" href="https://cacheoutattack.com/CacheOut.pdf">CacheOut Paper</a></li><li><a title="Intel Responds to ZombieLoad and CacheOut Attacks | Tom&#39;s Hardware" rel="nofollow" href="https://www.tomshardware.com/news/intel-responds-to-zombieload-and-cacheout-attacks">Intel Responds to ZombieLoad and CacheOut Attacks | Tom's Hardware</a></li><li><a title="New CacheOut Attack Targets Intel CPUs, Leaks Data From VMs And Secure Enclave" rel="nofollow" href="https://hothardware.com/news/cacheout-attack-intel-cpus-leaks-data-vms-secure-enclave">New CacheOut Attack Targets Intel CPUs, Leaks Data From VMs And Secure Enclave</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>421: Firewall Fun</title>
  <link>https://techsnap.systems/421</link>
  <guid isPermaLink="false">34f7722c-c7da-4f86-a8f9-14e67de6d899</guid>
  <pubDate>Fri, 24 Jan 2020 00:15:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/34f7722c-c7da-4f86-a8f9-14e67de6d899.mp3" length="18463600" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We explore the latest round of Windows vulnerabilities and Jim shares his journey adding OPNsense to his firewall family. </itunes:subtitle>
  <itunes:duration>25:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We explore the latest round of Windows vulnerabilities and Jim shares his journey adding OPNsense to his firewall family. 
Plus a look back at Apollo-era audio that's still relevant today with the surprising story of the Quindar tones. 
</description>
  <itunes:keywords>Windows, Windows Update, Patch Tuesday, Microsoft, cryptography, EternalBlue, crypt32.dll, CryptoAPI spoofing, RDP, RDP Gateway, RDP client, NSA, National Security Administration, patching, security, vulnerability, ECC, elliptic curve cryptography, Windows 10, certificate validation, OPNsense, pfSense, pf, BSD, iptables, Linux, Netgate, Netgear, networking, routing, security gateway, firewall appliance, x86, ARM, Unix, MITM, VPN, firewall, CVE-2020-0601, NASA, Apollo, moon, space, Quindar, Quindar Tones, phreaking, telephony, hacking, Captain Crunch whistle, 2600, nmap, Crystal Method, John Draper, DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, Linux Academy, sysadmin podcast, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We explore the latest round of Windows vulnerabilities and Jim shares his journey adding OPNsense to his firewall family. </p>

<p>Plus a look back at Apollo-era audio that&#39;s still relevant today with the surprising story of the Quindar tones.</p><p>Links:</p><ul><li><a title="Critical Vulnerabilities in Microsoft Windows Operating Systems" rel="nofollow" href="https://www.us-cert.gov/ncas/alerts/aa20-014a">Critical Vulnerabilities in Microsoft Windows Operating Systems</a></li><li><a title="Win10 Crypto Vulnerability: Cheating in Elliptic Curve Billiards 2" rel="nofollow" href="https://medium.com/zengo/win10-crypto-vulnerability-cheating-in-elliptic-curve-billiards-2-69b45f2dcab6">Win10 Crypto Vulnerability: Cheating in Elliptic Curve Billiards 2</a></li><li><a title="NSA discovers a serious flaw in Windows 10" rel="nofollow" href="https://betanews.com/2020/01/14/nsa-discovers-a-serious-flaw-in-windows-10/">NSA discovers a serious flaw in Windows 10</a></li><li><a title="Exploiting CVE-2020-0601" rel="nofollow" href="https://blog.sean-wright.com/exploiting-cve-2020-0601/">Exploiting CVE-2020-0601</a></li><li><a title="CVE-2020-0601 POC" rel="nofollow" href="https://github.com/ollypwn/cve-2020-0601">CVE-2020-0601 POC</a></li><li><a title="NSA Cybersecurity Advisory on CryptoAPI Flaw" rel="nofollow" href="https://media.defense.gov/2020/Jan/14/2002234275/-1/-1/0/CSA-WINDOWS-10-CRYPT-LIB-20190114.PDF">NSA Cybersecurity Advisory on CryptoAPI Flaw</a></li><li><a title="Why can’t I get to the internet on my new OPNsense install?! - Jim&#39;s Blog" rel="nofollow" href="https://jrs-s.net/2020/01/19/why-cant-i-get-to-the-internet-on-my-new-opnsense-install/">Why can’t I get to the internet on my new OPNsense install?! - Jim's Blog</a></li><li><a title="OPNsense: a true open source security platform and more" rel="nofollow" href="https://opnsense.org">OPNsense: a true open source security platform and more</a></li><li><a title="There&#39;s An Actual Name And Reason For Those Beeps You Hear In Recordings Of Astronauts In Space" rel="nofollow" href="https://jalopnik.com/theres-an-actual-name-and-reason-for-those-beeps-you-he-1841024797">There's An Actual Name And Reason For Those Beeps You Hear In Recordings Of Astronauts In Space</a></li><li><a title="Quindar Tones" rel="nofollow" href="https://www.hq.nasa.gov/alsj/quindar.html">Quindar Tones</a></li><li><a title="Cap&#39;n Crunch Whistle and the Secrets of the Little Blue Box" rel="nofollow" href="https://telephone-museum.org/telephone-collections/capn-crunch-bosun-whistle/">Cap'n Crunch Whistle and the Secrets of the Little Blue Box</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We explore the latest round of Windows vulnerabilities and Jim shares his journey adding OPNsense to his firewall family. </p>

<p>Plus a look back at Apollo-era audio that&#39;s still relevant today with the surprising story of the Quindar tones.</p><p>Links:</p><ul><li><a title="Critical Vulnerabilities in Microsoft Windows Operating Systems" rel="nofollow" href="https://www.us-cert.gov/ncas/alerts/aa20-014a">Critical Vulnerabilities in Microsoft Windows Operating Systems</a></li><li><a title="Win10 Crypto Vulnerability: Cheating in Elliptic Curve Billiards 2" rel="nofollow" href="https://medium.com/zengo/win10-crypto-vulnerability-cheating-in-elliptic-curve-billiards-2-69b45f2dcab6">Win10 Crypto Vulnerability: Cheating in Elliptic Curve Billiards 2</a></li><li><a title="NSA discovers a serious flaw in Windows 10" rel="nofollow" href="https://betanews.com/2020/01/14/nsa-discovers-a-serious-flaw-in-windows-10/">NSA discovers a serious flaw in Windows 10</a></li><li><a title="Exploiting CVE-2020-0601" rel="nofollow" href="https://blog.sean-wright.com/exploiting-cve-2020-0601/">Exploiting CVE-2020-0601</a></li><li><a title="CVE-2020-0601 POC" rel="nofollow" href="https://github.com/ollypwn/cve-2020-0601">CVE-2020-0601 POC</a></li><li><a title="NSA Cybersecurity Advisory on CryptoAPI Flaw" rel="nofollow" href="https://media.defense.gov/2020/Jan/14/2002234275/-1/-1/0/CSA-WINDOWS-10-CRYPT-LIB-20190114.PDF">NSA Cybersecurity Advisory on CryptoAPI Flaw</a></li><li><a title="Why can’t I get to the internet on my new OPNsense install?! - Jim&#39;s Blog" rel="nofollow" href="https://jrs-s.net/2020/01/19/why-cant-i-get-to-the-internet-on-my-new-opnsense-install/">Why can’t I get to the internet on my new OPNsense install?! - Jim's Blog</a></li><li><a title="OPNsense: a true open source security platform and more" rel="nofollow" href="https://opnsense.org">OPNsense: a true open source security platform and more</a></li><li><a title="There&#39;s An Actual Name And Reason For Those Beeps You Hear In Recordings Of Astronauts In Space" rel="nofollow" href="https://jalopnik.com/theres-an-actual-name-and-reason-for-those-beeps-you-he-1841024797">There's An Actual Name And Reason For Those Beeps You Hear In Recordings Of Astronauts In Space</a></li><li><a title="Quindar Tones" rel="nofollow" href="https://www.hq.nasa.gov/alsj/quindar.html">Quindar Tones</a></li><li><a title="Cap&#39;n Crunch Whistle and the Secrets of the Little Blue Box" rel="nofollow" href="https://telephone-museum.org/telephone-collections/capn-crunch-bosun-whistle/">Cap'n Crunch Whistle and the Secrets of the Little Blue Box</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>420: Choose Your Own Compiler</title>
  <link>https://techsnap.systems/420</link>
  <guid isPermaLink="false">00154604-0b9c-480c-9fe2-2fba4ed8420a</guid>
  <pubDate>Fri, 10 Jan 2020 00:15:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/00154604-0b9c-480c-9fe2-2fba4ed8420a.mp3" length="17409694" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Compiling the Linux kernel with Clang has never been easier, so we explore this alternative compiler and what it brings to the ecosystem.</itunes:subtitle>
  <itunes:duration>24:10</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Compiling the Linux kernel with Clang has never been easier, so we explore this alternative compiler and what it brings to the ecosystem.
Plus Debian's continued init system debate, and our frustrations over 5G reporting. 
</description>
  <itunes:keywords>5G, Telephony, mobile, cell phones, LTE, 4G, wireless, broadband, South Korea, FR1, FR2, mmWave, Debian, systemd, netplan, Ubuntu, Canonical, Unity, networking, init system, systemd-networkd, Phoronix, Michael Larabel, clang, LLVM, GCC, GNU, compilers, C, systems programming, linux, linux kernel, kernel development, DevOps, TechSNAP, Jupiter Broadcasting,</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Compiling the Linux kernel with Clang has never been easier, so we explore this alternative compiler and what it brings to the ecosystem.</p>

<p>Plus Debian&#39;s continued init system debate, and our frustrations over 5G reporting.</p><p>Links:</p><ul><li><a title="5G Underwhelms in Its First Big Test - WSJ" rel="nofollow" href="https://www.wsj.com/articles/5g-underwhelms-in-its-first-big-test-11577788203">5G Underwhelms in Its First Big Test - WSJ</a></li><li><a title="How South Korea built 5G, and what it&#39;s learning - RCR Wireless News" rel="nofollow" href="https://www.rcrwireless.com/20190912/5g/how-south-korea-built-5g-and-what-its-learning">How South Korea built 5G, and what it's learning - RCR Wireless News</a></li><li><a title="After seven months, here’s what South Korea can teach us about 5G - CNA" rel="nofollow" href="https://www.channelnewsasia.com/news/cnainsider/what-south-korea-first-country-launch-5g-network-can-teach-us-12056726">After seven months, here’s what South Korea can teach us about 5G - CNA</a></li><li><a title="South Korea secures 4 million 5G subscribers | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/south-korea-secures-4-million-5g-subscribers/">South Korea secures 4 million 5G subscribers | ZDNet</a></li><li><a title="Debian Developers Take To Voting Over Init System Diversity" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Debian-Init-Diversity-Vote">Debian Developers Take To Voting Over Init System Diversity</a></li><li><a title="Debian GR Results" rel="nofollow" href="https://vote.debian.org/~secretary/gr_initsystems/results.txt">Debian GR Results</a></li><li><a title="General Resolution: Init systems and systemd" rel="nofollow" href="https://www.debian.org/vote/2019/vote_002">General Resolution: Init systems and systemd</a></li><li><a title="Ringing In 2020 By Clang’ing The Linux 5.5 Kernel - Benchmarks Of GCC vs. Clang Built Kernels" rel="nofollow" href="https://www.phoronix.com/scan.php?page=article&amp;item=linux-55-clang&amp;num=1">Ringing In 2020 By Clang’ing The Linux 5.5 Kernel - Benchmarks Of GCC vs. Clang Built Kernels</a></li><li><a title="Using LLVM Clang To Compile The Linux Kernel Is Heating Up Again Thanks To Google" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Google-2019-Clang-Kernel">Using LLVM Clang To Compile The Linux Kernel Is Heating Up Again Thanks To Google</a></li><li><a title="Building the kernel with Clang - LWN" rel="nofollow" href="https://lwn.net/Articles/734071/">Building the kernel with Clang - LWN</a></li><li><a title="ClangBuiltLinux" rel="nofollow" href="https://clangbuiltlinux.github.io">ClangBuiltLinux</a></li><li><a title="Compiling the Linux kernel with LLVM tools (FOSDEM 2019)" rel="nofollow" href="https://archive.fosdem.org/2019/schedule/event/llvm_kernel/">Compiling the Linux kernel with LLVM tools (FOSDEM 2019)</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Compiling the Linux kernel with Clang has never been easier, so we explore this alternative compiler and what it brings to the ecosystem.</p>

<p>Plus Debian&#39;s continued init system debate, and our frustrations over 5G reporting.</p><p>Links:</p><ul><li><a title="5G Underwhelms in Its First Big Test - WSJ" rel="nofollow" href="https://www.wsj.com/articles/5g-underwhelms-in-its-first-big-test-11577788203">5G Underwhelms in Its First Big Test - WSJ</a></li><li><a title="How South Korea built 5G, and what it&#39;s learning - RCR Wireless News" rel="nofollow" href="https://www.rcrwireless.com/20190912/5g/how-south-korea-built-5g-and-what-its-learning">How South Korea built 5G, and what it's learning - RCR Wireless News</a></li><li><a title="After seven months, here’s what South Korea can teach us about 5G - CNA" rel="nofollow" href="https://www.channelnewsasia.com/news/cnainsider/what-south-korea-first-country-launch-5g-network-can-teach-us-12056726">After seven months, here’s what South Korea can teach us about 5G - CNA</a></li><li><a title="South Korea secures 4 million 5G subscribers | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/south-korea-secures-4-million-5g-subscribers/">South Korea secures 4 million 5G subscribers | ZDNet</a></li><li><a title="Debian Developers Take To Voting Over Init System Diversity" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Debian-Init-Diversity-Vote">Debian Developers Take To Voting Over Init System Diversity</a></li><li><a title="Debian GR Results" rel="nofollow" href="https://vote.debian.org/~secretary/gr_initsystems/results.txt">Debian GR Results</a></li><li><a title="General Resolution: Init systems and systemd" rel="nofollow" href="https://www.debian.org/vote/2019/vote_002">General Resolution: Init systems and systemd</a></li><li><a title="Ringing In 2020 By Clang’ing The Linux 5.5 Kernel - Benchmarks Of GCC vs. Clang Built Kernels" rel="nofollow" href="https://www.phoronix.com/scan.php?page=article&amp;item=linux-55-clang&amp;num=1">Ringing In 2020 By Clang’ing The Linux 5.5 Kernel - Benchmarks Of GCC vs. Clang Built Kernels</a></li><li><a title="Using LLVM Clang To Compile The Linux Kernel Is Heating Up Again Thanks To Google" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Google-2019-Clang-Kernel">Using LLVM Clang To Compile The Linux Kernel Is Heating Up Again Thanks To Google</a></li><li><a title="Building the kernel with Clang - LWN" rel="nofollow" href="https://lwn.net/Articles/734071/">Building the kernel with Clang - LWN</a></li><li><a title="ClangBuiltLinux" rel="nofollow" href="https://clangbuiltlinux.github.io">ClangBuiltLinux</a></li><li><a title="Compiling the Linux kernel with LLVM tools (FOSDEM 2019)" rel="nofollow" href="https://archive.fosdem.org/2019/schedule/event/llvm_kernel/">Compiling the Linux kernel with LLVM tools (FOSDEM 2019)</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>416: I.T. Phone Home</title>
  <link>https://techsnap.systems/416</link>
  <guid isPermaLink="false">e38f2c78-c42c-4c73-b785-322cbeb33552</guid>
  <pubDate>Fri, 15 Nov 2019 00:15:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/e38f2c78-c42c-4c73-b785-322cbeb33552.mp3" length="20112427" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Ubiquiti's troublesome new telemetry, Jim's take on the modern Microsoft, and why Project Silica just might be the future of long term storage.</itunes:subtitle>
  <itunes:duration>27:56</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Ubiquiti's troublesome new telemetry, Jim's take on the modern Microsoft, and why Project Silica just might be the future of long term storage. 
</description>
  <itunes:keywords>Ubiquiti,wifi,telemetry,Unifi,communication,video,unifi controller,security camera,cloud key,Microsoft,Microsoft Ignite,business,cold storage,optical storage,optical media,ZFS,parity, Project Silica, glass, The Mote in God's Eye, Superman, long term storage, archival, Linux, Microsoft Edge,Chromium,Open Source,DevOps, TechSNAP, Jupiter Broadcasting</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Ubiquiti&#39;s troublesome new telemetry, Jim&#39;s take on the modern Microsoft, and why Project Silica just might be the future of long term storage.</p><p>Links:</p><ul><li><a title="Sure, we made your Wi-Fi routers phone home with telemetry, says Ubiquiti. What of it?" rel="nofollow" href="https://www.theregister.co.uk/2019/11/07/ubiquiti_networks_phone_home/">Sure, we made your Wi-Fi routers phone home with telemetry, says Ubiquiti. What of it?</a> &mdash; Ubiquiti Networks is fending off customer complaints after emitting a firmware update that caused its UniFi wireless routers to quietly phone HQ with telemetry.</li><li><a title="UI official: urgent, please answer | Ubiquiti Community" rel="nofollow" href="https://community.ui.com/questions/UI-official-urgent-please-answer/14259289-e4c3-4c5e-aaa0-02a5baa6cbbe?page=11">UI official: urgent, please answer | Ubiquiti Community</a></li><li><a title="Update: UniFi Phone Home/Performance Data Collection | Ubiquiti Community" rel="nofollow" href="https://community.ui.com/questions/Update-UniFi-Phone-Home-Performance-Data-Collection/f84a71c9-0b81-4d69-a3b3-45640aba1c8b">Update: UniFi Phone Home/Performance Data Collection | Ubiquiti Community</a></li><li><a title="Possible example data" rel="nofollow" href="https://community.ui.com/questions/UI-official-urgent-please-answer/14259289-e4c3-4c5e-aaa0-02a5baa6cbbe#answer/2eca7d3f-5824-43ae-bd1d-fe6a18af1c79">Possible example data</a></li><li><a title="Latest firmware with changes" rel="nofollow" href="https://community.ui.com/releases/UAP-USW-Firmware-4-0-69-10871/245e428c-d111-4b9d-a550-ec0cc86ef646">Latest firmware with changes</a></li><li><a title="Microsoft’s Project Silica offers robust thousand-year storage | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/11/microsofts-project-silica-offers-robust-thousand-year-storage/">Microsoft’s Project Silica offers robust thousand-year storage | Ars Technica</a> &mdash; Silica aims to replace both tape and optical archival discs as the media of choice for large-scale, (very) long duration cold storage.</li><li><a title="Project Silica" rel="nofollow" href="https://www.microsoft.com/en-us/research/uploads/prod/2018/07/hotstorage18-paper-anderson.pdf">Project Silica</a></li><li><a title="The Future of Data Storage" rel="nofollow" href="https://cacm.acm.org/magazines/2019/4/235573-the-future-of-data-storage/fulltext?mobile=false">The Future of Data Storage</a></li><li><a title="Microsoft Ignite 2019" rel="nofollow" href="https://news.microsoft.com/ignite2019/">Microsoft Ignite 2019</a></li><li><a title="Microsoft Edge is coming to Linux. But will anybody use it? | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/11/microsoft-edge-is-coming-to-linux-but-will-anybody-use-it/">Microsoft Edge is coming to Linux. But will anybody use it? | Ars Technica</a> &mdash; At Microsoft Ignite a slide announced that Microsoft's project to rebase its perennially unloved Edge browser on Google's open source project Chromium is well underway. Sharper-eyed attendees also noticed a promise for future Linux support.</li><li><a title="Has Microsoft Changed?" rel="nofollow" href="https://medium.com/@wtfmitchel/has-microsoft-changed-431db9d1d153">Has Microsoft Changed?</a></li><li><a title="This isn’t your father’s Microsoft" rel="nofollow" href="http://sawers.com/blog/this-isnt-your-fathers-microsoft/">This isn’t your father’s Microsoft</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Ubiquiti&#39;s troublesome new telemetry, Jim&#39;s take on the modern Microsoft, and why Project Silica just might be the future of long term storage.</p><p>Links:</p><ul><li><a title="Sure, we made your Wi-Fi routers phone home with telemetry, says Ubiquiti. What of it?" rel="nofollow" href="https://www.theregister.co.uk/2019/11/07/ubiquiti_networks_phone_home/">Sure, we made your Wi-Fi routers phone home with telemetry, says Ubiquiti. What of it?</a> &mdash; Ubiquiti Networks is fending off customer complaints after emitting a firmware update that caused its UniFi wireless routers to quietly phone HQ with telemetry.</li><li><a title="UI official: urgent, please answer | Ubiquiti Community" rel="nofollow" href="https://community.ui.com/questions/UI-official-urgent-please-answer/14259289-e4c3-4c5e-aaa0-02a5baa6cbbe?page=11">UI official: urgent, please answer | Ubiquiti Community</a></li><li><a title="Update: UniFi Phone Home/Performance Data Collection | Ubiquiti Community" rel="nofollow" href="https://community.ui.com/questions/Update-UniFi-Phone-Home-Performance-Data-Collection/f84a71c9-0b81-4d69-a3b3-45640aba1c8b">Update: UniFi Phone Home/Performance Data Collection | Ubiquiti Community</a></li><li><a title="Possible example data" rel="nofollow" href="https://community.ui.com/questions/UI-official-urgent-please-answer/14259289-e4c3-4c5e-aaa0-02a5baa6cbbe#answer/2eca7d3f-5824-43ae-bd1d-fe6a18af1c79">Possible example data</a></li><li><a title="Latest firmware with changes" rel="nofollow" href="https://community.ui.com/releases/UAP-USW-Firmware-4-0-69-10871/245e428c-d111-4b9d-a550-ec0cc86ef646">Latest firmware with changes</a></li><li><a title="Microsoft’s Project Silica offers robust thousand-year storage | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/11/microsofts-project-silica-offers-robust-thousand-year-storage/">Microsoft’s Project Silica offers robust thousand-year storage | Ars Technica</a> &mdash; Silica aims to replace both tape and optical archival discs as the media of choice for large-scale, (very) long duration cold storage.</li><li><a title="Project Silica" rel="nofollow" href="https://www.microsoft.com/en-us/research/uploads/prod/2018/07/hotstorage18-paper-anderson.pdf">Project Silica</a></li><li><a title="The Future of Data Storage" rel="nofollow" href="https://cacm.acm.org/magazines/2019/4/235573-the-future-of-data-storage/fulltext?mobile=false">The Future of Data Storage</a></li><li><a title="Microsoft Ignite 2019" rel="nofollow" href="https://news.microsoft.com/ignite2019/">Microsoft Ignite 2019</a></li><li><a title="Microsoft Edge is coming to Linux. But will anybody use it? | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/11/microsoft-edge-is-coming-to-linux-but-will-anybody-use-it/">Microsoft Edge is coming to Linux. But will anybody use it? | Ars Technica</a> &mdash; At Microsoft Ignite a slide announced that Microsoft's project to rebase its perennially unloved Edge browser on Google's open source project Chromium is well underway. Sharper-eyed attendees also noticed a promise for future Linux support.</li><li><a title="Has Microsoft Changed?" rel="nofollow" href="https://medium.com/@wtfmitchel/has-microsoft-changed-431db9d1d153">Has Microsoft Changed?</a></li><li><a title="This isn’t your father’s Microsoft" rel="nofollow" href="http://sawers.com/blog/this-isnt-your-fathers-microsoft/">This isn’t your father’s Microsoft</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>411: Mobile Security Mistakes</title>
  <link>https://techsnap.systems/411</link>
  <guid isPermaLink="false">b9fd8f0e-82a3-44bb-b373-eea0ac62412d</guid>
  <pubDate>Fri, 06 Sep 2019 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/b9fd8f0e-82a3-44bb-b373-eea0ac62412d.mp3" length="21338406" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.</itunes:subtitle>
  <itunes:duration>29:38</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.
Plus what to expect from USB4 and an upcoming Linux scheduler speed-up for AMD's Epyc CPUs. 
</description>
  <itunes:keywords>iOS, iPhone, mobile, mobile apps, app security, Apple, jailbreak, security, mobile security, exploit chain, zeroday, project zero, google, libxpc, IPC, webkit, malware, android, v4l2, video4linux, privilege escalation, AMD, Epyc, NUMA, benchmarks, exploit market, Zerodium, cpu load balancing, linux, open source, USB, USB4, USB-C, Thunderbolt, USB Power Delivery, sysadmin podcast, DevOps, TechSNAP, jupiter broadcasting</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.</p>

<p>Plus what to expect from USB4 and an upcoming Linux scheduler speed-up for AMD&#39;s Epyc CPUs.</p><p>Links:</p><ul><li><a title="Google says hackers have put ‘monitoring implants’ in iPhones for years | Technology | The Guardian" rel="nofollow" href="https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says">Google says hackers have put ‘monitoring implants’ in iPhones for years | Technology | The Guardian</a> &mdash; Their location was uploaded every minute; their device’s keychain, containing all their passwords, was uploaded, as were their chat histories on popular apps including WhatsApp, Telegram and iMessage, their address book, and their Gmail database.</li><li><a title="Project Zero: A very deep dive into iOS Exploit chains found in the wild" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html">Project Zero: A very deep dive into iOS Exploit chains found in the wild</a> &mdash; We discovered exploits for a total of fourteen vulnerabilities across the five exploit chains: seven for the iPhone’s web browser, five for the kernel and two separate sandbox escapes. </li><li><a title="Project Zero: In-the-wild iOS Exploit Chain 1" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-1.html">Project Zero: In-the-wild iOS Exploit Chain 1</a> &mdash; This exploit provides evidence that these exploit chains were likely written contemporaneously with their supported iOS versions; that is, the exploit techniques which were used suggest that this exploit was written around the time of iOS 10. This suggests that this group had a capability against a fully patched iPhone for at least two years.  </li><li><a title="Project Zero: In-the-wild iOS Exploit Chain 3" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-3.html">Project Zero: In-the-wild iOS Exploit Chain 3</a> &mdash; It’s difficult to understand how this error could be introduced into a core IPC library that shipped to end users. While errors are common in software development, a serious one like this should have quickly been found by a unit test, code review or even fuzzing. </li><li><a title="Project Zero: JSC Exploits" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/jsc-exploits.html">Project Zero: JSC Exploits</a> &mdash; In this post, we will take a look at the WebKit exploits used to gain an initial foothold onto the iOS device and stage the privilege escalation exploits. All exploits here achieve shellcode execution inside the sandboxed renderer process (WebContent) on iOS.</li><li><a title="Project Zero: Implant Teardown" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html">Project Zero: Implant Teardown</a> &mdash; There is no visual indicator on the device that the implant is running. There's no way for a user on iOS to view a process listing, so the implant binary makes no attempt to hide its execution from the system. The implant is primarily focused on stealing files and uploading live location data. The implant requests commands from a command and control server every 60 seconds.The implant has access to all the database files (on the victim’s phone) used by popular end-to-end encryption apps like Whatsapp, Telegram and iMessage.</li><li><a title="iPhone Hackers Caught By Google Also Targeted Android And Microsoft Windows, Say Sources" rel="nofollow" href="https://www.forbes.com/sites/thomasbrewster/2019/09/01/iphone-hackers-caught-by-google-also-targeted-android-and-microsoft-windows-say-sources/#374244a44adf">iPhone Hackers Caught By Google Also Targeted Android And Microsoft Windows, Say Sources</a> &mdash; Multiple sources with knowledge of the situation said that Google’s own Android operating system and Microsoft Windows PCs were also targeted in a campaign that sought to infect the computers and smartphones of the Uighur ethnic group in China.</li><li><a title="Google&#39;s Shocking Decision To Ignore A Critical Android Vulnerability In Latest Security Update" rel="nofollow" href="https://www.forbes.com/sites/jeanbaptiste/2019/09/05/googles-shocking-decision-to-ignore-a-critical-android-vulnerability-in-its-latest-security-update/#5fa2487213bb">Google's Shocking Decision To Ignore A Critical Android Vulnerability In Latest Security Update</a> &mdash; Despite immediately acknowledging the vulnerability and confirming in June that it will be fixed, Google had not provided an estimated time frame for the patch.</li><li><a title="Android Zero-Day Bug Opens Door to Privilege Escalation Attack, Researchers Warn | Threatpost" rel="nofollow" href="https://threatpost.com/android-zero-day-bug-opens-door-to-privilege-escalation-attack-researchers-warn/148014/">Android Zero-Day Bug Opens Door to Privilege Escalation Attack, Researchers Warn | Threatpost</a> &mdash; “In the unlikely event an attacker succeeds in exploiting this bug, they would effectively have complete control over the target device,” he told Threatpost. Once an attacker obtains escalated privileges, “it means they could completely take over a device if they can convince a user to install and run their application,”</li><li><a title="Why &#39;Zero Day&#39; Android Hacking Now Costs More Than iOS Attacks | WIRED" rel="nofollow" href="https://www.wired.com/story/android-zero-day-more-than-ios-zerodium/">Why 'Zero Day' Android Hacking Now Costs More Than iOS Attacks | WIRED</a> &mdash; "During the last few months, we have observed an increase in the number of iOS exploits, mostly Safari and iMessage chains, being developed and sold by researchers from all around the world. The zero-day market is so flooded by iOS exploits that we've recently started refusing some them"</li><li><a title="Linux 5.4 Kernel To Bring Improved Load Balancing On AMD EPYC Servers" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-5.4-Improve-EPYC-Balance">Linux 5.4 Kernel To Bring Improved Load Balancing On AMD EPYC Servers</a> &mdash; The scheduler topology improvement by SUSE's Matt Fleming changes the behavior as currently it turns out for EPYC hardware the kernel has failed to properly load balance across NUMA nodes on different sockets. </li><li><a title="USB4 is coming soon and will (mostly) unify USB and Thunderbolt | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/usb4-is-coming-soon-and-will-mostly-unify-usb-and-thunderbolt/?comments=1&amp;start=40">USB4 is coming soon and will (mostly) unify USB and Thunderbolt | Ars Technica</a> &mdash; The USB Implementers Forum published the official USB4 protocol specification. If your initial reaction was "oh no, not again," don't worry—the new spec is backward-compatible with USB 2 and USB 3, and it uses the same USB Type-C connectors that modern USB 3 devices do.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We take a look at a few recent zero-day vulnerabilities for iOS and Android and find targeted attacks, bad assumptions, and changing markets.</p>

<p>Plus what to expect from USB4 and an upcoming Linux scheduler speed-up for AMD&#39;s Epyc CPUs.</p><p>Links:</p><ul><li><a title="Google says hackers have put ‘monitoring implants’ in iPhones for years | Technology | The Guardian" rel="nofollow" href="https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says">Google says hackers have put ‘monitoring implants’ in iPhones for years | Technology | The Guardian</a> &mdash; Their location was uploaded every minute; their device’s keychain, containing all their passwords, was uploaded, as were their chat histories on popular apps including WhatsApp, Telegram and iMessage, their address book, and their Gmail database.</li><li><a title="Project Zero: A very deep dive into iOS Exploit chains found in the wild" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html">Project Zero: A very deep dive into iOS Exploit chains found in the wild</a> &mdash; We discovered exploits for a total of fourteen vulnerabilities across the five exploit chains: seven for the iPhone’s web browser, five for the kernel and two separate sandbox escapes. </li><li><a title="Project Zero: In-the-wild iOS Exploit Chain 1" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-1.html">Project Zero: In-the-wild iOS Exploit Chain 1</a> &mdash; This exploit provides evidence that these exploit chains were likely written contemporaneously with their supported iOS versions; that is, the exploit techniques which were used suggest that this exploit was written around the time of iOS 10. This suggests that this group had a capability against a fully patched iPhone for at least two years.  </li><li><a title="Project Zero: In-the-wild iOS Exploit Chain 3" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-3.html">Project Zero: In-the-wild iOS Exploit Chain 3</a> &mdash; It’s difficult to understand how this error could be introduced into a core IPC library that shipped to end users. While errors are common in software development, a serious one like this should have quickly been found by a unit test, code review or even fuzzing. </li><li><a title="Project Zero: JSC Exploits" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/jsc-exploits.html">Project Zero: JSC Exploits</a> &mdash; In this post, we will take a look at the WebKit exploits used to gain an initial foothold onto the iOS device and stage the privilege escalation exploits. All exploits here achieve shellcode execution inside the sandboxed renderer process (WebContent) on iOS.</li><li><a title="Project Zero: Implant Teardown" rel="nofollow" href="https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html">Project Zero: Implant Teardown</a> &mdash; There is no visual indicator on the device that the implant is running. There's no way for a user on iOS to view a process listing, so the implant binary makes no attempt to hide its execution from the system. The implant is primarily focused on stealing files and uploading live location data. The implant requests commands from a command and control server every 60 seconds.The implant has access to all the database files (on the victim’s phone) used by popular end-to-end encryption apps like Whatsapp, Telegram and iMessage.</li><li><a title="iPhone Hackers Caught By Google Also Targeted Android And Microsoft Windows, Say Sources" rel="nofollow" href="https://www.forbes.com/sites/thomasbrewster/2019/09/01/iphone-hackers-caught-by-google-also-targeted-android-and-microsoft-windows-say-sources/#374244a44adf">iPhone Hackers Caught By Google Also Targeted Android And Microsoft Windows, Say Sources</a> &mdash; Multiple sources with knowledge of the situation said that Google’s own Android operating system and Microsoft Windows PCs were also targeted in a campaign that sought to infect the computers and smartphones of the Uighur ethnic group in China.</li><li><a title="Google&#39;s Shocking Decision To Ignore A Critical Android Vulnerability In Latest Security Update" rel="nofollow" href="https://www.forbes.com/sites/jeanbaptiste/2019/09/05/googles-shocking-decision-to-ignore-a-critical-android-vulnerability-in-its-latest-security-update/#5fa2487213bb">Google's Shocking Decision To Ignore A Critical Android Vulnerability In Latest Security Update</a> &mdash; Despite immediately acknowledging the vulnerability and confirming in June that it will be fixed, Google had not provided an estimated time frame for the patch.</li><li><a title="Android Zero-Day Bug Opens Door to Privilege Escalation Attack, Researchers Warn | Threatpost" rel="nofollow" href="https://threatpost.com/android-zero-day-bug-opens-door-to-privilege-escalation-attack-researchers-warn/148014/">Android Zero-Day Bug Opens Door to Privilege Escalation Attack, Researchers Warn | Threatpost</a> &mdash; “In the unlikely event an attacker succeeds in exploiting this bug, they would effectively have complete control over the target device,” he told Threatpost. Once an attacker obtains escalated privileges, “it means they could completely take over a device if they can convince a user to install and run their application,”</li><li><a title="Why &#39;Zero Day&#39; Android Hacking Now Costs More Than iOS Attacks | WIRED" rel="nofollow" href="https://www.wired.com/story/android-zero-day-more-than-ios-zerodium/">Why 'Zero Day' Android Hacking Now Costs More Than iOS Attacks | WIRED</a> &mdash; "During the last few months, we have observed an increase in the number of iOS exploits, mostly Safari and iMessage chains, being developed and sold by researchers from all around the world. The zero-day market is so flooded by iOS exploits that we've recently started refusing some them"</li><li><a title="Linux 5.4 Kernel To Bring Improved Load Balancing On AMD EPYC Servers" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-5.4-Improve-EPYC-Balance">Linux 5.4 Kernel To Bring Improved Load Balancing On AMD EPYC Servers</a> &mdash; The scheduler topology improvement by SUSE's Matt Fleming changes the behavior as currently it turns out for EPYC hardware the kernel has failed to properly load balance across NUMA nodes on different sockets. </li><li><a title="USB4 is coming soon and will (mostly) unify USB and Thunderbolt | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/usb4-is-coming-soon-and-will-mostly-unify-usb-and-thunderbolt/?comments=1&amp;start=40">USB4 is coming soon and will (mostly) unify USB and Thunderbolt | Ars Technica</a> &mdash; The USB Implementers Forum published the official USB4 protocol specification. If your initial reaction was "oh no, not again," don't worry—the new spec is backward-compatible with USB 2 and USB 3, and it uses the same USB Type-C connectors that modern USB 3 devices do.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>406: SACK Attack</title>
  <link>https://techsnap.systems/406</link>
  <guid isPermaLink="false">310be811-6d1b-4463-96f3-8fc9579a5d66</guid>
  <pubDate>Sun, 23 Jun 2019 18:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/310be811-6d1b-4463-96f3-8fc9579a5d66.mp3" length="31361276" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>A new vulnerability may be the next 'Ping of Death'; we explore the details of SACK Panic and break down what you need to know.</itunes:subtitle>
  <itunes:duration>43:33</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>A new vulnerability may be the next 'Ping of Death'; we explore the details of SACK Panic and break down what you need to know.
Plus Firefox zero days targeting Coinbase, the latest update on Rowhammer, and a few more reasons it's a great time to be a ZFS user. 
</description>
  <itunes:keywords>SACK Panic, TCP, networking, Linux, FreeBSD, security, mss, ping of death, rowhammer, rambleed, RAM, ECC, memory, DRAM, Firefox, backdoor, Mozilla, zero day, sandbox, sandbox escape, targeted attack, cryptocurrency, crypto, ZFS, OpenZFS, TRIM, SSD, encryption, raw send, device removal, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>A new vulnerability may be the next &#39;Ping of Death&#39;; we explore the details of SACK Panic and break down what you need to know.</p>

<p>Plus Firefox zero days targeting Coinbase, the latest update on Rowhammer, and a few more reasons it&#39;s a great time to be a ZFS user.</p><p>Links:</p><ul><li><a title="SACK Panic Security Bulletin" rel="nofollow" href="https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md">SACK Panic Security Bulletin</a> &mdash; Netflix has identified several TCP networking vulnerabilities in FreeBSD and Linux kernels. The vulnerabilities specifically relate to the Maximum Segment Size (MSS) and TCP Selective Acknowledgement (SACK) capabilities. The most serious, dubbed “SACK Panic,” allows a remotely-triggered kernel panic on recent Linux kernels.</li><li><a title="Ubuntu SACK Panic Guidance" rel="nofollow" href="https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic">Ubuntu SACK Panic Guidance</a> &mdash; You should update your kernel to the versions specified below in the Updates section and reboot. Alternatively, Canonical Livepatch updates will be available to mitigate these two issues without the need to reboot.
</li><li><a title="Red Hat SACK Panic Advisory" rel="nofollow" href="https://access.redhat.com/security/vulnerabilities/tcpsack">Red Hat SACK Panic Advisory</a> &mdash; Red Hat customers running affected versions of these Red Hat products are strongly recommended to update them as soon as errata are available. Customers are urged to apply the available updates immediately and enable the mitigations as they feel appropriate.   

</li><li><a title="RFC 2018 - TCP Selective Acknowledgment Options" rel="nofollow" href="https://tools.ietf.org/html/rfc2018">RFC 2018 - TCP Selective Acknowledgment Options</a> &mdash; TCP may experience poor performance when multiple packets are lost from one window of data. With the limited information available from cumulative acknowledgments, a TCP sender can only learn about a single lost packet per round trip time.  An aggressive sender could choose to retransmit packets early, but such retransmitted segments may have already been successfully received. A Selective Acknowledgment (SACK) mechanism, combined with a selective repeat retransmission policy, can help to overcome these limitations.</li><li><a title="Ping of Death" rel="nofollow" href="https://insecure.org/sploits/ping-o-death.html">Ping of Death</a> &mdash; In a nutshell, it is possible to crash, reboot or otherwise kill a large number of systems by sending a ping of a certain size from a remote machine.</li><li><a title="Firefox zero-day was used in attack against Coinbase employees, not its users | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/firefox-zero-day-was-used-in-attack-against-coinbase-employees-not-its-users/">Firefox zero-day was used in attack against Coinbase employees, not its users | ZDNet</a> &mdash; A recent Firefox zero-day that has made headlines across the tech news world this week was actually used in attacks against Coinbase employees, and not the company's users.</li><li><a title="Mozilla fixes second Firefox zero-day exploited in the wild | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/mozilla-fixes-second-firefox-zero-day-exploited-in-the-wild/">Mozilla fixes second Firefox zero-day exploited in the wild | ZDNet</a> &mdash; Mozilla has released a second security update this week to patch a second zero-day that was being exploited in the wild to attack Coinbase employees and other cryptocurrency organizations.

</li><li><a title="RAMBleed" rel="nofollow" href="https://rambleed.com/">RAMBleed</a> &mdash; RAMBleed is a side-channel attack that enables an attacker to read out physical memory belonging to other processes. The implications of violating arbitrary privilege boundaries are numerous, and vary in severity based on the other software running on the target machine. As an example, in our paper we demonstrate an attack against OpenSSH in which we use RAMBleed to leak a 2048 bit RSA key. </li><li><a title="Digging into the new features in OpenZFS post-Linux migration | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/06/zfs-features-bugfixes-0-8-1/">Digging into the new features in OpenZFS post-Linux migration | Ars Technica</a> &mdash; One of the most important new features in 0.8 is Native ZFS Encryption. Until now, ZFS users have relied on OS-provided encrypted filesystem layers either above or below ZFS. While this approach does work, it presented difficulties.</li><li><a title="Allan Jude on Twitter" rel="nofollow" href="https://twitter.com/allanjude/status/1138651704558346245">Allan Jude on Twitter</a> &mdash; Once the FreeBSDs are upstreamed, everything is changing to 'OpenZFS', including the github organization currently know as 'zfsonlinux'.</li><li><a title="ZFS on Linux Releases" rel="nofollow" href="https://github.com/zfsonlinux/zfs/releases">ZFS on Linux Releases</a></li><li><a title="Linux Academy is hiring! " rel="nofollow" href="https://jobs.lever.co/linuxacademy/">Linux Academy is hiring! </a></li><li><a title="Mozilla teases $5-per-month ad-free news subscription" rel="nofollow" href="https://www.theverge.com/2019/7/5/20683059/mozilla-news-subscription-service-ad-free-scroll-price">Mozilla teases $5-per-month ad-free news subscription</a> &mdash; Mozilla has started teasing an ad-free news subscription service, which, for $5 per month, would offer ad-free browsing, audio readouts, and cross-platform syncing of news articles from a number of websites.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>A new vulnerability may be the next &#39;Ping of Death&#39;; we explore the details of SACK Panic and break down what you need to know.</p>

<p>Plus Firefox zero days targeting Coinbase, the latest update on Rowhammer, and a few more reasons it&#39;s a great time to be a ZFS user.</p><p>Links:</p><ul><li><a title="SACK Panic Security Bulletin" rel="nofollow" href="https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md">SACK Panic Security Bulletin</a> &mdash; Netflix has identified several TCP networking vulnerabilities in FreeBSD and Linux kernels. The vulnerabilities specifically relate to the Maximum Segment Size (MSS) and TCP Selective Acknowledgement (SACK) capabilities. The most serious, dubbed “SACK Panic,” allows a remotely-triggered kernel panic on recent Linux kernels.</li><li><a title="Ubuntu SACK Panic Guidance" rel="nofollow" href="https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic">Ubuntu SACK Panic Guidance</a> &mdash; You should update your kernel to the versions specified below in the Updates section and reboot. Alternatively, Canonical Livepatch updates will be available to mitigate these two issues without the need to reboot.
</li><li><a title="Red Hat SACK Panic Advisory" rel="nofollow" href="https://access.redhat.com/security/vulnerabilities/tcpsack">Red Hat SACK Panic Advisory</a> &mdash; Red Hat customers running affected versions of these Red Hat products are strongly recommended to update them as soon as errata are available. Customers are urged to apply the available updates immediately and enable the mitigations as they feel appropriate.   

</li><li><a title="RFC 2018 - TCP Selective Acknowledgment Options" rel="nofollow" href="https://tools.ietf.org/html/rfc2018">RFC 2018 - TCP Selective Acknowledgment Options</a> &mdash; TCP may experience poor performance when multiple packets are lost from one window of data. With the limited information available from cumulative acknowledgments, a TCP sender can only learn about a single lost packet per round trip time.  An aggressive sender could choose to retransmit packets early, but such retransmitted segments may have already been successfully received. A Selective Acknowledgment (SACK) mechanism, combined with a selective repeat retransmission policy, can help to overcome these limitations.</li><li><a title="Ping of Death" rel="nofollow" href="https://insecure.org/sploits/ping-o-death.html">Ping of Death</a> &mdash; In a nutshell, it is possible to crash, reboot or otherwise kill a large number of systems by sending a ping of a certain size from a remote machine.</li><li><a title="Firefox zero-day was used in attack against Coinbase employees, not its users | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/firefox-zero-day-was-used-in-attack-against-coinbase-employees-not-its-users/">Firefox zero-day was used in attack against Coinbase employees, not its users | ZDNet</a> &mdash; A recent Firefox zero-day that has made headlines across the tech news world this week was actually used in attacks against Coinbase employees, and not the company's users.</li><li><a title="Mozilla fixes second Firefox zero-day exploited in the wild | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/mozilla-fixes-second-firefox-zero-day-exploited-in-the-wild/">Mozilla fixes second Firefox zero-day exploited in the wild | ZDNet</a> &mdash; Mozilla has released a second security update this week to patch a second zero-day that was being exploited in the wild to attack Coinbase employees and other cryptocurrency organizations.

</li><li><a title="RAMBleed" rel="nofollow" href="https://rambleed.com/">RAMBleed</a> &mdash; RAMBleed is a side-channel attack that enables an attacker to read out physical memory belonging to other processes. The implications of violating arbitrary privilege boundaries are numerous, and vary in severity based on the other software running on the target machine. As an example, in our paper we demonstrate an attack against OpenSSH in which we use RAMBleed to leak a 2048 bit RSA key. </li><li><a title="Digging into the new features in OpenZFS post-Linux migration | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/06/zfs-features-bugfixes-0-8-1/">Digging into the new features in OpenZFS post-Linux migration | Ars Technica</a> &mdash; One of the most important new features in 0.8 is Native ZFS Encryption. Until now, ZFS users have relied on OS-provided encrypted filesystem layers either above or below ZFS. While this approach does work, it presented difficulties.</li><li><a title="Allan Jude on Twitter" rel="nofollow" href="https://twitter.com/allanjude/status/1138651704558346245">Allan Jude on Twitter</a> &mdash; Once the FreeBSDs are upstreamed, everything is changing to 'OpenZFS', including the github organization currently know as 'zfsonlinux'.</li><li><a title="ZFS on Linux Releases" rel="nofollow" href="https://github.com/zfsonlinux/zfs/releases">ZFS on Linux Releases</a></li><li><a title="Linux Academy is hiring! " rel="nofollow" href="https://jobs.lever.co/linuxacademy/">Linux Academy is hiring! </a></li><li><a title="Mozilla teases $5-per-month ad-free news subscription" rel="nofollow" href="https://www.theverge.com/2019/7/5/20683059/mozilla-news-subscription-service-ad-free-scroll-price">Mozilla teases $5-per-month ad-free news subscription</a> &mdash; Mozilla has started teasing an ad-free news subscription service, which, for $5 per month, would offer ad-free browsing, audio readouts, and cross-platform syncing of news articles from a number of websites.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>403: Keeping Systems Simple</title>
  <link>https://techsnap.systems/403</link>
  <guid isPermaLink="false">e26c9e2a-3e0f-40b9-9875-d72821ee1792</guid>
  <pubDate>Fri, 10 May 2019 21:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/e26c9e2a-3e0f-40b9-9875-d72821ee1792.mp3" length="33509482" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We’re back from LinuxFest Northwest with an update on all things WireGuard, some VLAN myth busting, and the trade-offs of highly available systems.</itunes:subtitle>
  <itunes:duration>46:32</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We’re back from LinuxFest Northwest with an update on all things WireGuard, some VLAN myth busting, and the trade-offs of highly available systems. 
</description>
  <itunes:keywords>wireguard, vpn, openvpn, tinc, ipsec, lfnw, tunnel, ssh, mesh network, layer 3, tcp, udp, dhcp, ethernet, vlan, switch, router, firewall, kubernetes, linux, wintun, high availability, reliability, availability, disaster recovery, rto, rpo, security, quantum computers, cryptography, simplicity, SysAdmin podcast, subspace, zinc, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We’re back from LinuxFest Northwest with an update on all things WireGuard, some VLAN myth busting, and the trade-offs of highly available systems.</p><p>Links:</p><ul><li><a title="TechSNAP Episode 390: What’s Up with WireGuard" rel="nofollow" href="https://techsnap.systems/390">TechSNAP Episode 390: What’s Up with WireGuard</a></li><li><a title="WireGuard Sent Out Again For Review" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=WireGuard-V9-Maybe-Linux-5.2">WireGuard Sent Out Again For Review</a> &mdash; WireGuard lead developer Jason Donenfeld has sent out the ninth version of the WireGuard secure network tunnel patches for review. If this review goes well and lands in net-next in the weeks ahead, this long-awaited VPN improvement could make it into the mainline Linux 5.2 kernel. 
</li><li><a title="CloudFlare announces Warp VPN" rel="nofollow" href="https://securitybaron.com/news/cloudflare-warp-vpn/">CloudFlare announces Warp VPN</a> &mdash; Using Cloudflare’s existing network of servers, Internet users all over the world will be able to connect to Warp VPN through the 1.1.1.1 app. In the same vein, Warp VPN will not significantly increase battery usage by using an efficient protocol called WireGuard.</li><li><a title="CloudFlare Launches &quot;BoringTun&quot; As Rust-Written WireGuard User-Space Implementation - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=CloudFlare-BoringTun-WireGuard">CloudFlare Launches "BoringTun" As Rust-Written WireGuard User-Space Implementation - Phoronix</a> &mdash; CloudFlare took to creating BoringTun as they wanted a user-space solution as not to have to deal with kernel modules or satisfying certain kernel versions. They also wanted cross platform support and for their chosen implementation to be very fast, these choices which led them to writing a Rust-based solution. </li><li><a title="cloudflare/boringtun" rel="nofollow" href="https://github.com/cloudflare/boringtun">cloudflare/boringtun</a> &mdash; BoringTun is an implementation of the WireGuard® protocol designed for portability and speed.

</li><li><a title="VPN protocol WireGuard now has an official macOS app" rel="nofollow" href="https://techcrunch.com/2019/02/18/vpn-protocol-wireguard-now-has-an-official-macos-app/">VPN protocol WireGuard now has an official macOS app</a> &mdash; You can already download the WireGuard app on Android and iOS, but today’s release is all about macOS.</li><li><a title="WireGuard Windows Pre-Alpha" rel="nofollow" href="https://lists.zx2c4.com/pipermail/wireguard/2019-May/004126.html">WireGuard Windows Pre-Alpha</a> &mdash; I've been mostly absent these last weeks, due to being completely absorbed in Windows programming. I think we're finally getting to the state where we might really benefit from testing of the "pre-alpha".</li><li><a title="Wintun – Layer 3 TUN Driver for Windows" rel="nofollow" href="https://www.wintun.net/">Wintun – Layer 3 TUN Driver for Windows</a> &mdash; Wintun is a very simple and minimal TUN driver for the Windows kernel, which provides userspace programs with a simple network adapter for reading and writing packets. It is akin to Linux's /dev/net/tun and BSD's /dev/tun. </li><li><a title="WireGuard for Kubernetes: Introducing Gravitational Wormhole" rel="nofollow" href="https://gravitational.com/blog/announcing_wormhole/">WireGuard for Kubernetes: Introducing Gravitational Wormhole</a> &mdash; Wormhole is a Kubernetes network plugin that combines the simplicity of flannel with encrypted networking from WireGuard.</li><li><a title="gravitational/wormhole: Wireguard based overlay network CNI plugin for kubernetes" rel="nofollow" href="https://github.com/gravitational/wormhole#getting-started">gravitational/wormhole: Wireguard based overlay network CNI plugin for kubernetes</a></li><li><a title="NetworkManager 1.16" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=NetworkManager-1.16-Released">NetworkManager 1.16</a> &mdash; NetworkManager 1.16 is a big feature release bringing support for WireGuard VPN tunnels</li><li><a title="Portal Cloud - Subspace" rel="nofollow" href="https://portal.cloud/app/subspace">Portal Cloud - Subspace</a> &mdash; Subspace is an open source WireGuard® VPN server that supports connecting all of your devices to help secure your internet access.

</li><li><a title="subspacecloud/subspace" rel="nofollow" href="https://github.com/subspacecloud/subspace">subspacecloud/subspace</a> &mdash; A simple WireGuard VPN server GUI</li><li><a title="jimsalterjrs/wg-admin" rel="nofollow" href="https://github.com/jimsalterjrs/wg-admin">jimsalterjrs/wg-admin</a> &mdash; Simple CLI utilities to manage a WireGuard server</li><li><a title="5 big misconceptions about virtual LANs" rel="nofollow" href="https://www.pluralsight.com/blog/it-ops/5-big-misconceptions-about-virtual-lans-">5 big misconceptions about virtual LANs</a> &mdash; In the real world, VLANs are anything but simple.
</li><li><a title="High Availability vs. Fault Tolerance vs. Disaster Recovery" rel="nofollow" href="https://www.greenhousedata.com/blog/high-availability-vs-fault-tolerance-vs-disaster-recovery">High Availability vs. Fault Tolerance vs. Disaster Recovery</a> &mdash; You need IT infrastructure that you can count on even when you run into the rare network outage, equipment failure, or power issue. When your systems run into trouble, that’s where one or more of the three primary availability strategies will come into play: high availability, fault tolerance, and/or disaster recovery.</li><li><a title="High Availability: Concepts and Theory" rel="nofollow" href="https://hackernoon.com/high-availability-concepts-and-theory-980c58cbf87b">High Availability: Concepts and Theory</a> &mdash; Running server operations using clusters of either physical or virtual computers is all about improving both reliability and performance over and above what you could expect from a single, high-powered server. </li><li><a title="RPO and RTO: Understanding the Differences" rel="nofollow" href="https://www.enterprisestorageforum.com/storage-management/rpo-and-rto-understanding-the-differences.html">RPO and RTO: Understanding the Differences</a> &mdash; Recovery time objective refers to how much time an application can be down without causing significant damage to the business. Recovery point objectives refer to your company’s loss tolerance: the amount of data that can be lost before significant harm to the business occurs.</li><li><a title="JupiterBroadcasting/Talks" rel="nofollow" href="https://github.com/JupiterBroadcasting/Talks">JupiterBroadcasting/Talks</a> &mdash; Public repository of crew talks, slides, and additional resources.</li><li><a title="Command Line Threat Hunting" rel="nofollow" href="https://www.meetup.com/jupiterbroadcasting/events/260707829/">Command Line Threat Hunting</a> &mdash; That viruses and malware are Windows problems is a misnomer that is often propagated through the Linux community and it's an easy one to believe until you start noticing strange behavior on your system. What do you do next? Join Ell Marquez and Tony Lambert in discussing a common sense approach to threat detection using only command line tools.</li><li><a title="Fear the Man in the Middle? This company wants to sell quantum key distribution" rel="nofollow" href="https://arstechnica.com/gadgets/2019/04/fear-the-man-in-the-middle-this-company-wants-to-sell-quantum-key-distribution/">Fear the Man in the Middle? This company wants to sell quantum key distribution</a> &mdash; For now, Quantum XChange has only said about a dozen companies are part of the pilot. But with the appetite for quantum solutions in the US increasing—the National Quantum Initiative was just signed into law at the end of 2018 to advance the tech—this could be an opportune time to enter the market, so long as the service lives up to its billing.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We’re back from LinuxFest Northwest with an update on all things WireGuard, some VLAN myth busting, and the trade-offs of highly available systems.</p><p>Links:</p><ul><li><a title="TechSNAP Episode 390: What’s Up with WireGuard" rel="nofollow" href="https://techsnap.systems/390">TechSNAP Episode 390: What’s Up with WireGuard</a></li><li><a title="WireGuard Sent Out Again For Review" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=WireGuard-V9-Maybe-Linux-5.2">WireGuard Sent Out Again For Review</a> &mdash; WireGuard lead developer Jason Donenfeld has sent out the ninth version of the WireGuard secure network tunnel patches for review. If this review goes well and lands in net-next in the weeks ahead, this long-awaited VPN improvement could make it into the mainline Linux 5.2 kernel. 
</li><li><a title="CloudFlare announces Warp VPN" rel="nofollow" href="https://securitybaron.com/news/cloudflare-warp-vpn/">CloudFlare announces Warp VPN</a> &mdash; Using Cloudflare’s existing network of servers, Internet users all over the world will be able to connect to Warp VPN through the 1.1.1.1 app. In the same vein, Warp VPN will not significantly increase battery usage by using an efficient protocol called WireGuard.</li><li><a title="CloudFlare Launches &quot;BoringTun&quot; As Rust-Written WireGuard User-Space Implementation - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=CloudFlare-BoringTun-WireGuard">CloudFlare Launches "BoringTun" As Rust-Written WireGuard User-Space Implementation - Phoronix</a> &mdash; CloudFlare took to creating BoringTun as they wanted a user-space solution as not to have to deal with kernel modules or satisfying certain kernel versions. They also wanted cross platform support and for their chosen implementation to be very fast, these choices which led them to writing a Rust-based solution. </li><li><a title="cloudflare/boringtun" rel="nofollow" href="https://github.com/cloudflare/boringtun">cloudflare/boringtun</a> &mdash; BoringTun is an implementation of the WireGuard® protocol designed for portability and speed.

</li><li><a title="VPN protocol WireGuard now has an official macOS app" rel="nofollow" href="https://techcrunch.com/2019/02/18/vpn-protocol-wireguard-now-has-an-official-macos-app/">VPN protocol WireGuard now has an official macOS app</a> &mdash; You can already download the WireGuard app on Android and iOS, but today’s release is all about macOS.</li><li><a title="WireGuard Windows Pre-Alpha" rel="nofollow" href="https://lists.zx2c4.com/pipermail/wireguard/2019-May/004126.html">WireGuard Windows Pre-Alpha</a> &mdash; I've been mostly absent these last weeks, due to being completely absorbed in Windows programming. I think we're finally getting to the state where we might really benefit from testing of the "pre-alpha".</li><li><a title="Wintun – Layer 3 TUN Driver for Windows" rel="nofollow" href="https://www.wintun.net/">Wintun – Layer 3 TUN Driver for Windows</a> &mdash; Wintun is a very simple and minimal TUN driver for the Windows kernel, which provides userspace programs with a simple network adapter for reading and writing packets. It is akin to Linux's /dev/net/tun and BSD's /dev/tun. </li><li><a title="WireGuard for Kubernetes: Introducing Gravitational Wormhole" rel="nofollow" href="https://gravitational.com/blog/announcing_wormhole/">WireGuard for Kubernetes: Introducing Gravitational Wormhole</a> &mdash; Wormhole is a Kubernetes network plugin that combines the simplicity of flannel with encrypted networking from WireGuard.</li><li><a title="gravitational/wormhole: Wireguard based overlay network CNI plugin for kubernetes" rel="nofollow" href="https://github.com/gravitational/wormhole#getting-started">gravitational/wormhole: Wireguard based overlay network CNI plugin for kubernetes</a></li><li><a title="NetworkManager 1.16" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=NetworkManager-1.16-Released">NetworkManager 1.16</a> &mdash; NetworkManager 1.16 is a big feature release bringing support for WireGuard VPN tunnels</li><li><a title="Portal Cloud - Subspace" rel="nofollow" href="https://portal.cloud/app/subspace">Portal Cloud - Subspace</a> &mdash; Subspace is an open source WireGuard® VPN server that supports connecting all of your devices to help secure your internet access.

</li><li><a title="subspacecloud/subspace" rel="nofollow" href="https://github.com/subspacecloud/subspace">subspacecloud/subspace</a> &mdash; A simple WireGuard VPN server GUI</li><li><a title="jimsalterjrs/wg-admin" rel="nofollow" href="https://github.com/jimsalterjrs/wg-admin">jimsalterjrs/wg-admin</a> &mdash; Simple CLI utilities to manage a WireGuard server</li><li><a title="5 big misconceptions about virtual LANs" rel="nofollow" href="https://www.pluralsight.com/blog/it-ops/5-big-misconceptions-about-virtual-lans-">5 big misconceptions about virtual LANs</a> &mdash; In the real world, VLANs are anything but simple.
</li><li><a title="High Availability vs. Fault Tolerance vs. Disaster Recovery" rel="nofollow" href="https://www.greenhousedata.com/blog/high-availability-vs-fault-tolerance-vs-disaster-recovery">High Availability vs. Fault Tolerance vs. Disaster Recovery</a> &mdash; You need IT infrastructure that you can count on even when you run into the rare network outage, equipment failure, or power issue. When your systems run into trouble, that’s where one or more of the three primary availability strategies will come into play: high availability, fault tolerance, and/or disaster recovery.</li><li><a title="High Availability: Concepts and Theory" rel="nofollow" href="https://hackernoon.com/high-availability-concepts-and-theory-980c58cbf87b">High Availability: Concepts and Theory</a> &mdash; Running server operations using clusters of either physical or virtual computers is all about improving both reliability and performance over and above what you could expect from a single, high-powered server. </li><li><a title="RPO and RTO: Understanding the Differences" rel="nofollow" href="https://www.enterprisestorageforum.com/storage-management/rpo-and-rto-understanding-the-differences.html">RPO and RTO: Understanding the Differences</a> &mdash; Recovery time objective refers to how much time an application can be down without causing significant damage to the business. Recovery point objectives refer to your company’s loss tolerance: the amount of data that can be lost before significant harm to the business occurs.</li><li><a title="JupiterBroadcasting/Talks" rel="nofollow" href="https://github.com/JupiterBroadcasting/Talks">JupiterBroadcasting/Talks</a> &mdash; Public repository of crew talks, slides, and additional resources.</li><li><a title="Command Line Threat Hunting" rel="nofollow" href="https://www.meetup.com/jupiterbroadcasting/events/260707829/">Command Line Threat Hunting</a> &mdash; That viruses and malware are Windows problems is a misnomer that is often propagated through the Linux community and it's an easy one to believe until you start noticing strange behavior on your system. What do you do next? Join Ell Marquez and Tony Lambert in discussing a common sense approach to threat detection using only command line tools.</li><li><a title="Fear the Man in the Middle? This company wants to sell quantum key distribution" rel="nofollow" href="https://arstechnica.com/gadgets/2019/04/fear-the-man-in-the-middle-this-company-wants-to-sell-quantum-key-distribution/">Fear the Man in the Middle? This company wants to sell quantum key distribution</a> &mdash; For now, Quantum XChange has only said about a dozen companies are part of the pilot. But with the appetite for quantum solutions in the US increasing—the National Quantum Initiative was just signed into law at the end of 2018 to advance the tech—this could be an opportune time to enter the market, so long as the service lives up to its billing.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>401: Everyday ZFS</title>
  <link>https://techsnap.systems/401</link>
  <guid isPermaLink="false">ea1f89db-e748-47fd-b288-833a330704ce</guid>
  <pubDate>Thu, 11 Apr 2019 22:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/ea1f89db-e748-47fd-b288-833a330704ce.mp3" length="34263376" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Jim and Wes sit down to bust some ZFS myths and share their tips and tricks for getting the most out of the ultimate filesystem.</itunes:subtitle>
  <itunes:duration>47:35</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Jim and Wes sit down to bust some ZFS myths and share their tips and tricks for getting the most out of the ultimate filesystem.
Plus when not to use ZFS, the surprising way your disks are lying to you, and more! 
</description>
  <itunes:keywords>zfs, vdez, filesystems, sun microsystems, backups, snapshots, copy on write, throughput, iops, linux, GPL, CDDL, ZFS on Linux, ZoL, ashift, SSD, techSNAP, sysadmin podcast, DevOps, data integrity, checksum, ECC, hard drives, hard disks, FreeBSD, OpenZF S, Solaris, RAID, raidz, zfs on root, ubuntu, copyleft</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Jim and Wes sit down to bust some ZFS myths and share their tips and tricks for getting the most out of the ultimate filesystem.</p>

<p>Plus when not to use ZFS, the surprising way your disks are lying to you, and more!</p><p>Links:</p><ul><li><a title="ZFS - Ubuntu Wiki" rel="nofollow" href="https://wiki.ubuntu.com/ZFS">ZFS - Ubuntu Wiki</a> &mdash; ZFS is a combined file system and logical volume manager designed and implemented by a team at Sun Microsystems led by Jeff Bonwick and Matthew Ahrens.</li><li><a title="Performance tuning - OpenZFS" rel="nofollow" href="http://open-zfs.org/wiki/Performance_tuning#Alignment_shift">Performance tuning - OpenZFS</a> &mdash; Make sure that you create your pools such that the vdevs have the correct alignment shift for your storage device's size. if dealing with flash media, this is going to be either 12 (4K sectors) or 13 (8K sectors).</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Jim and Wes sit down to bust some ZFS myths and share their tips and tricks for getting the most out of the ultimate filesystem.</p>

<p>Plus when not to use ZFS, the surprising way your disks are lying to you, and more!</p><p>Links:</p><ul><li><a title="ZFS - Ubuntu Wiki" rel="nofollow" href="https://wiki.ubuntu.com/ZFS">ZFS - Ubuntu Wiki</a> &mdash; ZFS is a combined file system and logical volume manager designed and implemented by a team at Sun Microsystems led by Jeff Bonwick and Matthew Ahrens.</li><li><a title="Performance tuning - OpenZFS" rel="nofollow" href="http://open-zfs.org/wiki/Performance_tuning#Alignment_shift">Performance tuning - OpenZFS</a> &mdash; Make sure that you create your pools such that the vdevs have the correct alignment shift for your storage device's size. if dealing with flash media, this is going to be either 12 (4K sectors) or 13 (8K sectors).</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>400: Supply Chain Attacks</title>
  <link>https://techsnap.systems/400</link>
  <guid isPermaLink="false">c46ae690-b668-4708-a781-8e923bc4baf4</guid>
  <pubDate>Thu, 28 Mar 2019 20:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/c46ae690-b668-4708-a781-8e923bc4baf4.mp3" length="23436770" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We break down the ASUS Live Update backdoor and explore why these kinds of supply chain attacks are on the rise.</itunes:subtitle>
  <itunes:duration>32:33</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We break down the ASUS Live Update backdoor and explore why these kinds of supply chain attacks are on the rise.
Plus an update from the linux vendor firmware service, your feedback, and more! 
</description>
  <itunes:keywords>ASUS, ASUS Malware, ShadowHammer, ASUS Live Update firmware, shadowpad, cccleaner, badusb, ssd firmware, microcontroller, reflections on trusting trust, compiler, c runtime, UEFI, BIOS, intel management engine, machine learning, unsupervised learning, malware, backdoor, command and control server, mac address, windows, linux, linux vendor firmware service, fwupd, package managers, node, npm, python, pypi, ken thompson, supply chain, supply chain attacks, gigabyte, hardware manufacturers, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We break down the ASUS Live Update backdoor and explore why these kinds of supply chain attacks are on the rise.</p>

<p>Plus an update from the linux vendor firmware service, your feedback, and more!</p><p>Links:</p><ul><li><a title="Joren Verspeurt on Twitter" rel="nofollow" href="https://twitter.com/JorenYuuji/status/1109040022341275648">Joren Verspeurt on Twitter</a> &mdash; The explanation you gave for unsupervised wasn't correct, that was just using a net that was trained in a supervised way. Unsupervised learning doesn't involve labels at all. A good example: clustering. You say "there are x clusters" and it learns a way of grouping similar items.</li><li><a title="Hackers Hijacked ASUS Software Updates to Install Backdoors on Thousands of Computers" rel="nofollow" href="https://motherboard.vice.com/en_us/article/pan9wn/hackers-hijacked-asus-software-updates-to-install-backdoors-on-thousands-of-computers">Hackers Hijacked ASUS Software Updates to Install Backdoors on Thousands of Computers</a> &mdash; The researchers estimate half a million Windows machines received the malicious backdoor through the ASUS update server, although the attackers appear to have been targeting only about 600 of those systems.</li><li><a title="Malicious updates for ASUS laptops" rel="nofollow" href="https://www.kaspersky.com/blog/shadow-hammer-teaser/26149/">Malicious updates for ASUS laptops</a> &mdash; A threat actor modified the ASUS Live Update Utility, which delivers BIOS, UEFI, and software updates to ASUS laptops and desktops, added a back door to the utility, and then distributed it to users through official channels.</li><li><a title="Asus Live Update Patch Now Availabile" rel="nofollow" href="https://www.theregister.co.uk/2019/03/26/asus_live_update_patch/">Asus Live Update Patch Now Availabile</a> &mdash; Asus has emitted a non-spyware-riddled version of Live Update for people to install on its notebooks, which includes extra security features to hopefully detect any future tampering.</li><li><a title="ASUS response to the recent media reports regarding ASUS Live Update tool attack by Advanced Persistent Threat (APT) groups" rel="nofollow" href="https://www.asus.com/News/hqfgVUyZ6uyAyJe1">ASUS response to the recent media reports regarding ASUS Live Update tool attack by Advanced Persistent Threat (APT) groups</a> &mdash; ASUS has also implemented a fix in the latest version (ver. 3.6.8) of the Live Update software, introduced multiple security verification mechanisms to prevent any malicious manipulation in the form of software updates or other means, and implemented an enhanced end-to-end encryption mechanism. At the same time, we have also updated and strengthened our server-to-end-user software architecture to prevent similar attacks from happening in the future.</li><li><a title="The Messy Truth About Infiltrating Computer Supply Chains" rel="nofollow" href="https://theintercept.com/2019/01/24/computer-supply-chain-attacks/">The Messy Truth About Infiltrating Computer Supply Chains</a> &mdash; The Defense Intelligence Agency believed that China’s capability at exploiting the BIOS “reflects a qualitative leap forward in exploitation that is difficult to detect”</li><li><a title="Inside the Unnerving CCleaner Supply Chain Attack" rel="nofollow" href="https://www.wired.com/story/inside-the-unnerving-supply-chain-attack-that-corrupted-ccleaner/">Inside the Unnerving CCleaner Supply Chain Attack</a> &mdash; Security researchers at Cisco Talos and Morphisec made a worst nightmare-type disclosure: the ubiquitous computer cleanup tool CCleaner had been compromised by hackers for more than a month. The software updates users were downloading from CCleaner owner Avast—a security company itself—had been tainted with a malware backdoor. The incident exposed millions of computers and reinforced the threat of so-called digital supply chain attacks, situations where trusted, widely distributed software is actually infected by malicious code.</li><li><a title="ShadowPad: How Attackers hide Backdoor in Software used by Hundreds of Large Companies around the World" rel="nofollow" href="https://www.kaspersky.com/about/press-releases/2017_shadowpad-how-attackers-hide-backdoor-in-software-used-by-hundreds-of-large-companies-around-the-world">ShadowPad: How Attackers hide Backdoor in Software used by Hundreds of Large Companies around the World</a> &mdash; ShadowPad is an example of how dangerous and wide-scale a successful supply-chain attack can be. Given the opportunities for reach and data collection it gives to the attackers, most likely it will be reproduced again and again with some other widely used software component. </li><li><a title="Gaming industry still in the scope of attackers in Asia" rel="nofollow" href="https://www.welivesecurity.com/2019/03/11/gaming-industry-scope-attackers-asia/">Gaming industry still in the scope of attackers in Asia</a> &mdash; Yet again, new supply-chain attacks recently caught the attention of ESET Researchers. This time, two games and one gaming platform application were compromised to include a backdoor.</li><li><a title="Microsoft Security Intelligence Report Volume 24 is now available" rel="nofollow" href="https://www.microsoft.com/security/blog/2019/02/28/microsoft-security-intelligence-report-volume-24-is-now-available/">Microsoft Security Intelligence Report Volume 24 is now available</a> &mdash; Software supply chain attacks are another trend that Microsoft has been tracking for several years. One supply chain tactic used by attackers is to incorporate a compromised component into a legitimate application or update package, which then is distributed to the users via the software. These attacks can be very difficult to detect because they take advantage of the trust that users have in their software vendors. The report includes several examples, including the Dofoil campaign, which illustrates how wide-reaching these types of attacks are and what we are doing to prevent and respond to them.</li><li><a title="Microsoft Security Intelligence Report Volume 24" rel="nofollow" href="https://clouddamcdnprodep.azureedge.net/gdc/gdcVAOQd7/original">Microsoft Security Intelligence Report Volume 24</a></li><li><a title="Supply Chain Attacks Spiked 78 Percent in 2018" rel="nofollow" href="https://www.nextgov.com/cybersecurity/2019/02/supply-chain-attacks-spiked-78-percent-2018-cyber-researchers-found/154996/">Supply Chain Attacks Spiked 78 Percent in 2018</a></li><li><a title="Supply Chain Security: A Talk by Bunnie Huang" rel="nofollow" href="https://www.bunniestudios.com/blog/?p=5519">Supply Chain Security: A Talk by Bunnie Huang</a> &mdash; I recently gave an invited talk about supply chain security at BlueHat IL 2019. I was a bit surprised at the level of interest it received, so I thought I’d share it here for people who might have missed it.</li><li><a title="Attack inception: Compromised supply chain within a supply chain poses new risk" rel="nofollow" href="https://www.microsoft.com/security/blog/2018/07/26/attack-inception-compromised-supply-chain-within-a-supply-chain-poses-new-risks/">Attack inception: Compromised supply chain within a supply chain poses new risk</a> &mdash; The plot twist: The app vendor’s systems were unaffected. The compromise was traceable instead to a second software vendor that hosted additional packages used by the app during installation. This turned out be an interesting and unique case of an attack involving “the supply chain of the supply chain”.</li><li><a title="Supply Chain Attacks and Secure Software Updates" rel="nofollow" href="https://paragonie.com/blog/2017/09/supply-chain-attacks-and-secure-software-updates">Supply Chain Attacks and Secure Software Updates</a> &mdash; In general, a supply chain attack involves first hacking a trusted third party who provides a product or service to your target, and then using your newly acquired, privileged position to compromise your intended target.</li><li><a title="Bad USB, Very Bad USB" rel="nofollow" href="https://lmgsecurity.com/bad-usb-very-bad-usb/">Bad USB, Very Bad USB</a> &mdash; The best defense for this type of attack is to only use devices that do not have reprogrammable firmware. Outside of this, it is important to only use USB drives that you trust completely, because after plugging in an untrusted device, you will never know if there is an invisible threat running on your computer.</li><li><a title="Reflections on Trusting Trust by Ken Thompson" rel="nofollow" href="https://dl.acm.org/citation.cfm?id=358210">Reflections on Trusting Trust by Ken Thompson</a></li><li><a title="LVFS Project Announcement - The Linux Foundation" rel="nofollow" href="https://www.linuxfoundation.org/blog/2019/03/lvfs-project-announcement/">LVFS Project Announcement - The Linux Foundation</a> &mdash; The Linux Foundation welcomes the Linux Vendor Firmware Service (LVFS) as a new project. LVFS is a secure website that allows hardware vendors to upload firmware updates. It’s used by all major Linux distributions to provide metadata for clients, such as fwupdmgr, GNOME Software and KDE Discover.</li><li><a title="LVFS: Vendor Status" rel="nofollow" href="https://fwupd.org/vendorlist">LVFS: Vendor Status</a></li><li><a title="Two new supply-chain attacks come to light in less than a week" rel="nofollow" href="https://arstechnica.com/information-technology/2018/10/two-new-supply-chain-attacks-come-to-light-in-less-than-a-week/">Two new supply-chain attacks come to light in less than a week</a> &mdash; Called “Colourama,” the package looked similar to Colorama, which is one of the top-20 most-downloaded legitimate modules in the Python repository. The doppelgänger Colourama package contained most of the legitimate functions of the legitimate module, with one significant difference: Colourama added code that, when run on Windows servers, installed a Visual Basic script.</li><li><a title="Malicious code found in npm package event-stream downloaded 8 million times in the past 2.5 months" rel="nofollow" href="https://snyk.io/blog/malicious-code-found-in-npm-package-event-stream/">Malicious code found in npm package event-stream downloaded 8 million times in the past 2.5 months</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We break down the ASUS Live Update backdoor and explore why these kinds of supply chain attacks are on the rise.</p>

<p>Plus an update from the linux vendor firmware service, your feedback, and more!</p><p>Links:</p><ul><li><a title="Joren Verspeurt on Twitter" rel="nofollow" href="https://twitter.com/JorenYuuji/status/1109040022341275648">Joren Verspeurt on Twitter</a> &mdash; The explanation you gave for unsupervised wasn't correct, that was just using a net that was trained in a supervised way. Unsupervised learning doesn't involve labels at all. A good example: clustering. You say "there are x clusters" and it learns a way of grouping similar items.</li><li><a title="Hackers Hijacked ASUS Software Updates to Install Backdoors on Thousands of Computers" rel="nofollow" href="https://motherboard.vice.com/en_us/article/pan9wn/hackers-hijacked-asus-software-updates-to-install-backdoors-on-thousands-of-computers">Hackers Hijacked ASUS Software Updates to Install Backdoors on Thousands of Computers</a> &mdash; The researchers estimate half a million Windows machines received the malicious backdoor through the ASUS update server, although the attackers appear to have been targeting only about 600 of those systems.</li><li><a title="Malicious updates for ASUS laptops" rel="nofollow" href="https://www.kaspersky.com/blog/shadow-hammer-teaser/26149/">Malicious updates for ASUS laptops</a> &mdash; A threat actor modified the ASUS Live Update Utility, which delivers BIOS, UEFI, and software updates to ASUS laptops and desktops, added a back door to the utility, and then distributed it to users through official channels.</li><li><a title="Asus Live Update Patch Now Availabile" rel="nofollow" href="https://www.theregister.co.uk/2019/03/26/asus_live_update_patch/">Asus Live Update Patch Now Availabile</a> &mdash; Asus has emitted a non-spyware-riddled version of Live Update for people to install on its notebooks, which includes extra security features to hopefully detect any future tampering.</li><li><a title="ASUS response to the recent media reports regarding ASUS Live Update tool attack by Advanced Persistent Threat (APT) groups" rel="nofollow" href="https://www.asus.com/News/hqfgVUyZ6uyAyJe1">ASUS response to the recent media reports regarding ASUS Live Update tool attack by Advanced Persistent Threat (APT) groups</a> &mdash; ASUS has also implemented a fix in the latest version (ver. 3.6.8) of the Live Update software, introduced multiple security verification mechanisms to prevent any malicious manipulation in the form of software updates or other means, and implemented an enhanced end-to-end encryption mechanism. At the same time, we have also updated and strengthened our server-to-end-user software architecture to prevent similar attacks from happening in the future.</li><li><a title="The Messy Truth About Infiltrating Computer Supply Chains" rel="nofollow" href="https://theintercept.com/2019/01/24/computer-supply-chain-attacks/">The Messy Truth About Infiltrating Computer Supply Chains</a> &mdash; The Defense Intelligence Agency believed that China’s capability at exploiting the BIOS “reflects a qualitative leap forward in exploitation that is difficult to detect”</li><li><a title="Inside the Unnerving CCleaner Supply Chain Attack" rel="nofollow" href="https://www.wired.com/story/inside-the-unnerving-supply-chain-attack-that-corrupted-ccleaner/">Inside the Unnerving CCleaner Supply Chain Attack</a> &mdash; Security researchers at Cisco Talos and Morphisec made a worst nightmare-type disclosure: the ubiquitous computer cleanup tool CCleaner had been compromised by hackers for more than a month. The software updates users were downloading from CCleaner owner Avast—a security company itself—had been tainted with a malware backdoor. The incident exposed millions of computers and reinforced the threat of so-called digital supply chain attacks, situations where trusted, widely distributed software is actually infected by malicious code.</li><li><a title="ShadowPad: How Attackers hide Backdoor in Software used by Hundreds of Large Companies around the World" rel="nofollow" href="https://www.kaspersky.com/about/press-releases/2017_shadowpad-how-attackers-hide-backdoor-in-software-used-by-hundreds-of-large-companies-around-the-world">ShadowPad: How Attackers hide Backdoor in Software used by Hundreds of Large Companies around the World</a> &mdash; ShadowPad is an example of how dangerous and wide-scale a successful supply-chain attack can be. Given the opportunities for reach and data collection it gives to the attackers, most likely it will be reproduced again and again with some other widely used software component. </li><li><a title="Gaming industry still in the scope of attackers in Asia" rel="nofollow" href="https://www.welivesecurity.com/2019/03/11/gaming-industry-scope-attackers-asia/">Gaming industry still in the scope of attackers in Asia</a> &mdash; Yet again, new supply-chain attacks recently caught the attention of ESET Researchers. This time, two games and one gaming platform application were compromised to include a backdoor.</li><li><a title="Microsoft Security Intelligence Report Volume 24 is now available" rel="nofollow" href="https://www.microsoft.com/security/blog/2019/02/28/microsoft-security-intelligence-report-volume-24-is-now-available/">Microsoft Security Intelligence Report Volume 24 is now available</a> &mdash; Software supply chain attacks are another trend that Microsoft has been tracking for several years. One supply chain tactic used by attackers is to incorporate a compromised component into a legitimate application or update package, which then is distributed to the users via the software. These attacks can be very difficult to detect because they take advantage of the trust that users have in their software vendors. The report includes several examples, including the Dofoil campaign, which illustrates how wide-reaching these types of attacks are and what we are doing to prevent and respond to them.</li><li><a title="Microsoft Security Intelligence Report Volume 24" rel="nofollow" href="https://clouddamcdnprodep.azureedge.net/gdc/gdcVAOQd7/original">Microsoft Security Intelligence Report Volume 24</a></li><li><a title="Supply Chain Attacks Spiked 78 Percent in 2018" rel="nofollow" href="https://www.nextgov.com/cybersecurity/2019/02/supply-chain-attacks-spiked-78-percent-2018-cyber-researchers-found/154996/">Supply Chain Attacks Spiked 78 Percent in 2018</a></li><li><a title="Supply Chain Security: A Talk by Bunnie Huang" rel="nofollow" href="https://www.bunniestudios.com/blog/?p=5519">Supply Chain Security: A Talk by Bunnie Huang</a> &mdash; I recently gave an invited talk about supply chain security at BlueHat IL 2019. I was a bit surprised at the level of interest it received, so I thought I’d share it here for people who might have missed it.</li><li><a title="Attack inception: Compromised supply chain within a supply chain poses new risk" rel="nofollow" href="https://www.microsoft.com/security/blog/2018/07/26/attack-inception-compromised-supply-chain-within-a-supply-chain-poses-new-risks/">Attack inception: Compromised supply chain within a supply chain poses new risk</a> &mdash; The plot twist: The app vendor’s systems were unaffected. The compromise was traceable instead to a second software vendor that hosted additional packages used by the app during installation. This turned out be an interesting and unique case of an attack involving “the supply chain of the supply chain”.</li><li><a title="Supply Chain Attacks and Secure Software Updates" rel="nofollow" href="https://paragonie.com/blog/2017/09/supply-chain-attacks-and-secure-software-updates">Supply Chain Attacks and Secure Software Updates</a> &mdash; In general, a supply chain attack involves first hacking a trusted third party who provides a product or service to your target, and then using your newly acquired, privileged position to compromise your intended target.</li><li><a title="Bad USB, Very Bad USB" rel="nofollow" href="https://lmgsecurity.com/bad-usb-very-bad-usb/">Bad USB, Very Bad USB</a> &mdash; The best defense for this type of attack is to only use devices that do not have reprogrammable firmware. Outside of this, it is important to only use USB drives that you trust completely, because after plugging in an untrusted device, you will never know if there is an invisible threat running on your computer.</li><li><a title="Reflections on Trusting Trust by Ken Thompson" rel="nofollow" href="https://dl.acm.org/citation.cfm?id=358210">Reflections on Trusting Trust by Ken Thompson</a></li><li><a title="LVFS Project Announcement - The Linux Foundation" rel="nofollow" href="https://www.linuxfoundation.org/blog/2019/03/lvfs-project-announcement/">LVFS Project Announcement - The Linux Foundation</a> &mdash; The Linux Foundation welcomes the Linux Vendor Firmware Service (LVFS) as a new project. LVFS is a secure website that allows hardware vendors to upload firmware updates. It’s used by all major Linux distributions to provide metadata for clients, such as fwupdmgr, GNOME Software and KDE Discover.</li><li><a title="LVFS: Vendor Status" rel="nofollow" href="https://fwupd.org/vendorlist">LVFS: Vendor Status</a></li><li><a title="Two new supply-chain attacks come to light in less than a week" rel="nofollow" href="https://arstechnica.com/information-technology/2018/10/two-new-supply-chain-attacks-come-to-light-in-less-than-a-week/">Two new supply-chain attacks come to light in less than a week</a> &mdash; Called “Colourama,” the package looked similar to Colorama, which is one of the top-20 most-downloaded legitimate modules in the Python repository. The doppelgänger Colourama package contained most of the legitimate functions of the legitimate module, with one significant difference: Colourama added code that, when run on Windows servers, installed a Visual Basic script.</li><li><a title="Malicious code found in npm package event-stream downloaded 8 million times in the past 2.5 months" rel="nofollow" href="https://snyk.io/blog/malicious-code-found-in-npm-package-event-stream/">Malicious code found in npm package event-stream downloaded 8 million times in the past 2.5 months</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>396: Floating Point Problems</title>
  <link>https://techsnap.systems/396</link>
  <guid isPermaLink="false">bc968a3f-c804-4203-ae2b-dc43ef919218</guid>
  <pubDate>Thu, 31 Jan 2019 20:45:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/bc968a3f-c804-4203-ae2b-dc43ef919218.mp3" length="19582037" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Jim and Wes are joined by OpenZFS developer Richard Yao to explain why the recent drama over Linux kernel 5.0 is no big deal, and how his fix for the underlying issue might actually make things faster.</itunes:subtitle>
  <itunes:duration>27:11</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Jim and Wes are joined by OpenZFS developer Richard Yao to explain why the recent drama over Linux kernel 5.0 is no big deal, and how his fix for the underlying issue might actually make things faster.
Plus the nitty-gritty details of vectorized optimizations and kernel preemption, and our thoughts on the future of the relationship between ZFS and Linux. Special Guest: Richard Yao.
</description>
  <itunes:keywords>GPL, CDDL, Oracle, FPU, SIMD, vectorized instructions, AVX, hardware acceleration, journaling, data integrity, LFNW, floating point, checksum, snapshot, clone, FreeBSD, kernel module, header, software license, Linux, Multitasking, kernel preemption, OpenZFS, ZFS, ZoL, ZFS on Linux, Storage, RAID, ZVOL, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Jim and Wes are joined by OpenZFS developer Richard Yao to explain why the recent drama over Linux kernel 5.0 is no big deal, and how his fix for the underlying issue might actually make things faster.</p>

<p>Plus the nitty-gritty details of vectorized optimizations and kernel preemption, and our thoughts on the future of the relationship between ZFS and Linux.</p><p>Special Guest: Richard Yao.</p><p>Links:</p><ul><li><a title="LinuxFest Northwest 2019" rel="nofollow" href="https://linuxfestnorthwest.org/conferences/2019">LinuxFest Northwest 2019</a> &mdash; Join a bunch of JB hosts and community celebrating the 20th anniversary! </li><li><a title="Choose Linux" rel="nofollow" href="https://chooselinux.show/">Choose Linux</a> &mdash; The show that captures the excitement of discovering Linux.</li><li><a title="Linux 5.0: _kernel_fpu{begin,end} no longer exported" rel="nofollow" href="https://github.com/zfsonlinux/zfs/issues/8259">Linux 5.0: _kernel_fpu{begin,end} no longer exported</a> &mdash; The latest kernels removed the old compatibility headers.</li><li><a title="ZFS On Linux Landing Workaround For Linux 5.0 Kernel Support" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=ZFS-On-Linux-5.0-Workaround">ZFS On Linux Landing Workaround For Linux 5.0 Kernel Support</a> &mdash; So while these symbols are important for SIMD vectorized checksums for ZFS in the name of performance, with Linux 5.0+ they are not going to be exported for use by non-GPL modules. ZFS On Linux developer Tony Hutter has now staged a change that would disable vector instructions on Linux 5.0+ kernels.</li><li><a title="Re: x86/fpu: Don&#39;t export __kernel_fpu_{begin,end}()" rel="nofollow" href="https://marc.info/?l=linux-kernel&amp;m=154714516832389">Re: x86/fpu: Don't export __kernel_fpu_{begin,end}()</a> &mdash; My tolerance for ZFS is pretty non-existant.  Sun explicitly did not want their code to work on Linux, so why would we do extra work to get their code to work properly?</li><li><a title="The future of ZFS in FreeBSD" rel="nofollow" href="https://lists.freebsd.org/pipermail/freebsd-current/2018-December/072422.html">The future of ZFS in FreeBSD</a> &mdash; This state of affairs has led to a general agreement among the stakeholders that I have spoken to that it makes sense to rebase FreeBSD's ZFS on ZoL. Brian Behlendorf has graciously encouraged me to add FreeBSD support directly so that we might all have a singleshared code base.</li><li><a title="Dephix: Kickoff to The Future" rel="nofollow" href="https://www.delphix.com/blog/kickoff-future-eko-2018">Dephix: Kickoff to The Future</a> &mdash; OpenZFS has grown over the last decade, and delivering our application on Linux provides great OpenZFS support while enabling higher velocity adoption of new environments.</li><li><a title="The future of ZFS on Linux [zfs-discuss] " rel="nofollow" href="http://list.zfsonlinux.org/pipermail/zfs-discuss/2019-January/033300.html">The future of ZFS on Linux [zfs-discuss] </a> &mdash; 
Do you realize that we don’t actually need the symbols that the kernel removed. It All they do is save/restore of register state while turning off/on preemption. Nothing stops us from doing that ourselves. It is possible to implement our own substitutes using code from either Illumos or FreeBSD or even write our own. 

Honestly, I am beginning to think that my attempt to compromise with mainline gave the wrong impression. I am simply tired of this behavior by them and felt like reaching out to put an end to it. In a few weeks, we will likely be running on Linux 5.0 as if those symbols had never been removed because we will almost certainly have our own substitutes for them. Having to bloat our code because mainline won’t give us access to trivial functionality is annoying, but it is not the end of the world.</li><li><a title="LINUX Unplugged Episode 284: Free as in Get Out" rel="nofollow" href="https://linuxunplugged.com/284">LINUX Unplugged Episode 284: Free as in Get Out</a></li><li><a title="BSD Now 279: Future of ZFS" rel="nofollow" href="https://www.bsdnow.tv/episodes/2019_01_02-future_of_zfs">BSD Now 279: Future of ZFS</a></li><li><a title="BSD Now 157: ZFS, The “Universal” File-system" rel="nofollow" href="https://www.bsdnow.tv/episodes/2016_08_31-the_universal_filesystem">BSD Now 157: ZFS, The “Universal” File-system</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Jim and Wes are joined by OpenZFS developer Richard Yao to explain why the recent drama over Linux kernel 5.0 is no big deal, and how his fix for the underlying issue might actually make things faster.</p>

<p>Plus the nitty-gritty details of vectorized optimizations and kernel preemption, and our thoughts on the future of the relationship between ZFS and Linux.</p><p>Special Guest: Richard Yao.</p><p>Links:</p><ul><li><a title="LinuxFest Northwest 2019" rel="nofollow" href="https://linuxfestnorthwest.org/conferences/2019">LinuxFest Northwest 2019</a> &mdash; Join a bunch of JB hosts and community celebrating the 20th anniversary! </li><li><a title="Choose Linux" rel="nofollow" href="https://chooselinux.show/">Choose Linux</a> &mdash; The show that captures the excitement of discovering Linux.</li><li><a title="Linux 5.0: _kernel_fpu{begin,end} no longer exported" rel="nofollow" href="https://github.com/zfsonlinux/zfs/issues/8259">Linux 5.0: _kernel_fpu{begin,end} no longer exported</a> &mdash; The latest kernels removed the old compatibility headers.</li><li><a title="ZFS On Linux Landing Workaround For Linux 5.0 Kernel Support" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=ZFS-On-Linux-5.0-Workaround">ZFS On Linux Landing Workaround For Linux 5.0 Kernel Support</a> &mdash; So while these symbols are important for SIMD vectorized checksums for ZFS in the name of performance, with Linux 5.0+ they are not going to be exported for use by non-GPL modules. ZFS On Linux developer Tony Hutter has now staged a change that would disable vector instructions on Linux 5.0+ kernels.</li><li><a title="Re: x86/fpu: Don&#39;t export __kernel_fpu_{begin,end}()" rel="nofollow" href="https://marc.info/?l=linux-kernel&amp;m=154714516832389">Re: x86/fpu: Don't export __kernel_fpu_{begin,end}()</a> &mdash; My tolerance for ZFS is pretty non-existant.  Sun explicitly did not want their code to work on Linux, so why would we do extra work to get their code to work properly?</li><li><a title="The future of ZFS in FreeBSD" rel="nofollow" href="https://lists.freebsd.org/pipermail/freebsd-current/2018-December/072422.html">The future of ZFS in FreeBSD</a> &mdash; This state of affairs has led to a general agreement among the stakeholders that I have spoken to that it makes sense to rebase FreeBSD's ZFS on ZoL. Brian Behlendorf has graciously encouraged me to add FreeBSD support directly so that we might all have a singleshared code base.</li><li><a title="Dephix: Kickoff to The Future" rel="nofollow" href="https://www.delphix.com/blog/kickoff-future-eko-2018">Dephix: Kickoff to The Future</a> &mdash; OpenZFS has grown over the last decade, and delivering our application on Linux provides great OpenZFS support while enabling higher velocity adoption of new environments.</li><li><a title="The future of ZFS on Linux [zfs-discuss] " rel="nofollow" href="http://list.zfsonlinux.org/pipermail/zfs-discuss/2019-January/033300.html">The future of ZFS on Linux [zfs-discuss] </a> &mdash; 
Do you realize that we don’t actually need the symbols that the kernel removed. It All they do is save/restore of register state while turning off/on preemption. Nothing stops us from doing that ourselves. It is possible to implement our own substitutes using code from either Illumos or FreeBSD or even write our own. 

Honestly, I am beginning to think that my attempt to compromise with mainline gave the wrong impression. I am simply tired of this behavior by them and felt like reaching out to put an end to it. In a few weeks, we will likely be running on Linux 5.0 as if those symbols had never been removed because we will almost certainly have our own substitutes for them. Having to bloat our code because mainline won’t give us access to trivial functionality is annoying, but it is not the end of the world.</li><li><a title="LINUX Unplugged Episode 284: Free as in Get Out" rel="nofollow" href="https://linuxunplugged.com/284">LINUX Unplugged Episode 284: Free as in Get Out</a></li><li><a title="BSD Now 279: Future of ZFS" rel="nofollow" href="https://www.bsdnow.tv/episodes/2019_01_02-future_of_zfs">BSD Now 279: Future of ZFS</a></li><li><a title="BSD Now 157: ZFS, The “Universal” File-system" rel="nofollow" href="https://www.bsdnow.tv/episodes/2016_08_31-the_universal_filesystem">BSD Now 157: ZFS, The “Universal” File-system</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>394: All About Azure</title>
  <link>https://techsnap.systems/394</link>
  <guid isPermaLink="false">2e588701-e7a1-4462-99fa-e7ea2275b375</guid>
  <pubDate>Thu, 10 Jan 2019 04:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/2e588701-e7a1-4462-99fa-e7ea2275b375.mp3" length="22259879" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Wes is joined by a special guest to take a look back on the growth and development of Azure in 2018 and discuss some of its unique strengths.</itunes:subtitle>
  <itunes:duration>26:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Wes is joined by a special guest to take a look back on the growth and development of Azure in 2018 and discuss some of its unique strengths. Special Guest: Chad M. Crowell.
</description>
  <itunes:keywords>Azure, Microsoft, AWS, Cloud, command line, virtualization, Hybrid Cloud, Active Directory, VPC, VPN, Powershell, Powershell core, Azure Sphere, Azure Stack, File Sync, MSSQL, Windows, Linux, Security, Networking, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Wes is joined by a special guest to take a look back on the growth and development of Azure in 2018 and discuss some of its unique strengths.</p><p>Special Guest: Chad M. Crowell.</p><p>Links:</p><ul><li><a title="Under the sea, Microsoft tests a datacenter that’s quick to deploy, could provide internet connectivity for years" rel="nofollow" href="https://news.microsoft.com/features/under-the-sea-microsoft-tests-a-datacenter-thats-quick-to-deploy-could-provide-internet-connectivity-for-years/">Under the sea, Microsoft tests a datacenter that’s quick to deploy, could provide internet connectivity for years</a></li><li><a title="An Azure Infrastructure Year in Review" rel="nofollow" href="https://www.petri.com/an-azure-infrastructure-year-in-review-2018">An Azure Infrastructure Year in Review</a></li><li><a title="Azure File Sync now generally available" rel="nofollow" href="https://azure.microsoft.com/en-us/blog/score-one-for-the-it-pro-azure-file-sync-is-now-generally-available/">Azure File Sync now generally available</a></li><li><a title="Microsoft&#39;s Newest OS is Based on Linux" rel="nofollow" href="https://www.omgubuntu.co.uk/2018/04/microsoft-linux-custom-kernel-azure-sphere">Microsoft's Newest OS is Based on Linux</a></li><li><a title="Azure Sphere" rel="nofollow" href="https://azure.microsoft.com/en-us/services/azure-sphere/">Azure Sphere</a></li><li><a title="What is Azure Stack?" rel="nofollow" href="https://azure.microsoft.com/en-us/overview/azure-stack/">What is Azure Stack?</a></li><li><a title="Azure Outage Proves the Hard Way Availability Zones are a Good Idea" rel="nofollow" href="https://www.datacenterknowledge.com/microsoft/azure-outage-proves-hard-way-availability-zones-are-good-idea">Azure Outage Proves the Hard Way Availability Zones are a Good Idea</a></li><li><a title=" Microsoft Azure Infrastructure and Deployment on Linux Academy" rel="nofollow" href="https://linuxacademy.com/azure/training/course/name/microsoft-azure-infrastructure-and-deployment-exam-az-100"> Microsoft Azure Infrastructure and Deployment on Linux Academy</a> &mdash; In this course, we will cover an introduction to the Azure portal, followed by how to build infrastructure and deploy that infrastructure in real world scenarios.</li><li><a title="Chad Crowell on Twitter" rel="nofollow" href="https://twitter.com/chadmcrowell?lang=en">Chad Crowell on Twitter</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Wes is joined by a special guest to take a look back on the growth and development of Azure in 2018 and discuss some of its unique strengths.</p><p>Special Guest: Chad M. Crowell.</p><p>Links:</p><ul><li><a title="Under the sea, Microsoft tests a datacenter that’s quick to deploy, could provide internet connectivity for years" rel="nofollow" href="https://news.microsoft.com/features/under-the-sea-microsoft-tests-a-datacenter-thats-quick-to-deploy-could-provide-internet-connectivity-for-years/">Under the sea, Microsoft tests a datacenter that’s quick to deploy, could provide internet connectivity for years</a></li><li><a title="An Azure Infrastructure Year in Review" rel="nofollow" href="https://www.petri.com/an-azure-infrastructure-year-in-review-2018">An Azure Infrastructure Year in Review</a></li><li><a title="Azure File Sync now generally available" rel="nofollow" href="https://azure.microsoft.com/en-us/blog/score-one-for-the-it-pro-azure-file-sync-is-now-generally-available/">Azure File Sync now generally available</a></li><li><a title="Microsoft&#39;s Newest OS is Based on Linux" rel="nofollow" href="https://www.omgubuntu.co.uk/2018/04/microsoft-linux-custom-kernel-azure-sphere">Microsoft's Newest OS is Based on Linux</a></li><li><a title="Azure Sphere" rel="nofollow" href="https://azure.microsoft.com/en-us/services/azure-sphere/">Azure Sphere</a></li><li><a title="What is Azure Stack?" rel="nofollow" href="https://azure.microsoft.com/en-us/overview/azure-stack/">What is Azure Stack?</a></li><li><a title="Azure Outage Proves the Hard Way Availability Zones are a Good Idea" rel="nofollow" href="https://www.datacenterknowledge.com/microsoft/azure-outage-proves-hard-way-availability-zones-are-good-idea">Azure Outage Proves the Hard Way Availability Zones are a Good Idea</a></li><li><a title=" Microsoft Azure Infrastructure and Deployment on Linux Academy" rel="nofollow" href="https://linuxacademy.com/azure/training/course/name/microsoft-azure-infrastructure-and-deployment-exam-az-100"> Microsoft Azure Infrastructure and Deployment on Linux Academy</a> &mdash; In this course, we will cover an introduction to the Azure portal, followed by how to build infrastructure and deploy that infrastructure in real world scenarios.</li><li><a title="Chad Crowell on Twitter" rel="nofollow" href="https://twitter.com/chadmcrowell?lang=en">Chad Crowell on Twitter</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 390: What’s Up with WireGuard</title>
  <link>https://techsnap.systems/390</link>
  <guid isPermaLink="false">6cd3cd3c-79c7-4978-8102-042f935a1344</guid>
  <pubDate>Thu, 22 Nov 2018 10:30:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/6cd3cd3c-79c7-4978-8102-042f935a1344.mp3" length="29616549" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>WireGuard has a lot of buzz around it and for many good reasons. We’ll explain what WireGuard is specifically, what it can do, and maybe more importantly, what it can’t.</itunes:subtitle>
  <itunes:duration>34:55</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>WireGuard has a lot of buzz around it and for many good reasons. We’ll explain what WireGuard is specifically, what it can do, and maybe more importantly, what it can’t. Special Guest: Jim Salter.
</description>
  <itunes:keywords>WireGuard, VPN, IPSEC, Linux, Algo, Private Networking, Jim Salter, ssh, Security, Networking, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>WireGuard has a lot of buzz around it and for many good reasons. We’ll explain what WireGuard is specifically, what it can do, and maybe more importantly, what it can’t.</p><p>Special Guest: Jim Salter.</p><p>Links:</p><ul><li><a title="How to easily configure WireGuard" rel="nofollow" href="https://www.stavros.io/posts/how-to-configure-wireguard/">How to easily configure WireGuard</a> &mdash; At its core, all WireGuard does is create an interface from one computer to another.</li><li><a title="Jessie Frazelle&#39;s Blog: Installing and Using Wireguard, obviously with containers" rel="nofollow" href="https://blog.jessfraz.com/post/installing-and-using-wireguard/">Jessie Frazelle's Blog: Installing and Using Wireguard, obviously with containers</a> &mdash; What is cool about Wireguard is it integrates into the Linux networking stack.</li><li><a title="WireGuard Didn&#39;t Make it To The Mainline Linux Kernel This Cycle" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=WireGuard-Not-In-4.20">WireGuard Didn't Make it To The Mainline Linux Kernel This Cycle</a> &mdash; The code continues to be improved upon but looks like it came up just short of making it into this current development cycle. </li><li><a title="WireGuard VPN review: A new type of VPN offers serious advantages" rel="nofollow" href="https://arstechnica.com/gadgets/2018/08/wireguard-vpn-review-fast-connections-amaze-but-windows-support-needs-to-happen/">WireGuard VPN review: A new type of VPN offers serious advantages</a> &mdash; Fewer lines of code, simpler setup, and better algorithms make a strong case.
</li><li><a title="The Current Status of WireGuard VPNs - Are We There Yet?" rel="nofollow" href="https://www.privateinternetaccess.com/blog/2018/09/the-current-status-of-wireguard-vpns-are-we-there-yet/">The Current Status of WireGuard VPNs - Are We There Yet?</a></li><li><a title="Using a free VPN? Why not skip the middleman and just send your data to President Xi?" rel="nofollow" href="https://www.theregister.co.uk/2018/11/19/vpn_app_investigation/">Using a free VPN? Why not skip the middleman and just send your data to President Xi?</a></li><li><a title="Feedback from Cody" rel="nofollow" href="https://pastebin.com/RNvV6EQF">Feedback from Cody</a></li><li><a title="NRE Labs" rel="nofollow" href="https://labs.networkreliability.engineering/">NRE Labs</a> &mdash; NRE Labs is a no-strings-attached, community-centered initiative to bring the skills of automation within reach for everyone</li><li><a title="Introduction to Antidote" rel="nofollow" href="https://antidoteproject.readthedocs.io/en/latest/">Introduction to Antidote</a> &mdash; Antidote is an open-source project aimed at making automated network operations more accessible with fast, easy and fun learning.</li><li><a title="StackStorm" rel="nofollow" href="https://stackstorm.com/">StackStorm</a> &mdash; From simple if/then rules to complicated workflows, StackStorm lets you automate DevOps your way.</li><li><a title="wireguard-private-networking: Build your own multi server private network using wireguard and ansible" rel="nofollow" href="https://github.com/mawalu/wireguard-private-networking">wireguard-private-networking: Build your own multi server private network using wireguard and ansible</a></li><li><a title="Algo: Set up a personal IPSEC or WireGuard VPN in the cloud" rel="nofollow" href="https://github.com/trailofbits/algo">Algo: Set up a personal IPSEC or WireGuard VPN in the cloud</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>WireGuard has a lot of buzz around it and for many good reasons. We’ll explain what WireGuard is specifically, what it can do, and maybe more importantly, what it can’t.</p><p>Special Guest: Jim Salter.</p><p>Links:</p><ul><li><a title="How to easily configure WireGuard" rel="nofollow" href="https://www.stavros.io/posts/how-to-configure-wireguard/">How to easily configure WireGuard</a> &mdash; At its core, all WireGuard does is create an interface from one computer to another.</li><li><a title="Jessie Frazelle&#39;s Blog: Installing and Using Wireguard, obviously with containers" rel="nofollow" href="https://blog.jessfraz.com/post/installing-and-using-wireguard/">Jessie Frazelle's Blog: Installing and Using Wireguard, obviously with containers</a> &mdash; What is cool about Wireguard is it integrates into the Linux networking stack.</li><li><a title="WireGuard Didn&#39;t Make it To The Mainline Linux Kernel This Cycle" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=WireGuard-Not-In-4.20">WireGuard Didn't Make it To The Mainline Linux Kernel This Cycle</a> &mdash; The code continues to be improved upon but looks like it came up just short of making it into this current development cycle. </li><li><a title="WireGuard VPN review: A new type of VPN offers serious advantages" rel="nofollow" href="https://arstechnica.com/gadgets/2018/08/wireguard-vpn-review-fast-connections-amaze-but-windows-support-needs-to-happen/">WireGuard VPN review: A new type of VPN offers serious advantages</a> &mdash; Fewer lines of code, simpler setup, and better algorithms make a strong case.
</li><li><a title="The Current Status of WireGuard VPNs - Are We There Yet?" rel="nofollow" href="https://www.privateinternetaccess.com/blog/2018/09/the-current-status-of-wireguard-vpns-are-we-there-yet/">The Current Status of WireGuard VPNs - Are We There Yet?</a></li><li><a title="Using a free VPN? Why not skip the middleman and just send your data to President Xi?" rel="nofollow" href="https://www.theregister.co.uk/2018/11/19/vpn_app_investigation/">Using a free VPN? Why not skip the middleman and just send your data to President Xi?</a></li><li><a title="Feedback from Cody" rel="nofollow" href="https://pastebin.com/RNvV6EQF">Feedback from Cody</a></li><li><a title="NRE Labs" rel="nofollow" href="https://labs.networkreliability.engineering/">NRE Labs</a> &mdash; NRE Labs is a no-strings-attached, community-centered initiative to bring the skills of automation within reach for everyone</li><li><a title="Introduction to Antidote" rel="nofollow" href="https://antidoteproject.readthedocs.io/en/latest/">Introduction to Antidote</a> &mdash; Antidote is an open-source project aimed at making automated network operations more accessible with fast, easy and fun learning.</li><li><a title="StackStorm" rel="nofollow" href="https://stackstorm.com/">StackStorm</a> &mdash; From simple if/then rules to complicated workflows, StackStorm lets you automate DevOps your way.</li><li><a title="wireguard-private-networking: Build your own multi server private network using wireguard and ansible" rel="nofollow" href="https://github.com/mawalu/wireguard-private-networking">wireguard-private-networking: Build your own multi server private network using wireguard and ansible</a></li><li><a title="Algo: Set up a personal IPSEC or WireGuard VPN in the cloud" rel="nofollow" href="https://github.com/trailofbits/algo">Algo: Set up a personal IPSEC or WireGuard VPN in the cloud</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 388: The One About eBPF</title>
  <link>https://techsnap.systems/388</link>
  <guid isPermaLink="false">64a6b392-dd6b-4be1-805a-e88b17e029ec</guid>
  <pubDate>Thu, 25 Oct 2018 15:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/64a6b392-dd6b-4be1-805a-e88b17e029ec.mp3" length="31325387" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We explain what eBPF is, how it works, and its proud BSD production legacy.</itunes:subtitle>
  <itunes:duration>36:57</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We explain what eBPF is, how it works, and its proud BSD production legacy.
eBPF is a technology that you’re going to be hearing more and more about. It powers low-overhead custom analysis tools, handles network security in a containerized world, and powers tools you use every day.
</description>
  <itunes:keywords>MeetBSD, BPF, eBPF, Linux, LWN, Linus, seccomp, XDP, bpfilter, virtual machine, tracing, observability, bcc, bpftrace, dtrace, monitoring, bytecode, up, ultimate plumber, pipecut, networking, security, containers, kernel, shell, pipeline, instrumentation, kprobe, tcpdump, SysAdmin, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We explain what eBPF is, how it works, and its proud BSD production legacy.</p>

<p>eBPF is a technology that you’re going to be hearing more and more about. It powers low-overhead custom analysis tools, handles network security in a containerized world, and powers tools you use every day.</p><p>Links:</p><ul><li><a title="Chris Goes to MeetBSD" rel="nofollow" href="https://linuxunplugged.com/articles/meetbsd2018">Chris Goes to MeetBSD</a></li><li><a title="​Linus Torvalds talks about coming back to work on Linux | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/linus-torvalds-talks-about-coming-back-to-work-on-linux/">​Linus Torvalds talks about coming back to work on Linux | ZDNet</a> &mdash; BPF has actually been really useful, and the real power of it is how it allows people to do specialized code that isn't enabled until asked for.</li><li><a title="The Kernel Report - Jonathan Corbet" rel="nofollow" href="https://www.youtube.com/watch?v=XQGUi5Gu0D8&amp;feature=youtu.be&amp;t=840">The Kernel Report - Jonathan Corbet</a></li><li><a title="BPF - the forgotten bytecode" rel="nofollow" href="https://blog.cloudflare.com/bpf-the-forgotten-bytecode/">BPF - the forgotten bytecode</a> &mdash; All this changed in 1993 when Steven McCanne and Van Jacobson published the paper introducing a better way of filtering packets in the kernel, they called it "The BSD Packet Filter" (BPF)</li><li><a title="The BSD Packet Filter" rel="nofollow" href="http://www.tcpdump.org/papers/bpf-usenix93.pdf">The BSD Packet Filter</a></li><li><a title="eBPF: Past, Present, and Future" rel="nofollow" href="https://ferrisellis.com/posts/ebpf_past_present_future/">eBPF: Past, Present, and Future</a> &mdash; The Extended Berkeley Packet Filter, or eBPF, has rapidly been adopted into a number of Linux kernel systems since its introduction into the Linux kernel in late 2014. Understanding eBPF, however, can be difficult as many try to explain it via a use of eBPF as opposed to its design. Indeed eBPF's name indicates that it is for packet filtering even though it now has uses which have nothing to do with networking.</li><li><a title="Using eBPF in Kubernetes" rel="nofollow" href="https://kubernetes.io/blog/2017/12/using-ebpf-in-kubernetes/">Using eBPF in Kubernetes</a> &mdash; Cilium is a networking project that makes heavy use of eBPF superpowers to route and filter network traffic for container-based systems. By using eBPF, Cilium can dynamically generate and apply rules—even at the device level with XDP—without making changes to the Linux kernel itself</li><li><a title="Why is the kernel community replacing iptables with BPF?" rel="nofollow" href="https://cilium.io/blog/2018/04/17/why-is-the-kernel-community-replacing-iptables/">Why is the kernel community replacing iptables with BPF?</a> &mdash; The Linux kernel community recently announced bpfilter, which will replace the long-standing in-kernel implementation of iptables with high-performance network filtering powered by Linux BPF, all while guaranteeing a non-disruptive transition for Linux users.</li><li><a title="bpftrace (DTrace 2.0) for Linux 2018" rel="nofollow" href="http://www.brendangregg.com/blog/2018-10-08/dtrace-for-linux-2018.html">bpftrace (DTrace 2.0) for Linux 2018</a> &mdash; Created by Alastair Robertson, bpftrace is an open source high-level tracing front-end that lets you analyze systems in custom ways. It's shaping up to be a DTrace version 2.0: more capable, and built from the ground up for the modern era of the eBPF virtual machine.</li><li><a title="The bpftrace One-Liner Tutorial" rel="nofollow" href="https://github.com/iovisor/bpftrace/blob/master/docs/tutorial_one_liners.md">The bpftrace One-Liner Tutorial</a></li><li><a title="BCC - Tools for BPF-based Linux IO analysis, networking, monitoring, and more" rel="nofollow" href="https://github.com/iovisor/bcc">BCC - Tools for BPF-based Linux IO analysis, networking, monitoring, and more</a> &mdash; BCC is a toolkit for creating efficient kernel tracing and manipulation programs, and includes several useful tools and examples.</li><li><a title="Linux eBPF Tracing Tools" rel="nofollow" href="http://www.brendangregg.com/ebpf.html">Linux eBPF Tracing Tools</a> &mdash; This page shows examples of performance analysis tools using enhancements to BPF (Berkeley Packet Filter) which were added to the Linux 4.x series kernels, allowing BPF to do much more than just filtering packets. These enhancements allow custom analysis programs to be executed on Linux dynamic tracing, static tracing, and profiling events.</li><li><a title="eBPF Vulnerability (CVE-2017-16995): When the Doorman Becomes the Backdoor" rel="nofollow" href="https://blog.aquasec.com/ebpf-vulnerability-cve-2017-16995-when-the-doorman-becomes-the-backdoor">eBPF Vulnerability (CVE-2017-16995): When the Doorman Becomes the Backdoor</a></li><li><a title="Ultimate Plumber" rel="nofollow" href="https://github.com/akavel/up">Ultimate Plumber</a> &mdash; Ultimate Plumber is a tool for writing Linux pipes with instant live preview
</li><li><a title="BSD Now 073: Pipe Dreams" rel="nofollow" href="http://www.bsdnow.tv/episodes/2015_01_21-pipe_dreams">BSD Now 073: Pipe Dreams</a> &mdash; Interview w/ David Maxwell about Pipecut, text processing, and commandline wizardry.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We explain what eBPF is, how it works, and its proud BSD production legacy.</p>

<p>eBPF is a technology that you’re going to be hearing more and more about. It powers low-overhead custom analysis tools, handles network security in a containerized world, and powers tools you use every day.</p><p>Links:</p><ul><li><a title="Chris Goes to MeetBSD" rel="nofollow" href="https://linuxunplugged.com/articles/meetbsd2018">Chris Goes to MeetBSD</a></li><li><a title="​Linus Torvalds talks about coming back to work on Linux | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/linus-torvalds-talks-about-coming-back-to-work-on-linux/">​Linus Torvalds talks about coming back to work on Linux | ZDNet</a> &mdash; BPF has actually been really useful, and the real power of it is how it allows people to do specialized code that isn't enabled until asked for.</li><li><a title="The Kernel Report - Jonathan Corbet" rel="nofollow" href="https://www.youtube.com/watch?v=XQGUi5Gu0D8&amp;feature=youtu.be&amp;t=840">The Kernel Report - Jonathan Corbet</a></li><li><a title="BPF - the forgotten bytecode" rel="nofollow" href="https://blog.cloudflare.com/bpf-the-forgotten-bytecode/">BPF - the forgotten bytecode</a> &mdash; All this changed in 1993 when Steven McCanne and Van Jacobson published the paper introducing a better way of filtering packets in the kernel, they called it "The BSD Packet Filter" (BPF)</li><li><a title="The BSD Packet Filter" rel="nofollow" href="http://www.tcpdump.org/papers/bpf-usenix93.pdf">The BSD Packet Filter</a></li><li><a title="eBPF: Past, Present, and Future" rel="nofollow" href="https://ferrisellis.com/posts/ebpf_past_present_future/">eBPF: Past, Present, and Future</a> &mdash; The Extended Berkeley Packet Filter, or eBPF, has rapidly been adopted into a number of Linux kernel systems since its introduction into the Linux kernel in late 2014. Understanding eBPF, however, can be difficult as many try to explain it via a use of eBPF as opposed to its design. Indeed eBPF's name indicates that it is for packet filtering even though it now has uses which have nothing to do with networking.</li><li><a title="Using eBPF in Kubernetes" rel="nofollow" href="https://kubernetes.io/blog/2017/12/using-ebpf-in-kubernetes/">Using eBPF in Kubernetes</a> &mdash; Cilium is a networking project that makes heavy use of eBPF superpowers to route and filter network traffic for container-based systems. By using eBPF, Cilium can dynamically generate and apply rules—even at the device level with XDP—without making changes to the Linux kernel itself</li><li><a title="Why is the kernel community replacing iptables with BPF?" rel="nofollow" href="https://cilium.io/blog/2018/04/17/why-is-the-kernel-community-replacing-iptables/">Why is the kernel community replacing iptables with BPF?</a> &mdash; The Linux kernel community recently announced bpfilter, which will replace the long-standing in-kernel implementation of iptables with high-performance network filtering powered by Linux BPF, all while guaranteeing a non-disruptive transition for Linux users.</li><li><a title="bpftrace (DTrace 2.0) for Linux 2018" rel="nofollow" href="http://www.brendangregg.com/blog/2018-10-08/dtrace-for-linux-2018.html">bpftrace (DTrace 2.0) for Linux 2018</a> &mdash; Created by Alastair Robertson, bpftrace is an open source high-level tracing front-end that lets you analyze systems in custom ways. It's shaping up to be a DTrace version 2.0: more capable, and built from the ground up for the modern era of the eBPF virtual machine.</li><li><a title="The bpftrace One-Liner Tutorial" rel="nofollow" href="https://github.com/iovisor/bpftrace/blob/master/docs/tutorial_one_liners.md">The bpftrace One-Liner Tutorial</a></li><li><a title="BCC - Tools for BPF-based Linux IO analysis, networking, monitoring, and more" rel="nofollow" href="https://github.com/iovisor/bcc">BCC - Tools for BPF-based Linux IO analysis, networking, monitoring, and more</a> &mdash; BCC is a toolkit for creating efficient kernel tracing and manipulation programs, and includes several useful tools and examples.</li><li><a title="Linux eBPF Tracing Tools" rel="nofollow" href="http://www.brendangregg.com/ebpf.html">Linux eBPF Tracing Tools</a> &mdash; This page shows examples of performance analysis tools using enhancements to BPF (Berkeley Packet Filter) which were added to the Linux 4.x series kernels, allowing BPF to do much more than just filtering packets. These enhancements allow custom analysis programs to be executed on Linux dynamic tracing, static tracing, and profiling events.</li><li><a title="eBPF Vulnerability (CVE-2017-16995): When the Doorman Becomes the Backdoor" rel="nofollow" href="https://blog.aquasec.com/ebpf-vulnerability-cve-2017-16995-when-the-doorman-becomes-the-backdoor">eBPF Vulnerability (CVE-2017-16995): When the Doorman Becomes the Backdoor</a></li><li><a title="Ultimate Plumber" rel="nofollow" href="https://github.com/akavel/up">Ultimate Plumber</a> &mdash; Ultimate Plumber is a tool for writing Linux pipes with instant live preview
</li><li><a title="BSD Now 073: Pipe Dreams" rel="nofollow" href="http://www.bsdnow.tv/episodes/2015_01_21-pipe_dreams">BSD Now 073: Pipe Dreams</a> &mdash; Interview w/ David Maxwell about Pipecut, text processing, and commandline wizardry.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 382: Domestic Disappointments</title>
  <link>https://techsnap.systems/382</link>
  <guid isPermaLink="false">20c841ff-5ccf-4058-8e2d-f59364827c26</guid>
  <pubDate>Thu, 06 Sep 2018 19:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/20c841ff-5ccf-4058-8e2d-f59364827c26.mp3" length="38035774" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We’re joined by a special guest to discuss the failures of campaign security, the disastrous consequences of a mismanaged firewall, and the suspicious case of Speck.</itunes:subtitle>
  <itunes:duration>44:56</itunes:duration>
  <itunes:explicit>yes</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We’re joined by a special guest to discuss the failures of campaign security, the disastrous consequences of a mismanaged firewall, and the suspicious case of Speck.
Plus the latest vulnerabilities in Wireshark and OpenSSH, the new forensic hotness from Netflix, and some great introductions to cryptography. 
 Special Guest: Martin Wimpress.
</description>
  <itunes:keywords>eMail, Elections, Election Security, Espionage, Attachments, Security Keys, CIA, USA, Firewall, China, NSA, Speck, Android, Google, OpenSSH, SSH, Wireshark, CVE, CVSS, Security, TCP, ISP, BGP, 500 mile email, TCP RST, Diffy, Netflix, crypto, cryptography, diffy, netflix, manga, linux, devops, podcast</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We’re joined by a special guest to discuss the failures of campaign security, the disastrous consequences of a mismanaged firewall, and the suspicious case of Speck.</p>

<p>Plus the latest vulnerabilities in Wireshark and OpenSSH, the new forensic hotness from Netflix, and some great introductions to cryptography. </p><p>Special Guest: Martin Wimpress.</p><p>Links:</p><ul><li><a title="I’m teaching email security to Democratic campaigns. It’s as bad as 2016." rel="nofollow" href="https://www.washingtonpost.com/outlook/2018/09/04/im-teaching-email-security-democratic-campaigns-its-bad/">I’m teaching email security to Democratic campaigns. It’s as bad as 2016.</a></li><li><a title="Botched CIA Communications System Helped Blow Cover of Chinese Agents" rel="nofollow" href="https://foreignpolicy.com/2018/08/15/botched-cia-communications-system-helped-blow-cover-chinese-agents-intelligence/">Botched CIA Communications System Helped Blow Cover of Chinese Agents</a></li><li><a title="NSA-Designed Speck Algorithm to Be Removed From Linux 4.20" rel="nofollow" href="https://www.tomshardware.com/news/nsa-speck-removed-linux-4-20,37747.html">NSA-Designed Speck Algorithm to Be Removed From Linux 4.20</a></li><li><a title="Vulnerability Affects All OpenSSH Versions Released in the Past Two Decades" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/vulnerability-affects-all-openssh-versions-released-in-the-past-two-decades/">Vulnerability Affects All OpenSSH Versions Released in the Past Two Decades</a></li><li><a title="Wireshark can be crashed via malicious packet trace files" rel="nofollow" href="https://www.helpnetsecurity.com/2018/08/31/wireshark-dos-vulnerabilities/">Wireshark can be crashed via malicious packet trace files</a></li><li><a title="Service provider story about tracking down TCP RSTs" rel="nofollow" href="https://mailman.nanog.org/pipermail/nanog/2018-September/096871.html">Service provider story about tracking down TCP RSTs</a></li><li><a title="The case of the 500-mile email" rel="nofollow" href="http://www.ibiblio.org/harris/500milemail.html">The case of the 500-mile email</a></li><li><a title="Diffy: A cloud-centric triage tool for digital forensics and incident response" rel="nofollow" href="https://github.com/Netflix-Skunkworks/diffy">Diffy: A cloud-centric triage tool for digital forensics and incident response</a></li><li><a title="An intensive introduction to Cryptography" rel="nofollow" href="https://intensecrypto.org/public/">An intensive introduction to Cryptography</a></li><li><a title="The Manga Guide to Cryptography | No Starch Press" rel="nofollow" href="https://nostarch.com/mangacrypto">The Manga Guide to Cryptography | No Starch Press</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We’re joined by a special guest to discuss the failures of campaign security, the disastrous consequences of a mismanaged firewall, and the suspicious case of Speck.</p>

<p>Plus the latest vulnerabilities in Wireshark and OpenSSH, the new forensic hotness from Netflix, and some great introductions to cryptography. </p><p>Special Guest: Martin Wimpress.</p><p>Links:</p><ul><li><a title="I’m teaching email security to Democratic campaigns. It’s as bad as 2016." rel="nofollow" href="https://www.washingtonpost.com/outlook/2018/09/04/im-teaching-email-security-democratic-campaigns-its-bad/">I’m teaching email security to Democratic campaigns. It’s as bad as 2016.</a></li><li><a title="Botched CIA Communications System Helped Blow Cover of Chinese Agents" rel="nofollow" href="https://foreignpolicy.com/2018/08/15/botched-cia-communications-system-helped-blow-cover-chinese-agents-intelligence/">Botched CIA Communications System Helped Blow Cover of Chinese Agents</a></li><li><a title="NSA-Designed Speck Algorithm to Be Removed From Linux 4.20" rel="nofollow" href="https://www.tomshardware.com/news/nsa-speck-removed-linux-4-20,37747.html">NSA-Designed Speck Algorithm to Be Removed From Linux 4.20</a></li><li><a title="Vulnerability Affects All OpenSSH Versions Released in the Past Two Decades" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/vulnerability-affects-all-openssh-versions-released-in-the-past-two-decades/">Vulnerability Affects All OpenSSH Versions Released in the Past Two Decades</a></li><li><a title="Wireshark can be crashed via malicious packet trace files" rel="nofollow" href="https://www.helpnetsecurity.com/2018/08/31/wireshark-dos-vulnerabilities/">Wireshark can be crashed via malicious packet trace files</a></li><li><a title="Service provider story about tracking down TCP RSTs" rel="nofollow" href="https://mailman.nanog.org/pipermail/nanog/2018-September/096871.html">Service provider story about tracking down TCP RSTs</a></li><li><a title="The case of the 500-mile email" rel="nofollow" href="http://www.ibiblio.org/harris/500milemail.html">The case of the 500-mile email</a></li><li><a title="Diffy: A cloud-centric triage tool for digital forensics and incident response" rel="nofollow" href="https://github.com/Netflix-Skunkworks/diffy">Diffy: A cloud-centric triage tool for digital forensics and incident response</a></li><li><a title="An intensive introduction to Cryptography" rel="nofollow" href="https://intensecrypto.org/public/">An intensive introduction to Cryptography</a></li><li><a title="The Manga Guide to Cryptography | No Starch Press" rel="nofollow" href="https://nostarch.com/mangacrypto">The Manga Guide to Cryptography | No Starch Press</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 379: SegmentSmack is Whack</title>
  <link>https://techsnap.systems/379</link>
  <guid isPermaLink="false">7165f792-e1bf-4676-9d9e-2a2cc981db5c</guid>
  <pubDate>Fri, 10 Aug 2018 14:30:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/7165f792-e1bf-4676-9d9e-2a2cc981db5c.mp3" length="24883696" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Take down a Linux or FreeBSD box with just 2kpps of traffic, own Homebrew in 30 minutes, and infiltrate an entire network via the Inkjet printers. </itunes:subtitle>
  <itunes:duration>29:16</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Take down a Linux or FreeBSD box with just 2kpps of traffic, own Homebrew in 30 minutes, and infiltrate an entire network via the Inkjet printers. 
It’s a busy TechSNAP week.
</description>
  <itunes:keywords>SegmentSmack, FreeBSD, Linux, UEFI remote attack, Buffer overflow, GitHub Audit, TruffleHog, GitRob, undersea datacenter, homebrew, Eric Holmes, Sysadmin podcast, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Take down a Linux or FreeBSD box with just 2kpps of traffic, own Homebrew in 30 minutes, and infiltrate an entire network via the Inkjet printers. </p>

<p>It’s a busy TechSNAP week.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="HP Inkjet Printers Buffer Overflows in Processing Files Let Remote Users Execute Arbitrary Code" rel="nofollow" href="https://securitytracker.com/id/1041415">HP Inkjet Printers Buffer Overflows in Processing Files Let Remote Users Execute Arbitrary Code</a></li><li><a title="Black Hat 2018: Update Mechanisms Allow Remote Attacks on UEFI Firmware | The first stop for security news" rel="nofollow" href="https://threatpost.com/update-mechanism-flaws-allow-remote-attacks-on-uefi-firmware/134785/">Black Hat 2018: Update Mechanisms Allow Remote Attacks on UEFI Firmware | The first stop for security news</a></li><li><a title="How I gained commit access to Homebrew in 30 minutes" rel="nofollow" href="https://medium.com/@vesirin/how-i-gained-commit-access-to-homebrew-in-30-minutes-2ae314df03ab">How I gained commit access to Homebrew in 30 minutes</a></li><li><a title="Reconnaissance tool for GitHub organizations" rel="nofollow" href="https://github.com/michenriksen/gitrob">Reconnaissance tool for GitHub organizations</a></li><li><a title="TruffleHog: Searches through git repositories for high entropy strings and secrets, digging deep into commit history" rel="nofollow" href="https://github.com/dxa4481/truffleHog">TruffleHog: Searches through git repositories for high entropy strings and secrets, digging deep into commit history</a></li><li><a title="BFG Repo-Cleaner by rtyley" rel="nofollow" href="https://rtyley.github.io/bfg-repo-cleaner/">BFG Repo-Cleaner by rtyley</a></li><li><a title="TCP implementations vulnerable to Denial of Service" rel="nofollow" href="https://www.kb.cert.org/vuls/id/962459">TCP implementations vulnerable to Denial of Service</a></li><li><a title="SegmentSmack: kernel: tcp segments with random offsets may cause a remote denial of service [CVE-2018-5390]" rel="nofollow" href="https://access.redhat.com/articles/3553061">SegmentSmack: kernel: tcp segments with random offsets may cause a remote denial of service [CVE-2018-5390]</a></li><li><a title="Merge branch &#39;tcp-robust-ooo&#39; · torvalds/linux" rel="nofollow" href="https://github.com/torvalds/linux/commit/1a4f14bab1868b443f0dd3c55b689a478f82e72e">Merge branch 'tcp-robust-ooo' · torvalds/linux</a></li><li><a title="New Sysadmin dealing with stress." rel="nofollow" href="https://www.reddit.com/r/sysadmin/comments/95od7h/new_sysadmin_dealing_with_stress/">New Sysadmin dealing with stress.</a></li><li><a title="Microsoft’s undersea data center now has a webcam with fish swimming past 27.6 petabytes of data" rel="nofollow" href="https://www.theverge.com/tldr/2018/8/9/17669936/microsoft-undersea-datacenter-webcam">Microsoft’s undersea data center now has a webcam with fish swimming past 27.6 petabytes of data</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Take down a Linux or FreeBSD box with just 2kpps of traffic, own Homebrew in 30 minutes, and infiltrate an entire network via the Inkjet printers. </p>

<p>It’s a busy TechSNAP week.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="HP Inkjet Printers Buffer Overflows in Processing Files Let Remote Users Execute Arbitrary Code" rel="nofollow" href="https://securitytracker.com/id/1041415">HP Inkjet Printers Buffer Overflows in Processing Files Let Remote Users Execute Arbitrary Code</a></li><li><a title="Black Hat 2018: Update Mechanisms Allow Remote Attacks on UEFI Firmware | The first stop for security news" rel="nofollow" href="https://threatpost.com/update-mechanism-flaws-allow-remote-attacks-on-uefi-firmware/134785/">Black Hat 2018: Update Mechanisms Allow Remote Attacks on UEFI Firmware | The first stop for security news</a></li><li><a title="How I gained commit access to Homebrew in 30 minutes" rel="nofollow" href="https://medium.com/@vesirin/how-i-gained-commit-access-to-homebrew-in-30-minutes-2ae314df03ab">How I gained commit access to Homebrew in 30 minutes</a></li><li><a title="Reconnaissance tool for GitHub organizations" rel="nofollow" href="https://github.com/michenriksen/gitrob">Reconnaissance tool for GitHub organizations</a></li><li><a title="TruffleHog: Searches through git repositories for high entropy strings and secrets, digging deep into commit history" rel="nofollow" href="https://github.com/dxa4481/truffleHog">TruffleHog: Searches through git repositories for high entropy strings and secrets, digging deep into commit history</a></li><li><a title="BFG Repo-Cleaner by rtyley" rel="nofollow" href="https://rtyley.github.io/bfg-repo-cleaner/">BFG Repo-Cleaner by rtyley</a></li><li><a title="TCP implementations vulnerable to Denial of Service" rel="nofollow" href="https://www.kb.cert.org/vuls/id/962459">TCP implementations vulnerable to Denial of Service</a></li><li><a title="SegmentSmack: kernel: tcp segments with random offsets may cause a remote denial of service [CVE-2018-5390]" rel="nofollow" href="https://access.redhat.com/articles/3553061">SegmentSmack: kernel: tcp segments with random offsets may cause a remote denial of service [CVE-2018-5390]</a></li><li><a title="Merge branch &#39;tcp-robust-ooo&#39; · torvalds/linux" rel="nofollow" href="https://github.com/torvalds/linux/commit/1a4f14bab1868b443f0dd3c55b689a478f82e72e">Merge branch 'tcp-robust-ooo' · torvalds/linux</a></li><li><a title="New Sysadmin dealing with stress." rel="nofollow" href="https://www.reddit.com/r/sysadmin/comments/95od7h/new_sysadmin_dealing_with_stress/">New Sysadmin dealing with stress.</a></li><li><a title="Microsoft’s undersea data center now has a webcam with fish swimming past 27.6 petabytes of data" rel="nofollow" href="https://www.theverge.com/tldr/2018/8/9/17669936/microsoft-undersea-datacenter-webcam">Microsoft’s undersea data center now has a webcam with fish swimming past 27.6 petabytes of data</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 349: All Natural Namespaces</title>
  <link>https://techsnap.systems/349</link>
  <guid isPermaLink="false">1f0cbb01-a231-4cf6-9f5d-f3ded5714065</guid>
  <pubDate>Thu, 21 Dec 2017 19:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/1f0cbb01-a231-4cf6-9f5d-f3ded5714065.mp3" length="36892159" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Network Namespaces have been around for a while, but there may be be some very practical ways to use them that you’ve never considered. Wes does a deep dive into a very flexible tool.
</itunes:subtitle>
  <itunes:duration>50:00</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Network Namespaces have been around for a while, but there may be be some very practical ways to use them that you’ve never considered. Wes does a deep dive into a very flexible tool.
Plus what might be the world’s most important killswitch, the real dollar values for stolen credentials and the 19 year old attack that’s back. 
</description>
  <content:encoded>
    <![CDATA[<p>Network Namespaces have been around for a while, but there may be be some very practical ways to use them that you’ve never considered. Wes does a deep dive into a very flexible tool.</p>

<p>Plus what might be the world’s most important killswitch, the real dollar values for stolen credentials and the 19 year old attack that’s back.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li></ul><p>Links:</p><ul><li><a title="The Market for Stolen Account Credentials" rel="nofollow" href="https://krebsonsecurity.com/2017/12/the-market-for-stolen-account-credentials/">The Market for Stolen Account Credentials</a> &mdash; But oh, how times have changed! With dozens of sites in the underground now competing to purchase and resell credentials for a variety of online locations, it has never been easier for a botmaster to earn a handsome living based solely on the sale of stolen usernames and passwords alone.</li><li><a title="Hackers shut down plant by targeting its safety system" rel="nofollow" href="https://www.engadget.com/2017/12/17/hackers-shut-down-plant-by-targeting-safety-system/">Hackers shut down plant by targeting its safety system</a> &mdash;  FireEye reported that a plant of an unmentioned nature and location (other firms believe it's in the Middle East) was forced to shut down after a hack targeted its industrial safety system -- it's the first known instance of a breach like this taking place.</li><li><a title="FireEye Report on TRITON" rel="nofollow" href="https://www.fireeye.com/blog/threat-research/2017/12/attackers-deploy-new-ics-attack-framework-triton.html">FireEye Report on TRITON</a> &mdash; We assess with moderate confidence that the attacker was developing the capability to cause physical damage and inadvertently shutdown operations. This malware, which we call TRITON, is an attack framework built to interact with Triconex Safety Instrumented System (SIS) controllers.</li><li><a title="ROBOT Attack: 19-Year-Old Bleichenbacher Attack" rel="nofollow" href="https://thehackernews.com/2017/12/bleichenbacher-robot-rsa.html">ROBOT Attack: 19-Year-Old Bleichenbacher Attack</a> &mdash; Dubbed ROBOT (Return of Bleichenbacher's Oracle Attack), the attack allows an attacker to perform RSA decryption and cryptographic operations using the private key configured on the vulnerable TLS servers.</li><li><a title="The ROBOT Attack - Offical Site" rel="nofollow" href="https://robotattack.org/">The ROBOT Attack - Offical Site</a></li><li><a title="Robot-detect: Detection script for the ROBOT vulnerability" rel="nofollow" href="https://github.com/robotattackorg/robot-detect">Robot-detect: Detection script for the ROBOT vulnerability</a> &mdash; Tool to detect the ROBOT attack (Return of Bleichenbacher's Oracle Threat).</li><li><a title="WannaCry: End of Year Retrospective" rel="nofollow" href="https://blog.kryptoslogic.com/malware/2017/12/20/end-of-year.html">WannaCry: End of Year Retrospective</a> &mdash; Since our Vantage team sinkholed and subsequently nullified the WannaCry attack on May 12th, 2017, we have been monitoring and maintaining the domain known as the WannaCry killswitch.</li><li><a title="Why NSA spied on inexplicably unencrypted Windows crash reports" rel="nofollow" href="https://arstechnica.com/information-technology/2013/12/why-nsa-spied-on-inexplicably-unencrypted-windows-crash-reports/">Why NSA spied on inexplicably unencrypted Windows crash reports</a> &mdash; And, according to slides published this weekend by Der Spiegel, this information also includes crash reports from Microsoft's Windows Error Reporting facility built in to Windows.</li><li><a title="Network namespaces" rel="nofollow" href="https://lwn.net/Articles/580893/">Network namespaces</a> &mdash;  As the name would imply, network namespaces partition the use of the network—devices, addresses, ports, routes, firewall rules, etc.—into separate boxes, essentially virtualizing the network within a single running kernel instance. </li><li><a title="namespaces - Linux manual page" rel="nofollow" href="http://man7.org/linux/man-pages/man7/namespaces.7.html">namespaces - Linux manual page</a> &mdash; A namespace wraps a global system resource in an abstraction that
       makes it appear to the processes within the namespace that they have
       their own isolated instance of the global resource.  Changes to the
       global resource are visible to other processes that are members of
       the namespace, but are invisible to other processes.  One use of
       namespaces is to implement containers.</li><li><a title="Network Namespaces » ADMIN Magazine" rel="nofollow" href="http://www.admin-magazine.com/Archive/2016/34/The-practical-benefits-of-network-namespaces">Network Namespaces » ADMIN Magazine</a> &mdash; With network namespaces, you can virtualize network devices, IPv4 and IPv6 protocol stacks, routing tables, ARP tables, and firewalls separately, as well as /proc/net, /sys/class/net/, QoS policies, port numbers, and sockets in such a way that individual applications can find a particular network setup without the use of containers.</li><li><a title="How to Get the Network Namespace Associated With a Socket" rel="nofollow" href="https://brennan.io/2017/03/08/sock-net/">How to Get the Network Namespace Associated With a Socket</a></li><li><a title="Network devices as virtual Ethernet devices" rel="nofollow" href="https://www.ibm.com/support/knowledgecenter/en/linuxonibm/com.ibm.linux.z.ldva/ldva_c_virtualizationOfNetworkDevices.html">Network devices as virtual Ethernet devices</a> &mdash; Virtualize network devices as virtual Ethernet devices by configuring direct MacVTap connections or virtual switches.</li><li><a title="Testing network software with pytest and Linux namespaces" rel="nofollow" href="https://vincent.bernat.im/en/blog/2016-testing-pytest-linux-namespaces">Testing network software with pytest and Linux namespaces</a></li><li><a title="Implementation of IEEE 802.1ab (LLDP)" rel="nofollow" href="https://vincentbernat.github.io/lldpd/">Implementation of IEEE 802.1ab (LLDP)</a> &mdash; LLDP is an industry standard protocol designed to supplant proprietary Link-Layer protocols such as EDP or CDP. The goal of LLDP is to provide an inter-vendor compatible mechanism to deliver Link-Layer notifications to adjacent network devices.</li><li><a title="WireGuard Routing &amp; Network Namespaces" rel="nofollow" href="https://www.wireguard.com/netns/">WireGuard Routing &amp; Network Namespaces</a> &mdash; This allows for some very cool properties. Namely, you can create the WireGuard interface in one namespace (A), move it to another (B), and have cleartext packets sent from namespace B get sent encrypted through a UDP socket in namespace A.</li><li><a title="VRF for Linux" rel="nofollow" href="https://cumulusnetworks.com/blog/vrf-for-linux/">VRF for Linux</a> &mdash; The concept of VRF was first introduced around 1999 for L3 VPNs, but it has become a fundamental feature for a networking OS. VRF provides traffic isolation at layer 3 for routing, similar to how you use a VLAN to isolate traffic at layer 2. Think multiple routing tables.</li><li><a title="linux/vrf.txt at master · torvalds/linux · GitHub" rel="nofollow" href="https://github.com/torvalds/linux/blob/master/Documentation/networking/vrf.txt">linux/vrf.txt at master · torvalds/linux · GitHub</a></li><li><a title="Using VRFs with linux " rel="nofollow" href="https://andir.github.io/posts/linux-ip-vrf/">Using VRFs with linux </a></li><li><a title="Feedback - DHCPDECLINE over and over again" rel="nofollow" href="https://slexy.org/view/s20dzBcJU2">Feedback - DHCPDECLINE over and over again</a></li><li><a title="DHCP Snooping - Cisco" rel="nofollow" href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/snoodhcp.html">DHCP Snooping - Cisco</a></li><li><a title="Hidden Backdoor Found In WordPress Captcha Plugin Affects Over 300,000 Sites" rel="nofollow" href="https://thehackernews.com/2017/12/wordpress-security-plugin.html">Hidden Backdoor Found In WordPress Captcha Plugin Affects Over 300,000 Sites</a> &mdash; In a blog post published on Tuesday, WordFence security firm revealed why WordPress recently kicked a popular Captcha plugin with more than 300,000 active installations out of its official plugin store.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Network Namespaces have been around for a while, but there may be be some very practical ways to use them that you’ve never considered. Wes does a deep dive into a very flexible tool.</p>

<p>Plus what might be the world’s most important killswitch, the real dollar values for stolen credentials and the 19 year old attack that’s back.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li></ul><p>Links:</p><ul><li><a title="The Market for Stolen Account Credentials" rel="nofollow" href="https://krebsonsecurity.com/2017/12/the-market-for-stolen-account-credentials/">The Market for Stolen Account Credentials</a> &mdash; But oh, how times have changed! With dozens of sites in the underground now competing to purchase and resell credentials for a variety of online locations, it has never been easier for a botmaster to earn a handsome living based solely on the sale of stolen usernames and passwords alone.</li><li><a title="Hackers shut down plant by targeting its safety system" rel="nofollow" href="https://www.engadget.com/2017/12/17/hackers-shut-down-plant-by-targeting-safety-system/">Hackers shut down plant by targeting its safety system</a> &mdash;  FireEye reported that a plant of an unmentioned nature and location (other firms believe it's in the Middle East) was forced to shut down after a hack targeted its industrial safety system -- it's the first known instance of a breach like this taking place.</li><li><a title="FireEye Report on TRITON" rel="nofollow" href="https://www.fireeye.com/blog/threat-research/2017/12/attackers-deploy-new-ics-attack-framework-triton.html">FireEye Report on TRITON</a> &mdash; We assess with moderate confidence that the attacker was developing the capability to cause physical damage and inadvertently shutdown operations. This malware, which we call TRITON, is an attack framework built to interact with Triconex Safety Instrumented System (SIS) controllers.</li><li><a title="ROBOT Attack: 19-Year-Old Bleichenbacher Attack" rel="nofollow" href="https://thehackernews.com/2017/12/bleichenbacher-robot-rsa.html">ROBOT Attack: 19-Year-Old Bleichenbacher Attack</a> &mdash; Dubbed ROBOT (Return of Bleichenbacher's Oracle Attack), the attack allows an attacker to perform RSA decryption and cryptographic operations using the private key configured on the vulnerable TLS servers.</li><li><a title="The ROBOT Attack - Offical Site" rel="nofollow" href="https://robotattack.org/">The ROBOT Attack - Offical Site</a></li><li><a title="Robot-detect: Detection script for the ROBOT vulnerability" rel="nofollow" href="https://github.com/robotattackorg/robot-detect">Robot-detect: Detection script for the ROBOT vulnerability</a> &mdash; Tool to detect the ROBOT attack (Return of Bleichenbacher's Oracle Threat).</li><li><a title="WannaCry: End of Year Retrospective" rel="nofollow" href="https://blog.kryptoslogic.com/malware/2017/12/20/end-of-year.html">WannaCry: End of Year Retrospective</a> &mdash; Since our Vantage team sinkholed and subsequently nullified the WannaCry attack on May 12th, 2017, we have been monitoring and maintaining the domain known as the WannaCry killswitch.</li><li><a title="Why NSA spied on inexplicably unencrypted Windows crash reports" rel="nofollow" href="https://arstechnica.com/information-technology/2013/12/why-nsa-spied-on-inexplicably-unencrypted-windows-crash-reports/">Why NSA spied on inexplicably unencrypted Windows crash reports</a> &mdash; And, according to slides published this weekend by Der Spiegel, this information also includes crash reports from Microsoft's Windows Error Reporting facility built in to Windows.</li><li><a title="Network namespaces" rel="nofollow" href="https://lwn.net/Articles/580893/">Network namespaces</a> &mdash;  As the name would imply, network namespaces partition the use of the network—devices, addresses, ports, routes, firewall rules, etc.—into separate boxes, essentially virtualizing the network within a single running kernel instance. </li><li><a title="namespaces - Linux manual page" rel="nofollow" href="http://man7.org/linux/man-pages/man7/namespaces.7.html">namespaces - Linux manual page</a> &mdash; A namespace wraps a global system resource in an abstraction that
       makes it appear to the processes within the namespace that they have
       their own isolated instance of the global resource.  Changes to the
       global resource are visible to other processes that are members of
       the namespace, but are invisible to other processes.  One use of
       namespaces is to implement containers.</li><li><a title="Network Namespaces » ADMIN Magazine" rel="nofollow" href="http://www.admin-magazine.com/Archive/2016/34/The-practical-benefits-of-network-namespaces">Network Namespaces » ADMIN Magazine</a> &mdash; With network namespaces, you can virtualize network devices, IPv4 and IPv6 protocol stacks, routing tables, ARP tables, and firewalls separately, as well as /proc/net, /sys/class/net/, QoS policies, port numbers, and sockets in such a way that individual applications can find a particular network setup without the use of containers.</li><li><a title="How to Get the Network Namespace Associated With a Socket" rel="nofollow" href="https://brennan.io/2017/03/08/sock-net/">How to Get the Network Namespace Associated With a Socket</a></li><li><a title="Network devices as virtual Ethernet devices" rel="nofollow" href="https://www.ibm.com/support/knowledgecenter/en/linuxonibm/com.ibm.linux.z.ldva/ldva_c_virtualizationOfNetworkDevices.html">Network devices as virtual Ethernet devices</a> &mdash; Virtualize network devices as virtual Ethernet devices by configuring direct MacVTap connections or virtual switches.</li><li><a title="Testing network software with pytest and Linux namespaces" rel="nofollow" href="https://vincent.bernat.im/en/blog/2016-testing-pytest-linux-namespaces">Testing network software with pytest and Linux namespaces</a></li><li><a title="Implementation of IEEE 802.1ab (LLDP)" rel="nofollow" href="https://vincentbernat.github.io/lldpd/">Implementation of IEEE 802.1ab (LLDP)</a> &mdash; LLDP is an industry standard protocol designed to supplant proprietary Link-Layer protocols such as EDP or CDP. The goal of LLDP is to provide an inter-vendor compatible mechanism to deliver Link-Layer notifications to adjacent network devices.</li><li><a title="WireGuard Routing &amp; Network Namespaces" rel="nofollow" href="https://www.wireguard.com/netns/">WireGuard Routing &amp; Network Namespaces</a> &mdash; This allows for some very cool properties. Namely, you can create the WireGuard interface in one namespace (A), move it to another (B), and have cleartext packets sent from namespace B get sent encrypted through a UDP socket in namespace A.</li><li><a title="VRF for Linux" rel="nofollow" href="https://cumulusnetworks.com/blog/vrf-for-linux/">VRF for Linux</a> &mdash; The concept of VRF was first introduced around 1999 for L3 VPNs, but it has become a fundamental feature for a networking OS. VRF provides traffic isolation at layer 3 for routing, similar to how you use a VLAN to isolate traffic at layer 2. Think multiple routing tables.</li><li><a title="linux/vrf.txt at master · torvalds/linux · GitHub" rel="nofollow" href="https://github.com/torvalds/linux/blob/master/Documentation/networking/vrf.txt">linux/vrf.txt at master · torvalds/linux · GitHub</a></li><li><a title="Using VRFs with linux " rel="nofollow" href="https://andir.github.io/posts/linux-ip-vrf/">Using VRFs with linux </a></li><li><a title="Feedback - DHCPDECLINE over and over again" rel="nofollow" href="https://slexy.org/view/s20dzBcJU2">Feedback - DHCPDECLINE over and over again</a></li><li><a title="DHCP Snooping - Cisco" rel="nofollow" href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/snoodhcp.html">DHCP Snooping - Cisco</a></li><li><a title="Hidden Backdoor Found In WordPress Captcha Plugin Affects Over 300,000 Sites" rel="nofollow" href="https://thehackernews.com/2017/12/wordpress-security-plugin.html">Hidden Backdoor Found In WordPress Captcha Plugin Affects Over 300,000 Sites</a> &mdash; In a blog post published on Tuesday, WordFence security firm revealed why WordPress recently kicked a popular Captcha plugin with more than 300,000 active installations out of its official plugin store.</li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
