<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 08 Apr 2026 13:00:05 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Tcp”</title>
    <link>https://techsnap.systems/tags/tcp</link>
    <pubDate>Fri, 04 Oct 2019 00:15:00 -0700</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>413: The Coffee Shop Problem</title>
  <link>https://techsnap.systems/413</link>
  <guid isPermaLink="false">2c022259-3aec-490f-b2e3-0560336bafce</guid>
  <pubDate>Fri, 04 Oct 2019 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/2c022259-3aec-490f-b2e3-0560336bafce.mp3" length="23110449" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We peer into the future with a quick look at quantum supremacy, debate the latest DNS over HTTPS drama, and jump through the hoops of HTTP/3.
</itunes:subtitle>
  <itunes:duration>32:05</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We peer into the future with a quick look at quantum supremacy, debate the latest DNS over HTTPS drama, and jump through the hoops of HTTP/3.
Plus when to use WARP, the secrets of Startpage, and the latest Ryzen release. 
</description>
  <itunes:keywords>DoH, DNS, HTTPS, TLS, SSL, DNS-over-HTTPS, Google, Mozilla, Firefox, Cloudflare, encryption, Windows, Chrome, MITM, Man-In-The-Middle, Quad-9, 1.1.1.1, 8.8.8.8, Cloudflare DNS, Google DNS, Wireguard, Wireguard VPN, VPN, WARP, privacy, anonymity, region shifting, mmproxy, tcp, tcp/ip, ip, forwarding, proxy, iptables, HTTP/3, QUIC, udp, 0-RTT, SPDY, networking, network protocol, curl, quiche, rust, chrome canary, canary, startpage, duckduckgo, google search, search engines, cookies, incognito, startmail, web proxy, Chromebook, chromebook support, lenovo, lenovo chromebook, security updates, Quantum computing, quantum computers, quantum supremacy, shor's algorithm, cryptography, public-key cryptography, AMD, AMD Ryzen, Ryzen PRO, Ryzen PRO 3000, memory encryption, devops, sysadmin podcast, jupiter broadcasting, linux academy, techsnap, guardmi</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We peer into the future with a quick look at quantum supremacy, debate the latest DNS over HTTPS drama, and jump through the hoops of HTTP/3.</p>

<p>Plus when to use WARP, the secrets of Startpage, and the latest Ryzen release. </p><p>Links:</p><ul><li><a title="Why big ISPs aren’t happy about Google’s plans for encrypted DNS" rel="nofollow" href="https://arstechnica.com/tech-policy/2019/09/isps-worry-a-new-chrome-feature-will-stop-them-from-spying-on-you/">Why big ISPs aren’t happy about Google’s plans for encrypted DNS</a></li><li><a title="Chromium Blog: Experimenting with same-provider DNS-over-HTTPS upgrade" rel="nofollow" href="https://blog.chromium.org/2019/09/experimenting-with-same-provider-dns.html">Chromium Blog: Experimenting with same-provider DNS-over-HTTPS upgrade</a></li><li><a title="How to enable DNS-over-HTTPS (DoH) in Google Chrome" rel="nofollow" href="https://www.zdnet.com/article/how-to-enable-dns-over-https-doh-in-google-chrome/">How to enable DNS-over-HTTPS (DoH) in Google Chrome</a></li><li><a title="What’s next in making Encrypted DNS-over-HTTPS the Default - Future Releases" rel="nofollow" href="https://blog.mozilla.org/futurereleases/2019/09/06/whats-next-in-making-dns-over-https-the-default/">What’s next in making Encrypted DNS-over-HTTPS the Default - Future Releases</a></li><li><a title="WARP is here" rel="nofollow" href="https://blog.cloudflare.com/announcing-warp-plus/">WARP is here</a></li><li><a title="The Technical Challenges of Building Cloudflare WARP" rel="nofollow" href="https://blog.cloudflare.com/warp-technical-challenges/">The Technical Challenges of Building Cloudflare WARP</a></li><li><a title="mmproxy - Creative Linux routing to preserve client IP addresses in L7 proxies" rel="nofollow" href="https://blog.cloudflare.com/mmproxy-creative-way-of-preserving-client-ips-in-spectrum/">mmproxy - Creative Linux routing to preserve client IP addresses in L7 proxies</a></li><li><a title="HTTP/3: the past, the present, and the future" rel="nofollow" href="https://blog.cloudflare.com/http3-the-past-present-and-future/">HTTP/3: the past, the present, and the future</a></li><li><a title="Cloudflare, Google Chrome, and Firefox add HTTP/3 support | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/cloudflare-google-chrome-and-firefox-add-http3-support/">Cloudflare, Google Chrome, and Firefox add HTTP/3 support | ZDNet</a></li><li><a title="QUIC Implementations" rel="nofollow" href="https://github.com/quicwg/base-drafts/wiki/Implementations">QUIC Implementations</a></li><li><a title="Startpage.com - The world&#39;s most private search engine" rel="nofollow" href="https://www.startpage.com/en/">Startpage.com - The world's most private search engine</a></li><li><a title="Google extends support lifespan for seven Lenovo Chromebooks to 2025" rel="nofollow" href="https://www.androidpolice.com/2019/09/25/lenovo-chromebook-update-support-expire/">Google extends support lifespan for seven Lenovo Chromebooks to 2025</a></li><li><a title="Google’s Quantum Supremacy Announcement Shouldn&#39;t Be a Surprise" rel="nofollow" href="https://gizmodo.com/google-s-quantum-supremacy-announcement-shouldnt-be-a-s-1838357278">Google’s Quantum Supremacy Announcement Shouldn't Be a Surprise</a></li><li><a title="Scott’s Supreme Quantum Supremacy FAQ" rel="nofollow" href="https://www.scottaaronson.com/blog/?p=4317">Scott’s Supreme Quantum Supremacy FAQ</a></li><li><a title="AMD Ryzen Pro 3000 series desktop CPUs will offer full RAM encryption | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/10/amd-ryzen-pro-3000-series-desktop-cpus-will-offer-full-ram-encryption/">AMD Ryzen Pro 3000 series desktop CPUs will offer full RAM encryption | Ars Technica</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We peer into the future with a quick look at quantum supremacy, debate the latest DNS over HTTPS drama, and jump through the hoops of HTTP/3.</p>

<p>Plus when to use WARP, the secrets of Startpage, and the latest Ryzen release. </p><p>Links:</p><ul><li><a title="Why big ISPs aren’t happy about Google’s plans for encrypted DNS" rel="nofollow" href="https://arstechnica.com/tech-policy/2019/09/isps-worry-a-new-chrome-feature-will-stop-them-from-spying-on-you/">Why big ISPs aren’t happy about Google’s plans for encrypted DNS</a></li><li><a title="Chromium Blog: Experimenting with same-provider DNS-over-HTTPS upgrade" rel="nofollow" href="https://blog.chromium.org/2019/09/experimenting-with-same-provider-dns.html">Chromium Blog: Experimenting with same-provider DNS-over-HTTPS upgrade</a></li><li><a title="How to enable DNS-over-HTTPS (DoH) in Google Chrome" rel="nofollow" href="https://www.zdnet.com/article/how-to-enable-dns-over-https-doh-in-google-chrome/">How to enable DNS-over-HTTPS (DoH) in Google Chrome</a></li><li><a title="What’s next in making Encrypted DNS-over-HTTPS the Default - Future Releases" rel="nofollow" href="https://blog.mozilla.org/futurereleases/2019/09/06/whats-next-in-making-dns-over-https-the-default/">What’s next in making Encrypted DNS-over-HTTPS the Default - Future Releases</a></li><li><a title="WARP is here" rel="nofollow" href="https://blog.cloudflare.com/announcing-warp-plus/">WARP is here</a></li><li><a title="The Technical Challenges of Building Cloudflare WARP" rel="nofollow" href="https://blog.cloudflare.com/warp-technical-challenges/">The Technical Challenges of Building Cloudflare WARP</a></li><li><a title="mmproxy - Creative Linux routing to preserve client IP addresses in L7 proxies" rel="nofollow" href="https://blog.cloudflare.com/mmproxy-creative-way-of-preserving-client-ips-in-spectrum/">mmproxy - Creative Linux routing to preserve client IP addresses in L7 proxies</a></li><li><a title="HTTP/3: the past, the present, and the future" rel="nofollow" href="https://blog.cloudflare.com/http3-the-past-present-and-future/">HTTP/3: the past, the present, and the future</a></li><li><a title="Cloudflare, Google Chrome, and Firefox add HTTP/3 support | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/cloudflare-google-chrome-and-firefox-add-http3-support/">Cloudflare, Google Chrome, and Firefox add HTTP/3 support | ZDNet</a></li><li><a title="QUIC Implementations" rel="nofollow" href="https://github.com/quicwg/base-drafts/wiki/Implementations">QUIC Implementations</a></li><li><a title="Startpage.com - The world&#39;s most private search engine" rel="nofollow" href="https://www.startpage.com/en/">Startpage.com - The world's most private search engine</a></li><li><a title="Google extends support lifespan for seven Lenovo Chromebooks to 2025" rel="nofollow" href="https://www.androidpolice.com/2019/09/25/lenovo-chromebook-update-support-expire/">Google extends support lifespan for seven Lenovo Chromebooks to 2025</a></li><li><a title="Google’s Quantum Supremacy Announcement Shouldn&#39;t Be a Surprise" rel="nofollow" href="https://gizmodo.com/google-s-quantum-supremacy-announcement-shouldnt-be-a-s-1838357278">Google’s Quantum Supremacy Announcement Shouldn't Be a Surprise</a></li><li><a title="Scott’s Supreme Quantum Supremacy FAQ" rel="nofollow" href="https://www.scottaaronson.com/blog/?p=4317">Scott’s Supreme Quantum Supremacy FAQ</a></li><li><a title="AMD Ryzen Pro 3000 series desktop CPUs will offer full RAM encryption | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/10/amd-ryzen-pro-3000-series-desktop-cpus-will-offer-full-ram-encryption/">AMD Ryzen Pro 3000 series desktop CPUs will offer full RAM encryption | Ars Technica</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>406: SACK Attack</title>
  <link>https://techsnap.systems/406</link>
  <guid isPermaLink="false">310be811-6d1b-4463-96f3-8fc9579a5d66</guid>
  <pubDate>Sun, 23 Jun 2019 18:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/310be811-6d1b-4463-96f3-8fc9579a5d66.mp3" length="31361276" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>A new vulnerability may be the next 'Ping of Death'; we explore the details of SACK Panic and break down what you need to know.</itunes:subtitle>
  <itunes:duration>43:33</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>A new vulnerability may be the next 'Ping of Death'; we explore the details of SACK Panic and break down what you need to know.
Plus Firefox zero days targeting Coinbase, the latest update on Rowhammer, and a few more reasons it's a great time to be a ZFS user. 
</description>
  <itunes:keywords>SACK Panic, TCP, networking, Linux, FreeBSD, security, mss, ping of death, rowhammer, rambleed, RAM, ECC, memory, DRAM, Firefox, backdoor, Mozilla, zero day, sandbox, sandbox escape, targeted attack, cryptocurrency, crypto, ZFS, OpenZFS, TRIM, SSD, encryption, raw send, device removal, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>A new vulnerability may be the next &#39;Ping of Death&#39;; we explore the details of SACK Panic and break down what you need to know.</p>

<p>Plus Firefox zero days targeting Coinbase, the latest update on Rowhammer, and a few more reasons it&#39;s a great time to be a ZFS user.</p><p>Links:</p><ul><li><a title="SACK Panic Security Bulletin" rel="nofollow" href="https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md">SACK Panic Security Bulletin</a> &mdash; Netflix has identified several TCP networking vulnerabilities in FreeBSD and Linux kernels. The vulnerabilities specifically relate to the Maximum Segment Size (MSS) and TCP Selective Acknowledgement (SACK) capabilities. The most serious, dubbed “SACK Panic,” allows a remotely-triggered kernel panic on recent Linux kernels.</li><li><a title="Ubuntu SACK Panic Guidance" rel="nofollow" href="https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic">Ubuntu SACK Panic Guidance</a> &mdash; You should update your kernel to the versions specified below in the Updates section and reboot. Alternatively, Canonical Livepatch updates will be available to mitigate these two issues without the need to reboot.
</li><li><a title="Red Hat SACK Panic Advisory" rel="nofollow" href="https://access.redhat.com/security/vulnerabilities/tcpsack">Red Hat SACK Panic Advisory</a> &mdash; Red Hat customers running affected versions of these Red Hat products are strongly recommended to update them as soon as errata are available. Customers are urged to apply the available updates immediately and enable the mitigations as they feel appropriate.   

</li><li><a title="RFC 2018 - TCP Selective Acknowledgment Options" rel="nofollow" href="https://tools.ietf.org/html/rfc2018">RFC 2018 - TCP Selective Acknowledgment Options</a> &mdash; TCP may experience poor performance when multiple packets are lost from one window of data. With the limited information available from cumulative acknowledgments, a TCP sender can only learn about a single lost packet per round trip time.  An aggressive sender could choose to retransmit packets early, but such retransmitted segments may have already been successfully received. A Selective Acknowledgment (SACK) mechanism, combined with a selective repeat retransmission policy, can help to overcome these limitations.</li><li><a title="Ping of Death" rel="nofollow" href="https://insecure.org/sploits/ping-o-death.html">Ping of Death</a> &mdash; In a nutshell, it is possible to crash, reboot or otherwise kill a large number of systems by sending a ping of a certain size from a remote machine.</li><li><a title="Firefox zero-day was used in attack against Coinbase employees, not its users | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/firefox-zero-day-was-used-in-attack-against-coinbase-employees-not-its-users/">Firefox zero-day was used in attack against Coinbase employees, not its users | ZDNet</a> &mdash; A recent Firefox zero-day that has made headlines across the tech news world this week was actually used in attacks against Coinbase employees, and not the company's users.</li><li><a title="Mozilla fixes second Firefox zero-day exploited in the wild | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/mozilla-fixes-second-firefox-zero-day-exploited-in-the-wild/">Mozilla fixes second Firefox zero-day exploited in the wild | ZDNet</a> &mdash; Mozilla has released a second security update this week to patch a second zero-day that was being exploited in the wild to attack Coinbase employees and other cryptocurrency organizations.

</li><li><a title="RAMBleed" rel="nofollow" href="https://rambleed.com/">RAMBleed</a> &mdash; RAMBleed is a side-channel attack that enables an attacker to read out physical memory belonging to other processes. The implications of violating arbitrary privilege boundaries are numerous, and vary in severity based on the other software running on the target machine. As an example, in our paper we demonstrate an attack against OpenSSH in which we use RAMBleed to leak a 2048 bit RSA key. </li><li><a title="Digging into the new features in OpenZFS post-Linux migration | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/06/zfs-features-bugfixes-0-8-1/">Digging into the new features in OpenZFS post-Linux migration | Ars Technica</a> &mdash; One of the most important new features in 0.8 is Native ZFS Encryption. Until now, ZFS users have relied on OS-provided encrypted filesystem layers either above or below ZFS. While this approach does work, it presented difficulties.</li><li><a title="Allan Jude on Twitter" rel="nofollow" href="https://twitter.com/allanjude/status/1138651704558346245">Allan Jude on Twitter</a> &mdash; Once the FreeBSDs are upstreamed, everything is changing to 'OpenZFS', including the github organization currently know as 'zfsonlinux'.</li><li><a title="ZFS on Linux Releases" rel="nofollow" href="https://github.com/zfsonlinux/zfs/releases">ZFS on Linux Releases</a></li><li><a title="Linux Academy is hiring! " rel="nofollow" href="https://jobs.lever.co/linuxacademy/">Linux Academy is hiring! </a></li><li><a title="Mozilla teases $5-per-month ad-free news subscription" rel="nofollow" href="https://www.theverge.com/2019/7/5/20683059/mozilla-news-subscription-service-ad-free-scroll-price">Mozilla teases $5-per-month ad-free news subscription</a> &mdash; Mozilla has started teasing an ad-free news subscription service, which, for $5 per month, would offer ad-free browsing, audio readouts, and cross-platform syncing of news articles from a number of websites.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>A new vulnerability may be the next &#39;Ping of Death&#39;; we explore the details of SACK Panic and break down what you need to know.</p>

<p>Plus Firefox zero days targeting Coinbase, the latest update on Rowhammer, and a few more reasons it&#39;s a great time to be a ZFS user.</p><p>Links:</p><ul><li><a title="SACK Panic Security Bulletin" rel="nofollow" href="https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md">SACK Panic Security Bulletin</a> &mdash; Netflix has identified several TCP networking vulnerabilities in FreeBSD and Linux kernels. The vulnerabilities specifically relate to the Maximum Segment Size (MSS) and TCP Selective Acknowledgement (SACK) capabilities. The most serious, dubbed “SACK Panic,” allows a remotely-triggered kernel panic on recent Linux kernels.</li><li><a title="Ubuntu SACK Panic Guidance" rel="nofollow" href="https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic">Ubuntu SACK Panic Guidance</a> &mdash; You should update your kernel to the versions specified below in the Updates section and reboot. Alternatively, Canonical Livepatch updates will be available to mitigate these two issues without the need to reboot.
</li><li><a title="Red Hat SACK Panic Advisory" rel="nofollow" href="https://access.redhat.com/security/vulnerabilities/tcpsack">Red Hat SACK Panic Advisory</a> &mdash; Red Hat customers running affected versions of these Red Hat products are strongly recommended to update them as soon as errata are available. Customers are urged to apply the available updates immediately and enable the mitigations as they feel appropriate.   

</li><li><a title="RFC 2018 - TCP Selective Acknowledgment Options" rel="nofollow" href="https://tools.ietf.org/html/rfc2018">RFC 2018 - TCP Selective Acknowledgment Options</a> &mdash; TCP may experience poor performance when multiple packets are lost from one window of data. With the limited information available from cumulative acknowledgments, a TCP sender can only learn about a single lost packet per round trip time.  An aggressive sender could choose to retransmit packets early, but such retransmitted segments may have already been successfully received. A Selective Acknowledgment (SACK) mechanism, combined with a selective repeat retransmission policy, can help to overcome these limitations.</li><li><a title="Ping of Death" rel="nofollow" href="https://insecure.org/sploits/ping-o-death.html">Ping of Death</a> &mdash; In a nutshell, it is possible to crash, reboot or otherwise kill a large number of systems by sending a ping of a certain size from a remote machine.</li><li><a title="Firefox zero-day was used in attack against Coinbase employees, not its users | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/firefox-zero-day-was-used-in-attack-against-coinbase-employees-not-its-users/">Firefox zero-day was used in attack against Coinbase employees, not its users | ZDNet</a> &mdash; A recent Firefox zero-day that has made headlines across the tech news world this week was actually used in attacks against Coinbase employees, and not the company's users.</li><li><a title="Mozilla fixes second Firefox zero-day exploited in the wild | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/mozilla-fixes-second-firefox-zero-day-exploited-in-the-wild/">Mozilla fixes second Firefox zero-day exploited in the wild | ZDNet</a> &mdash; Mozilla has released a second security update this week to patch a second zero-day that was being exploited in the wild to attack Coinbase employees and other cryptocurrency organizations.

</li><li><a title="RAMBleed" rel="nofollow" href="https://rambleed.com/">RAMBleed</a> &mdash; RAMBleed is a side-channel attack that enables an attacker to read out physical memory belonging to other processes. The implications of violating arbitrary privilege boundaries are numerous, and vary in severity based on the other software running on the target machine. As an example, in our paper we demonstrate an attack against OpenSSH in which we use RAMBleed to leak a 2048 bit RSA key. </li><li><a title="Digging into the new features in OpenZFS post-Linux migration | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/06/zfs-features-bugfixes-0-8-1/">Digging into the new features in OpenZFS post-Linux migration | Ars Technica</a> &mdash; One of the most important new features in 0.8 is Native ZFS Encryption. Until now, ZFS users have relied on OS-provided encrypted filesystem layers either above or below ZFS. While this approach does work, it presented difficulties.</li><li><a title="Allan Jude on Twitter" rel="nofollow" href="https://twitter.com/allanjude/status/1138651704558346245">Allan Jude on Twitter</a> &mdash; Once the FreeBSDs are upstreamed, everything is changing to 'OpenZFS', including the github organization currently know as 'zfsonlinux'.</li><li><a title="ZFS on Linux Releases" rel="nofollow" href="https://github.com/zfsonlinux/zfs/releases">ZFS on Linux Releases</a></li><li><a title="Linux Academy is hiring! " rel="nofollow" href="https://jobs.lever.co/linuxacademy/">Linux Academy is hiring! </a></li><li><a title="Mozilla teases $5-per-month ad-free news subscription" rel="nofollow" href="https://www.theverge.com/2019/7/5/20683059/mozilla-news-subscription-service-ad-free-scroll-price">Mozilla teases $5-per-month ad-free news subscription</a> &mdash; Mozilla has started teasing an ad-free news subscription service, which, for $5 per month, would offer ad-free browsing, audio readouts, and cross-platform syncing of news articles from a number of websites.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>403: Keeping Systems Simple</title>
  <link>https://techsnap.systems/403</link>
  <guid isPermaLink="false">e26c9e2a-3e0f-40b9-9875-d72821ee1792</guid>
  <pubDate>Fri, 10 May 2019 21:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/e26c9e2a-3e0f-40b9-9875-d72821ee1792.mp3" length="33509482" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We’re back from LinuxFest Northwest with an update on all things WireGuard, some VLAN myth busting, and the trade-offs of highly available systems.</itunes:subtitle>
  <itunes:duration>46:32</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We’re back from LinuxFest Northwest with an update on all things WireGuard, some VLAN myth busting, and the trade-offs of highly available systems. 
</description>
  <itunes:keywords>wireguard, vpn, openvpn, tinc, ipsec, lfnw, tunnel, ssh, mesh network, layer 3, tcp, udp, dhcp, ethernet, vlan, switch, router, firewall, kubernetes, linux, wintun, high availability, reliability, availability, disaster recovery, rto, rpo, security, quantum computers, cryptography, simplicity, SysAdmin podcast, subspace, zinc, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We’re back from LinuxFest Northwest with an update on all things WireGuard, some VLAN myth busting, and the trade-offs of highly available systems.</p><p>Links:</p><ul><li><a title="TechSNAP Episode 390: What’s Up with WireGuard" rel="nofollow" href="https://techsnap.systems/390">TechSNAP Episode 390: What’s Up with WireGuard</a></li><li><a title="WireGuard Sent Out Again For Review" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=WireGuard-V9-Maybe-Linux-5.2">WireGuard Sent Out Again For Review</a> &mdash; WireGuard lead developer Jason Donenfeld has sent out the ninth version of the WireGuard secure network tunnel patches for review. If this review goes well and lands in net-next in the weeks ahead, this long-awaited VPN improvement could make it into the mainline Linux 5.2 kernel. 
</li><li><a title="CloudFlare announces Warp VPN" rel="nofollow" href="https://securitybaron.com/news/cloudflare-warp-vpn/">CloudFlare announces Warp VPN</a> &mdash; Using Cloudflare’s existing network of servers, Internet users all over the world will be able to connect to Warp VPN through the 1.1.1.1 app. In the same vein, Warp VPN will not significantly increase battery usage by using an efficient protocol called WireGuard.</li><li><a title="CloudFlare Launches &quot;BoringTun&quot; As Rust-Written WireGuard User-Space Implementation - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=CloudFlare-BoringTun-WireGuard">CloudFlare Launches "BoringTun" As Rust-Written WireGuard User-Space Implementation - Phoronix</a> &mdash; CloudFlare took to creating BoringTun as they wanted a user-space solution as not to have to deal with kernel modules or satisfying certain kernel versions. They also wanted cross platform support and for their chosen implementation to be very fast, these choices which led them to writing a Rust-based solution. </li><li><a title="cloudflare/boringtun" rel="nofollow" href="https://github.com/cloudflare/boringtun">cloudflare/boringtun</a> &mdash; BoringTun is an implementation of the WireGuard® protocol designed for portability and speed.

</li><li><a title="VPN protocol WireGuard now has an official macOS app" rel="nofollow" href="https://techcrunch.com/2019/02/18/vpn-protocol-wireguard-now-has-an-official-macos-app/">VPN protocol WireGuard now has an official macOS app</a> &mdash; You can already download the WireGuard app on Android and iOS, but today’s release is all about macOS.</li><li><a title="WireGuard Windows Pre-Alpha" rel="nofollow" href="https://lists.zx2c4.com/pipermail/wireguard/2019-May/004126.html">WireGuard Windows Pre-Alpha</a> &mdash; I've been mostly absent these last weeks, due to being completely absorbed in Windows programming. I think we're finally getting to the state where we might really benefit from testing of the "pre-alpha".</li><li><a title="Wintun – Layer 3 TUN Driver for Windows" rel="nofollow" href="https://www.wintun.net/">Wintun – Layer 3 TUN Driver for Windows</a> &mdash; Wintun is a very simple and minimal TUN driver for the Windows kernel, which provides userspace programs with a simple network adapter for reading and writing packets. It is akin to Linux's /dev/net/tun and BSD's /dev/tun. </li><li><a title="WireGuard for Kubernetes: Introducing Gravitational Wormhole" rel="nofollow" href="https://gravitational.com/blog/announcing_wormhole/">WireGuard for Kubernetes: Introducing Gravitational Wormhole</a> &mdash; Wormhole is a Kubernetes network plugin that combines the simplicity of flannel with encrypted networking from WireGuard.</li><li><a title="gravitational/wormhole: Wireguard based overlay network CNI plugin for kubernetes" rel="nofollow" href="https://github.com/gravitational/wormhole#getting-started">gravitational/wormhole: Wireguard based overlay network CNI plugin for kubernetes</a></li><li><a title="NetworkManager 1.16" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=NetworkManager-1.16-Released">NetworkManager 1.16</a> &mdash; NetworkManager 1.16 is a big feature release bringing support for WireGuard VPN tunnels</li><li><a title="Portal Cloud - Subspace" rel="nofollow" href="https://portal.cloud/app/subspace">Portal Cloud - Subspace</a> &mdash; Subspace is an open source WireGuard® VPN server that supports connecting all of your devices to help secure your internet access.

</li><li><a title="subspacecloud/subspace" rel="nofollow" href="https://github.com/subspacecloud/subspace">subspacecloud/subspace</a> &mdash; A simple WireGuard VPN server GUI</li><li><a title="jimsalterjrs/wg-admin" rel="nofollow" href="https://github.com/jimsalterjrs/wg-admin">jimsalterjrs/wg-admin</a> &mdash; Simple CLI utilities to manage a WireGuard server</li><li><a title="5 big misconceptions about virtual LANs" rel="nofollow" href="https://www.pluralsight.com/blog/it-ops/5-big-misconceptions-about-virtual-lans-">5 big misconceptions about virtual LANs</a> &mdash; In the real world, VLANs are anything but simple.
</li><li><a title="High Availability vs. Fault Tolerance vs. Disaster Recovery" rel="nofollow" href="https://www.greenhousedata.com/blog/high-availability-vs-fault-tolerance-vs-disaster-recovery">High Availability vs. Fault Tolerance vs. Disaster Recovery</a> &mdash; You need IT infrastructure that you can count on even when you run into the rare network outage, equipment failure, or power issue. When your systems run into trouble, that’s where one or more of the three primary availability strategies will come into play: high availability, fault tolerance, and/or disaster recovery.</li><li><a title="High Availability: Concepts and Theory" rel="nofollow" href="https://hackernoon.com/high-availability-concepts-and-theory-980c58cbf87b">High Availability: Concepts and Theory</a> &mdash; Running server operations using clusters of either physical or virtual computers is all about improving both reliability and performance over and above what you could expect from a single, high-powered server. </li><li><a title="RPO and RTO: Understanding the Differences" rel="nofollow" href="https://www.enterprisestorageforum.com/storage-management/rpo-and-rto-understanding-the-differences.html">RPO and RTO: Understanding the Differences</a> &mdash; Recovery time objective refers to how much time an application can be down without causing significant damage to the business. Recovery point objectives refer to your company’s loss tolerance: the amount of data that can be lost before significant harm to the business occurs.</li><li><a title="JupiterBroadcasting/Talks" rel="nofollow" href="https://github.com/JupiterBroadcasting/Talks">JupiterBroadcasting/Talks</a> &mdash; Public repository of crew talks, slides, and additional resources.</li><li><a title="Command Line Threat Hunting" rel="nofollow" href="https://www.meetup.com/jupiterbroadcasting/events/260707829/">Command Line Threat Hunting</a> &mdash; That viruses and malware are Windows problems is a misnomer that is often propagated through the Linux community and it's an easy one to believe until you start noticing strange behavior on your system. What do you do next? Join Ell Marquez and Tony Lambert in discussing a common sense approach to threat detection using only command line tools.</li><li><a title="Fear the Man in the Middle? This company wants to sell quantum key distribution" rel="nofollow" href="https://arstechnica.com/gadgets/2019/04/fear-the-man-in-the-middle-this-company-wants-to-sell-quantum-key-distribution/">Fear the Man in the Middle? This company wants to sell quantum key distribution</a> &mdash; For now, Quantum XChange has only said about a dozen companies are part of the pilot. But with the appetite for quantum solutions in the US increasing—the National Quantum Initiative was just signed into law at the end of 2018 to advance the tech—this could be an opportune time to enter the market, so long as the service lives up to its billing.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We’re back from LinuxFest Northwest with an update on all things WireGuard, some VLAN myth busting, and the trade-offs of highly available systems.</p><p>Links:</p><ul><li><a title="TechSNAP Episode 390: What’s Up with WireGuard" rel="nofollow" href="https://techsnap.systems/390">TechSNAP Episode 390: What’s Up with WireGuard</a></li><li><a title="WireGuard Sent Out Again For Review" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=WireGuard-V9-Maybe-Linux-5.2">WireGuard Sent Out Again For Review</a> &mdash; WireGuard lead developer Jason Donenfeld has sent out the ninth version of the WireGuard secure network tunnel patches for review. If this review goes well and lands in net-next in the weeks ahead, this long-awaited VPN improvement could make it into the mainline Linux 5.2 kernel. 
</li><li><a title="CloudFlare announces Warp VPN" rel="nofollow" href="https://securitybaron.com/news/cloudflare-warp-vpn/">CloudFlare announces Warp VPN</a> &mdash; Using Cloudflare’s existing network of servers, Internet users all over the world will be able to connect to Warp VPN through the 1.1.1.1 app. In the same vein, Warp VPN will not significantly increase battery usage by using an efficient protocol called WireGuard.</li><li><a title="CloudFlare Launches &quot;BoringTun&quot; As Rust-Written WireGuard User-Space Implementation - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=CloudFlare-BoringTun-WireGuard">CloudFlare Launches "BoringTun" As Rust-Written WireGuard User-Space Implementation - Phoronix</a> &mdash; CloudFlare took to creating BoringTun as they wanted a user-space solution as not to have to deal with kernel modules or satisfying certain kernel versions. They also wanted cross platform support and for their chosen implementation to be very fast, these choices which led them to writing a Rust-based solution. </li><li><a title="cloudflare/boringtun" rel="nofollow" href="https://github.com/cloudflare/boringtun">cloudflare/boringtun</a> &mdash; BoringTun is an implementation of the WireGuard® protocol designed for portability and speed.

</li><li><a title="VPN protocol WireGuard now has an official macOS app" rel="nofollow" href="https://techcrunch.com/2019/02/18/vpn-protocol-wireguard-now-has-an-official-macos-app/">VPN protocol WireGuard now has an official macOS app</a> &mdash; You can already download the WireGuard app on Android and iOS, but today’s release is all about macOS.</li><li><a title="WireGuard Windows Pre-Alpha" rel="nofollow" href="https://lists.zx2c4.com/pipermail/wireguard/2019-May/004126.html">WireGuard Windows Pre-Alpha</a> &mdash; I've been mostly absent these last weeks, due to being completely absorbed in Windows programming. I think we're finally getting to the state where we might really benefit from testing of the "pre-alpha".</li><li><a title="Wintun – Layer 3 TUN Driver for Windows" rel="nofollow" href="https://www.wintun.net/">Wintun – Layer 3 TUN Driver for Windows</a> &mdash; Wintun is a very simple and minimal TUN driver for the Windows kernel, which provides userspace programs with a simple network adapter for reading and writing packets. It is akin to Linux's /dev/net/tun and BSD's /dev/tun. </li><li><a title="WireGuard for Kubernetes: Introducing Gravitational Wormhole" rel="nofollow" href="https://gravitational.com/blog/announcing_wormhole/">WireGuard for Kubernetes: Introducing Gravitational Wormhole</a> &mdash; Wormhole is a Kubernetes network plugin that combines the simplicity of flannel with encrypted networking from WireGuard.</li><li><a title="gravitational/wormhole: Wireguard based overlay network CNI plugin for kubernetes" rel="nofollow" href="https://github.com/gravitational/wormhole#getting-started">gravitational/wormhole: Wireguard based overlay network CNI plugin for kubernetes</a></li><li><a title="NetworkManager 1.16" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=NetworkManager-1.16-Released">NetworkManager 1.16</a> &mdash; NetworkManager 1.16 is a big feature release bringing support for WireGuard VPN tunnels</li><li><a title="Portal Cloud - Subspace" rel="nofollow" href="https://portal.cloud/app/subspace">Portal Cloud - Subspace</a> &mdash; Subspace is an open source WireGuard® VPN server that supports connecting all of your devices to help secure your internet access.

</li><li><a title="subspacecloud/subspace" rel="nofollow" href="https://github.com/subspacecloud/subspace">subspacecloud/subspace</a> &mdash; A simple WireGuard VPN server GUI</li><li><a title="jimsalterjrs/wg-admin" rel="nofollow" href="https://github.com/jimsalterjrs/wg-admin">jimsalterjrs/wg-admin</a> &mdash; Simple CLI utilities to manage a WireGuard server</li><li><a title="5 big misconceptions about virtual LANs" rel="nofollow" href="https://www.pluralsight.com/blog/it-ops/5-big-misconceptions-about-virtual-lans-">5 big misconceptions about virtual LANs</a> &mdash; In the real world, VLANs are anything but simple.
</li><li><a title="High Availability vs. Fault Tolerance vs. Disaster Recovery" rel="nofollow" href="https://www.greenhousedata.com/blog/high-availability-vs-fault-tolerance-vs-disaster-recovery">High Availability vs. Fault Tolerance vs. Disaster Recovery</a> &mdash; You need IT infrastructure that you can count on even when you run into the rare network outage, equipment failure, or power issue. When your systems run into trouble, that’s where one or more of the three primary availability strategies will come into play: high availability, fault tolerance, and/or disaster recovery.</li><li><a title="High Availability: Concepts and Theory" rel="nofollow" href="https://hackernoon.com/high-availability-concepts-and-theory-980c58cbf87b">High Availability: Concepts and Theory</a> &mdash; Running server operations using clusters of either physical or virtual computers is all about improving both reliability and performance over and above what you could expect from a single, high-powered server. </li><li><a title="RPO and RTO: Understanding the Differences" rel="nofollow" href="https://www.enterprisestorageforum.com/storage-management/rpo-and-rto-understanding-the-differences.html">RPO and RTO: Understanding the Differences</a> &mdash; Recovery time objective refers to how much time an application can be down without causing significant damage to the business. Recovery point objectives refer to your company’s loss tolerance: the amount of data that can be lost before significant harm to the business occurs.</li><li><a title="JupiterBroadcasting/Talks" rel="nofollow" href="https://github.com/JupiterBroadcasting/Talks">JupiterBroadcasting/Talks</a> &mdash; Public repository of crew talks, slides, and additional resources.</li><li><a title="Command Line Threat Hunting" rel="nofollow" href="https://www.meetup.com/jupiterbroadcasting/events/260707829/">Command Line Threat Hunting</a> &mdash; That viruses and malware are Windows problems is a misnomer that is often propagated through the Linux community and it's an easy one to believe until you start noticing strange behavior on your system. What do you do next? Join Ell Marquez and Tony Lambert in discussing a common sense approach to threat detection using only command line tools.</li><li><a title="Fear the Man in the Middle? This company wants to sell quantum key distribution" rel="nofollow" href="https://arstechnica.com/gadgets/2019/04/fear-the-man-in-the-middle-this-company-wants-to-sell-quantum-key-distribution/">Fear the Man in the Middle? This company wants to sell quantum key distribution</a> &mdash; For now, Quantum XChange has only said about a dozen companies are part of the pilot. But with the appetite for quantum solutions in the US increasing—the National Quantum Initiative was just signed into law at the end of 2018 to advance the tech—this could be an opportune time to enter the market, so long as the service lives up to its billing.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>397: Quality Tools</title>
  <link>https://techsnap.systems/397</link>
  <guid isPermaLink="false">a6b87767-ad4e-429f-b82a-703023411eb6</guid>
  <pubDate>Thu, 14 Feb 2019 21:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/a6b87767-ad4e-429f-b82a-703023411eb6.mp3" length="29268241" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Join Jim and Wes as they battle bufferbloat, latency spikes, and network hogs with some of their favorite tools for traffic shaping, firewalling, and QoS.</itunes:subtitle>
  <itunes:duration>40:39</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Join Jim and Wes as they battle bufferbloat, latency spikes, and network hogs with some of their favorite tools for traffic shaping, firewalling, and QoS. 
Plus the importance of sane defaults and why netdata belongs on every system. 
</description>
  <itunes:keywords>bitorrent,latency,qos,bandwidth,networking,command line,wondershaper,tc,traffic control,queing discipline,network discipline ,FireHOL,FireQOS,netdata,qdisc,queues,traffic shaping,sane defaults,rate limit,tcp,udp,iptables,firewall,routing,home networking,netdata,monitoring,networking engineering,mpls,vpn,wireguard,openvpn,gre,bufferbloat,munin,nagios,collectd,prometheus,</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Join Jim and Wes as they battle bufferbloat, latency spikes, and network hogs with some of their favorite tools for traffic shaping, firewalling, and QoS. </p>

<p>Plus the importance of sane defaults and why netdata belongs on every system.</p><p>Links:</p><ul><li><a title="Why you want QoS - Netdata Documentation" rel="nofollow" href="https://docs.netdata.cloud/collectors/tc.plugin/#why-you-want-qos">Why you want QoS - Netdata Documentation</a> &mdash; One of the features the Linux kernel has, but it is rarely used, is its ability to apply QoS on traffic. Even most interesting is that it can apply QoS to both inbound and outbound traffic.</li><li><a title="FireQOS Wiki" rel="nofollow" href="https://github.com/firehol/firehol/wiki/FireQOS">FireQOS Wiki</a> &mdash; FireQOS is a helper to assist you configure traffic shaping on Linux.

</li><li><a title="FireHOL - Linux firewalling and traffic shaping for humans" rel="nofollow" href="https://firehol.org/">FireHOL - Linux firewalling and traffic shaping for humans</a> &mdash; FireHOL is a language (and a program to run it) which builds secure, stateful firewalls from easy to understand, human-readable configurations. The configurations stay readable even for very complex setups.</li><li><a title="tc(8) man page" rel="nofollow" href="https://linux.die.net/man/8/tc">tc(8) man page</a> &mdash; Traffic Control consists of the following:

SHAPING
When traffic is shaped, its rate of transmission is under control. Shaping may be more than lowering the available bandwidth - it is also used to smooth out bursts in traffic for better network behaviour. Shaping occurs on egress.
SCHEDULING
By scheduling the transmission of packets it is possible to improve interactivity for traffic that needs it while still guaranteeing bandwidth to bulk transfers. Reordering is also called prioritizing, and happens only on egress.
POLICING
Where shaping deals with transmission of traffic, policing pertains to traffic arriving. Policing thus occurs on ingress.
DROPPING
Traffic exceeding a set bandwidth may also be dropped forthwith, both on ingress and on egress.</li><li><a title="Overview of Traffic Control Concepts" rel="nofollow" href="http://tldp.org/HOWTO/Traffic-Control-HOWTO/overview.html">Overview of Traffic Control Concepts</a> &mdash; Traffic control is the name given to the sets of queuing systems and mechanisms by which packets are received and transmitted on a router. This includes deciding which (and whether) packets to accept at what rate on the input of an interface and determining which packets to transmit in what order at what rate on the output of an interface.</li><li><a title="Advanced traffic control - ArchWiki" rel="nofollow" href="https://wiki.archlinux.org/index.php/advanced_traffic_control">Advanced traffic control - ArchWiki</a></li><li><a title="Journey to the Center of the Linux Kernel: Traffic Control, Shaping and QoS" rel="nofollow" href="http://wiki.linuxwall.info/doku.php/en:ressources:dossiers:networking:traffic_control">Journey to the Center of the Linux Kernel: Traffic Control, Shaping and QoS</a> &mdash; This document describes the Traffic Control subsystem of the Linux Kernel in depth, algorithm by algorithm, and shows how it can be used to manage the outgoing traffic of a Linux system.</li><li><a title="Netdata Real-time performance monitoring, done right!" rel="nofollow" href="https://github.com/netdata/netdata">Netdata Real-time performance monitoring, done right!</a> &mdash; Netdata is distributed, real-time, performance and health monitoring for systems and applications. It is a highly optimized monitoring agent you install on all your systems and containers.</li><li><a title="Add more charts to netdata" rel="nofollow" href="https://github.com/netdata/netdata/blob/master/docs/Add-more-charts-to-netdata.md#add-more-charts-to-netdata">Add more charts to netdata</a> &mdash; To collect non-system metrics, netdata supports a plugin architecture. </li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Join Jim and Wes as they battle bufferbloat, latency spikes, and network hogs with some of their favorite tools for traffic shaping, firewalling, and QoS. </p>

<p>Plus the importance of sane defaults and why netdata belongs on every system.</p><p>Links:</p><ul><li><a title="Why you want QoS - Netdata Documentation" rel="nofollow" href="https://docs.netdata.cloud/collectors/tc.plugin/#why-you-want-qos">Why you want QoS - Netdata Documentation</a> &mdash; One of the features the Linux kernel has, but it is rarely used, is its ability to apply QoS on traffic. Even most interesting is that it can apply QoS to both inbound and outbound traffic.</li><li><a title="FireQOS Wiki" rel="nofollow" href="https://github.com/firehol/firehol/wiki/FireQOS">FireQOS Wiki</a> &mdash; FireQOS is a helper to assist you configure traffic shaping on Linux.

</li><li><a title="FireHOL - Linux firewalling and traffic shaping for humans" rel="nofollow" href="https://firehol.org/">FireHOL - Linux firewalling and traffic shaping for humans</a> &mdash; FireHOL is a language (and a program to run it) which builds secure, stateful firewalls from easy to understand, human-readable configurations. The configurations stay readable even for very complex setups.</li><li><a title="tc(8) man page" rel="nofollow" href="https://linux.die.net/man/8/tc">tc(8) man page</a> &mdash; Traffic Control consists of the following:

SHAPING
When traffic is shaped, its rate of transmission is under control. Shaping may be more than lowering the available bandwidth - it is also used to smooth out bursts in traffic for better network behaviour. Shaping occurs on egress.
SCHEDULING
By scheduling the transmission of packets it is possible to improve interactivity for traffic that needs it while still guaranteeing bandwidth to bulk transfers. Reordering is also called prioritizing, and happens only on egress.
POLICING
Where shaping deals with transmission of traffic, policing pertains to traffic arriving. Policing thus occurs on ingress.
DROPPING
Traffic exceeding a set bandwidth may also be dropped forthwith, both on ingress and on egress.</li><li><a title="Overview of Traffic Control Concepts" rel="nofollow" href="http://tldp.org/HOWTO/Traffic-Control-HOWTO/overview.html">Overview of Traffic Control Concepts</a> &mdash; Traffic control is the name given to the sets of queuing systems and mechanisms by which packets are received and transmitted on a router. This includes deciding which (and whether) packets to accept at what rate on the input of an interface and determining which packets to transmit in what order at what rate on the output of an interface.</li><li><a title="Advanced traffic control - ArchWiki" rel="nofollow" href="https://wiki.archlinux.org/index.php/advanced_traffic_control">Advanced traffic control - ArchWiki</a></li><li><a title="Journey to the Center of the Linux Kernel: Traffic Control, Shaping and QoS" rel="nofollow" href="http://wiki.linuxwall.info/doku.php/en:ressources:dossiers:networking:traffic_control">Journey to the Center of the Linux Kernel: Traffic Control, Shaping and QoS</a> &mdash; This document describes the Traffic Control subsystem of the Linux Kernel in depth, algorithm by algorithm, and shows how it can be used to manage the outgoing traffic of a Linux system.</li><li><a title="Netdata Real-time performance monitoring, done right!" rel="nofollow" href="https://github.com/netdata/netdata">Netdata Real-time performance monitoring, done right!</a> &mdash; Netdata is distributed, real-time, performance and health monitoring for systems and applications. It is a highly optimized monitoring agent you install on all your systems and containers.</li><li><a title="Add more charts to netdata" rel="nofollow" href="https://github.com/netdata/netdata/blob/master/docs/Add-more-charts-to-netdata.md#add-more-charts-to-netdata">Add more charts to netdata</a> &mdash; To collect non-system metrics, netdata supports a plugin architecture. </li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 382: Domestic Disappointments</title>
  <link>https://techsnap.systems/382</link>
  <guid isPermaLink="false">20c841ff-5ccf-4058-8e2d-f59364827c26</guid>
  <pubDate>Thu, 06 Sep 2018 19:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/20c841ff-5ccf-4058-8e2d-f59364827c26.mp3" length="38035774" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We’re joined by a special guest to discuss the failures of campaign security, the disastrous consequences of a mismanaged firewall, and the suspicious case of Speck.</itunes:subtitle>
  <itunes:duration>44:56</itunes:duration>
  <itunes:explicit>yes</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We’re joined by a special guest to discuss the failures of campaign security, the disastrous consequences of a mismanaged firewall, and the suspicious case of Speck.
Plus the latest vulnerabilities in Wireshark and OpenSSH, the new forensic hotness from Netflix, and some great introductions to cryptography. 
 Special Guest: Martin Wimpress.
</description>
  <itunes:keywords>eMail, Elections, Election Security, Espionage, Attachments, Security Keys, CIA, USA, Firewall, China, NSA, Speck, Android, Google, OpenSSH, SSH, Wireshark, CVE, CVSS, Security, TCP, ISP, BGP, 500 mile email, TCP RST, Diffy, Netflix, crypto, cryptography, diffy, netflix, manga, linux, devops, podcast</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We’re joined by a special guest to discuss the failures of campaign security, the disastrous consequences of a mismanaged firewall, and the suspicious case of Speck.</p>

<p>Plus the latest vulnerabilities in Wireshark and OpenSSH, the new forensic hotness from Netflix, and some great introductions to cryptography. </p><p>Special Guest: Martin Wimpress.</p><p>Links:</p><ul><li><a title="I’m teaching email security to Democratic campaigns. It’s as bad as 2016." rel="nofollow" href="https://www.washingtonpost.com/outlook/2018/09/04/im-teaching-email-security-democratic-campaigns-its-bad/">I’m teaching email security to Democratic campaigns. It’s as bad as 2016.</a></li><li><a title="Botched CIA Communications System Helped Blow Cover of Chinese Agents" rel="nofollow" href="https://foreignpolicy.com/2018/08/15/botched-cia-communications-system-helped-blow-cover-chinese-agents-intelligence/">Botched CIA Communications System Helped Blow Cover of Chinese Agents</a></li><li><a title="NSA-Designed Speck Algorithm to Be Removed From Linux 4.20" rel="nofollow" href="https://www.tomshardware.com/news/nsa-speck-removed-linux-4-20,37747.html">NSA-Designed Speck Algorithm to Be Removed From Linux 4.20</a></li><li><a title="Vulnerability Affects All OpenSSH Versions Released in the Past Two Decades" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/vulnerability-affects-all-openssh-versions-released-in-the-past-two-decades/">Vulnerability Affects All OpenSSH Versions Released in the Past Two Decades</a></li><li><a title="Wireshark can be crashed via malicious packet trace files" rel="nofollow" href="https://www.helpnetsecurity.com/2018/08/31/wireshark-dos-vulnerabilities/">Wireshark can be crashed via malicious packet trace files</a></li><li><a title="Service provider story about tracking down TCP RSTs" rel="nofollow" href="https://mailman.nanog.org/pipermail/nanog/2018-September/096871.html">Service provider story about tracking down TCP RSTs</a></li><li><a title="The case of the 500-mile email" rel="nofollow" href="http://www.ibiblio.org/harris/500milemail.html">The case of the 500-mile email</a></li><li><a title="Diffy: A cloud-centric triage tool for digital forensics and incident response" rel="nofollow" href="https://github.com/Netflix-Skunkworks/diffy">Diffy: A cloud-centric triage tool for digital forensics and incident response</a></li><li><a title="An intensive introduction to Cryptography" rel="nofollow" href="https://intensecrypto.org/public/">An intensive introduction to Cryptography</a></li><li><a title="The Manga Guide to Cryptography | No Starch Press" rel="nofollow" href="https://nostarch.com/mangacrypto">The Manga Guide to Cryptography | No Starch Press</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We’re joined by a special guest to discuss the failures of campaign security, the disastrous consequences of a mismanaged firewall, and the suspicious case of Speck.</p>

<p>Plus the latest vulnerabilities in Wireshark and OpenSSH, the new forensic hotness from Netflix, and some great introductions to cryptography. </p><p>Special Guest: Martin Wimpress.</p><p>Links:</p><ul><li><a title="I’m teaching email security to Democratic campaigns. It’s as bad as 2016." rel="nofollow" href="https://www.washingtonpost.com/outlook/2018/09/04/im-teaching-email-security-democratic-campaigns-its-bad/">I’m teaching email security to Democratic campaigns. It’s as bad as 2016.</a></li><li><a title="Botched CIA Communications System Helped Blow Cover of Chinese Agents" rel="nofollow" href="https://foreignpolicy.com/2018/08/15/botched-cia-communications-system-helped-blow-cover-chinese-agents-intelligence/">Botched CIA Communications System Helped Blow Cover of Chinese Agents</a></li><li><a title="NSA-Designed Speck Algorithm to Be Removed From Linux 4.20" rel="nofollow" href="https://www.tomshardware.com/news/nsa-speck-removed-linux-4-20,37747.html">NSA-Designed Speck Algorithm to Be Removed From Linux 4.20</a></li><li><a title="Vulnerability Affects All OpenSSH Versions Released in the Past Two Decades" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/vulnerability-affects-all-openssh-versions-released-in-the-past-two-decades/">Vulnerability Affects All OpenSSH Versions Released in the Past Two Decades</a></li><li><a title="Wireshark can be crashed via malicious packet trace files" rel="nofollow" href="https://www.helpnetsecurity.com/2018/08/31/wireshark-dos-vulnerabilities/">Wireshark can be crashed via malicious packet trace files</a></li><li><a title="Service provider story about tracking down TCP RSTs" rel="nofollow" href="https://mailman.nanog.org/pipermail/nanog/2018-September/096871.html">Service provider story about tracking down TCP RSTs</a></li><li><a title="The case of the 500-mile email" rel="nofollow" href="http://www.ibiblio.org/harris/500milemail.html">The case of the 500-mile email</a></li><li><a title="Diffy: A cloud-centric triage tool for digital forensics and incident response" rel="nofollow" href="https://github.com/Netflix-Skunkworks/diffy">Diffy: A cloud-centric triage tool for digital forensics and incident response</a></li><li><a title="An intensive introduction to Cryptography" rel="nofollow" href="https://intensecrypto.org/public/">An intensive introduction to Cryptography</a></li><li><a title="The Manga Guide to Cryptography | No Starch Press" rel="nofollow" href="https://nostarch.com/mangacrypto">The Manga Guide to Cryptography | No Starch Press</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
