“Core Infrastructure Initiative” – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Sat, 17 Aug 2019 00:47:27 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png “Core Infrastructure Initiative” – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Linux Action News 119 https://original.jupiterbroadcasting.net/133622/linux-action-news-119/ Fri, 16 Aug 2019 17:00:31 +0000 https://original.jupiterbroadcasting.net/?p=133622 Show Notes: linuxactionnews.com/119

The post Linux Action News 119 first appeared on Jupiter Broadcasting.

]]>

Show Notes: linuxactionnews.com/119

The post Linux Action News 119 first appeared on Jupiter Broadcasting.

]]>
From the Foundation (Part 2) | BSD Now 78 https://original.jupiterbroadcasting.net/77932/from-the-foundation-part-2-bsd-now-78/ Thu, 26 Feb 2015 12:57:45 +0000 https://original.jupiterbroadcasting.net/?p=77932 This week we continue our two-part series on the activities of various BSD foundations. Ken Westerback joins us today to talk all about the OpenBSD foundation and what it is they do. We’ve also got answers to your emails and all the latest news, on BSD Now – the place to B.. SD. Thanks to: […]

The post From the Foundation (Part 2) | BSD Now 78 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

This week we continue our two-part series on the activities of various BSD foundations. Ken Westerback joins us today to talk all about the OpenBSD foundation and what it is they do. We’ve also got answers to your emails and all the latest news, on BSD Now – the place to B.. SD.

Thanks to:


DigitalOcean


iXsystems


Tarsnap

Direct Download:

Video | HD Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | HD Vid Feed | HD Torrent Feed

– Show Notes: –

Headlines

BSDCan 2015 schedule

  • The list of presentations for the upcoming BSDCan conference has been posted, and the time schedule should be up shortly as well
  • Just a reminder: it’s going to be held on June 12th and 13th at the University of Ottawa in Canada
  • This year’s conference will have a massive fifty talks, split up between four tracks instead of three (but unfortunately a person can only be in one place at a time)
  • Both Allan and Kris had at least one presentation accepted, and Allan will also be leading a few “birds of a feather” gatherings
  • In total, there will be three NetBSD talks, five OpenBSD talks, eight BSD-neutral talks, thirty-five FreeBSD talks and no DragonFly talks
  • That’s not the ideal balance we’d hope for, but BSDCan says they’ll try to improve that next year
  • Those numbers are based on the speaker’s background, or any past presentations, for the few whose actual topic wasn’t made obvious from the title (so there may be a small margin of error)
  • Michael Lucas (who’s on the BSDCan board) wrote up a blog post about the proposals and rejections this year
  • If you can’t make it this year, don’t worry, we’ll be sure to announce the recordings when they’re made available
  • We also interviewed Dan Langille about the conference and what to expect this year, so check that out too

SSL interception with relayd

  • There was a lot of commotion recently about superfish, a way that Lenovo was intercepting HTTPS traffic and injecting advertisements
  • If you’re running relayd, you can mimic this evil setup on your own networks (just for testing of course…)
  • Reyk Floeter, the guy who wrote relayd, came up a blog post about how to do just that
  • It starts off with some backstory and some of the things relayd is capable of
  • relayd can run as an SSL server to terminate SSL connections and forward them as plain TCP and, conversely, run as an SSL client to terminal plain TCP connections and tunnel them through SSL
  • When you combine these two, you end up with possibilities to filter between SSL connections, effectively creating a MITM scenario
  • The post is very long, with lots of details and some sample config files – the whole nine yards

OPNsense 15.1.6.1 released

  • The OPNsense team has released yet another version in rapid succession, but this one has some big changes
  • It’s now based on FreeBSD 10.1, with all the latest security patches and driver updates (as well as some in-house patches)
  • This version also features a new tool for easily upgrading between versions, simply called “opnsense-update” (similar to freebsd-update)
  • It also includes security fixes for BIND and PHP, as well as some other assorted bug fixes
  • The installation images have been laid out in a clean way: standard CD and USB images that default to VGA, as well as USB images that default to a console output (for things like Soekris and PCEngines APU boards that only have serial ports)
  • With the news of m0n0wall shutting down last week, they’ve also released bare minimum hardware specifications required to run OPNsense on embedded devices
  • Encouraged by last week’s mention of PCBSD trying to cut ties with OpenSSL, OPNsense is also now providing experimental images built against LibreSSL for testing (and have instructions on how to switch over without reinstalling)

OpenBSD on a Minnowboard Max

  • What would our show be without at least one story about someone installing BSD on a weird device
  • For once, it’s actually not NetBSD…
  • This article is about the minnowboard max, a very small X86-based motherboard that looks vaguely similar to a Raspberry Pi
  • It’s using an Atom CPU instead of ARM, so overall application compatibility should be a bit better (and it even has AES-NI, so crypto performance will be much better than a normal Atom)
  • The author describes his entirely solid-state setup, noting that there’s virtually no noise, no concern about hard drives dying and very reasonable power usage
  • You’ll find instructions on how to get OpenBSD installed and going throughout the rest of the article
  • Have a look at the spec sheet if you’re interested, they make for cool little BSD boxes

Netmap for 40gbit NICs in FreeBSD

  • Luigi Rizzo posted an announcement to the -current mailing list, detailing some of the work he’s just committed
  • The ixl(4) driver, that’s one for the X1710 40-gigabit card, now has netmap support
  • It’s currently in 11-CURRENT, but he says it works in 10-STABLE and will be committed there too
  • This should make for some serious packet-pushing power
  • If you have any network hardware like this, he would appreciate testing for the new code

Interview – Ken Westerback – directors@openbsdfoundation.org

The OpenBSD foundation‘s activities


News Roundup

s2k15 hackathon report: dhclient/dhcpd/fdisk

  • The second trip report from the recent OpenBSD hackathon has been published, from the very same guy we just talked to
  • Ken was also busy, getting a few networking-related things fixed and improved in the base system
  • He wrote a few new small additions for dhclient and beefed up the privsep security, as well as some fixes for tcpdump and dhcpd
  • The fdisk tool also got worked on a bit, enabling OpenBSD to properly wipe GPT tables on a previously-formatted disk so you can do a normal install on it
  • There’s apparently plans for “dhclientng” – presumably a big improvement (rewrite?) of dhclient

FreeBSD beginner video series


NetBSD tests: zero unexpected failures

  • The NetBSD guys have a new blog post up about their testing suite for all the CPU architectures
  • They’ve finally gotten the number of “expected” failures down to zero on a few select architectures
  • Results are published on a special release engineering page, so you can have a look if you’re interested
  • The rest of the post links to the “top performers” (ones with less than ten failure) in the -current branch

PCBSD switches to IPFW

  • The PCBSD crew continues their recent series of switching between major competing features
  • This time, they’ve switched the default firewall away from PF to FreeBSD’s native IPFW firewall
  • Look forward to Kris wearing a “keep calm and use IPFW” shir- wait

Feedback/Questions


Mailing List Gold


  • Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv
  • Some extra emails would be great, since we’ll be recording two episodes next week
  • Be sure to say hi if you’re at AsiaBSDCon in a couple weeks, maybe we could even interview some listeners too
  • We talked to the NetBSD foundation back in episode 12 and DragonFlyBSD doesn’t have a foundation, so there won’t be an “official” third part in this series

The post From the Foundation (Part 2) | BSD Now 78 first appeared on Jupiter Broadcasting.

]]>
Intentional Backdoor | TechSNAP 159 https://original.jupiterbroadcasting.net/55952/intentional-backdoor-techsnap-159/ Thu, 24 Apr 2014 20:26:20 +0000 https://original.jupiterbroadcasting.net/?p=55952 A back backdoor found in many common routers gets covered up instead of patched, and all it takes is a knock on the door to exploit it. We’ll share the details. Plus cross VM attacks just got much easier, a great batch of your questions – our answers, and much much more! On this week’s […]

The post Intentional Backdoor | TechSNAP 159 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

A back backdoor found in many common routers gets covered up instead of patched, and all it takes is a knock on the door to exploit it. We’ll share the details.

Plus cross VM attacks just got much easier, a great batch of your questions – our answers, and much much more!

On this week’s episode of TechSNAP!

Thanks to:


\"DigitalOcean\"


\"Ting\"


\"iXsystems\"

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

— Show Notes: —

Intentional backdoor in home routers, when reported vendor just attempts to hide it better

  • Back around Christmas researchers found a backdoor in 24 different models of routers from Cisco, Linksys, Netgear and Diamond. The backdoor gave an attacker who knew about the flaw a full root shell on the router, and allowed them to dump the entire config, and make changes to the configuration
  • This could allow an attacker to get inside your network by forwarding ports etc, but also conduct a Man-in-the-Middle attack by changing the DNS resolvers on your router to be malicious ones that would direct your traffic to the wrong location
  • Shortly there after, Netgear released updated firmware from the vendor (sercomm)
  • When the researchers dissected the firmware, they found that the backdoor was still there, but was only listening on a UNIX domain socket, inaccessible from the network
  • However, they found that in specific circumstances, the backdoor will be reenabled
  • If the router receives a specially crafted ethernet frame, it will reenable the backdoor via TCP
  • They also found additional capabilities, including the ability to change query the router for its MAC access, change the LAN IP address, or cause different LED lights on the modem
  • Since this requires a specially crafted ethernet frame, it can only be sent from 1 hop away
  • This means that the backdoor can only be enabled from the local LAN or WLAN, or by the ISP
  • A number of the features of this ‘backdoor’ would appear to be useful to an ISP, querying data from the routers and reprogramming them etc
  • However the negative security aspects outweigh all of the gain
  • Researcher PDF

Fine grain Cross-VM Attacks on Xen and VMware

  • Researchers from Worcester Polytechnic Institute have published new research showing the cloud services may be vulnerable
  • “we show that AES in a number popular cryptographic libraries including OpenSSL, PolarSSL and Libgcrypt are vulnerable to Bernstein’s correlation attack when run in Xen and VMware (bare metal version) VMs, the most popular VMs used by cloud service providers (CSP) such as Amazon and Rackspace. We also show that the vulnerability persists even if the VMs are placed on different cores in the same machine. The results of this study shows that there is a great security risk to AES and (data encrypted under AES) on popular cloud services.”
  • Use a separate machine for each client, although this basically breaks the entire purpose of ‘the cloud’
  • Using AES-NI mitigates the attack entirely, however many clouds still use older machines that do not support AES-NI
  • Newer versions of the various libraries seem to mitigate the attack against the last round of crypto, but are still susceptible during the first round
  • The researchers suggest using AES256 instead of AES128 because 256 uses 14 rounds to 128’s 10

Feedback:


Round Up:

The post Intentional Backdoor | TechSNAP 159 first appeared on Jupiter Broadcasting.

]]>