Tumgik
jamesmcphee30 · 5 years
Text
Increasing Entropy with Crypto4A
Have you ever thought about the increasing disorder in your life? Sure, it may seem like things are constantly getting crazier every time you turn around, but did you know that entropy is always increasing in the universe? It’s a Law of Thermodynamics!
The idea that organized systems want to fall into disorder isn’t too strange when you think about it. Maintaining order takes a lot of effort and disorder is pretty easy to accomplish by just giving up. Anyone with a teenager knows that the amount of disorder that can be accomplished in a bedroom is pretty impressive.
One place where we don’t actually see a lot of disorder is in the computing realm. Computers are based on the idea that there is order and rationality in everything that we do. This is so prevalent that finding a way to be random is actually pretty hard. Computer programmers have tried a number of ways to come up with random number generators that take a variety of inputs into the formula and come up with something that looks sufficiently random. For most people just wanting the system to guess a number between 1 and 100 it’s not too bad. But when it comes to really, really large numbers like the ones used in cryptography, those pseudorandom numbers aren’t good enough.
This All Looks So Familiar…
One of the reasons for this comes down to good old fashioned efficiency. In the old days computers programmers could rely on people to generate pseudorandom input. By sampling mouse clicks or delay between computer keyboard keystrokes you could easily come up with a number that looks nice and random. However, we’ve taken people out of the loop now. Thanks to the cloud and automation and any one of a number of new ways to reduce human input we’ve managed to remove mouse clicks and keystrokes.
That’s fine for running scripts and programs. It’s even good for building things at a huge scale. But it’s really bad when you need something that looks relatively random. And it’s really, really bad when your program relies on that randomness to keep you secure. Kind of like key generation in Public Key Cryptography (PKI).
A group of security researchers working for the National Institute of Standards and Technology (NIST) found out a few years ago that public keys were starting to collide at greater rates than random chance. The study, conducted in 2012, found that 5% of HTTPS and 10% of SSH public keys were duplicates. A collision in a hashing algorithm is when two inputs produce the same output, which renders that hashing function broken. In PKI, having a two different inputs output the same public key is really bad, because it could lead to key collisions that impact a variety of service.
What caused it? As it turns out, lack of orderly disorder. Because automation and non-human interaction have led to other pseudorandom inputs being used in key generation it appeared to the researchers that the same inputs were being used all over the place. That meant that a lot of the public keys that were being generated were being done in such as way as to make collisions more likely. When you look at how many things are relying on automated sources to generate keys it can be quite scary. Think about a smart lightbulb or other IoT device that’s trying to generate pseudorandom input from a CPU that’s just big enough to turn things on. Now imagine that CPU multiplied by the number of smart lightbulbs out there. Not a pleasant thought, is it?
Disorder In The Court
This fascinating discussion came from an interview I had with Bruno Couillard, the President and CTO of Crypto4A. Crypto4A is a company that provides Entropy-as-a-Service. What exactly does that mean?
Crypto4A has an appliance they call QAOS. QAOS is designed to give you the best possible disorder that you can get. It does this the old fashioned way. Instead of trying to use software as a Random Number Generator (RNG) QAOS instead uses hardware sources to generate entropy for their RNG. This includes a quantum RNG, which produces high quality disorder that’s difficult to fake any other way.
QAOS is designed to feed software with entropy to generate randomness sufficient to prevent PKI public key collisions. The software developers can follow the NIST guidelines on EaaS to have the program call an entropy source. QAOS, acting as that entropy source, will seed the RNG on the target system with good randomness and allow it to generate good keys. This could also be configured in the kernel of the OS to call a system like QAOS on boot and start the seed value with a good amount of random entropy in the case of old programs that can’t be modified to call anything other than a system-based RNG source like /dev/random/.
Tom’s Take
The NIST guidelines around EaaS are constantly evolving, but the idea that companies are already racing to fill the void that has been created by insufficient randomness in cryptography is telling. When you think about nth the number of devices that are going to be using PKI for secure communications, the need for something like Crypto4A QAOS is pretty clear. If we are going to rely on automated systems to run our daily lives, we need to have the resources in place to ensure they have a solid foundation of randomness to build on.
from martinos https://networkingnerd.net/2019/04/26/increasing-entropy-with-crypto4a/
0 notes
jamesmcphee30 · 5 years
Text
Preparing Your Enterprise for the Worst With Disaster Recovery, Monitoring
With the rise of both man-made and natural disasters (including fires and earthquakes), the disaster recovery (DR) market has growing importance in protecting an enterprise and its user community, according to RackWare co-founder and CEO Sash Sunkara.
from martinos https://www.linux.com/news/preparing-your-enterprise-worst-disaster-recovery-monitoring
0 notes
jamesmcphee30 · 5 years
Text
The state of Linux graphic design tools in 2019
Before I begin this test of Linux graphic design tools, I should admit two things up front. First, I am a designer, not a software developer. Second, although I try to incorporate open source methodologies and principles wherever I can, my field pretty much demands that I use Adobe software on a sticker-emblazoned MacBook Pro. (I know, hate me if you must.) For the purposes of this research project, however, I am running Fedora 29 on a repurposed Mac Mini.
  from martinos https://www.linux.com/news/state-linux-graphic-design-tools-2019
0 notes
jamesmcphee30 · 5 years
Text
K3OS: A Kubernetes OS Distro for Edge Computing
On the heels of its release of k3s, a lightweight Kubernetes distribution designed for the edge, Rancher Labs has announced an accompanying operating system called k3OS.
from martinos https://www.linux.com/news/k3os-kubernetes-os-distro-edge-computing
0 notes
jamesmcphee30 · 5 years
Text
How to Change User Password in Ubuntu
Title: 
How to Change User Password in Ubuntu
24 Apr
Learn more
from martinos https://www.linux.com/learn/how-change-user-password-ubuntu
0 notes
jamesmcphee30 · 5 years
Text
Solved! Kubernetes Operators for Clustered Database Deployments
As we have witnessed countless times across every industry, todays corporate technology watch phrase is: Be Agile or Die. Enterprises, their products and services, and how they interact with their customers is undergoing a complete revolution. No sooner has a new business model or technology been successfully launched than emerges a new, improved paradigm focused on replacing it. The only practical solution is to stay agile and adapt.
from martinos https://www.linux.com/news/solved-kubernetes-operators-clustered-database-deployments
0 notes
jamesmcphee30 · 5 years
Text
Ubuntu 19.10 Daily Builds Are Now Available to Download
Canonical just kicked off the development cycle of the next release of their widely-used Linux-based operating system, Ubuntu 19.10, allowing testers and early adopters to download daily build ISO images.
Read more at: Softpedia
from martinos https://www.linux.com/news/ubuntu-1910-daily-builds-are-now-available-download
0 notes
jamesmcphee30 · 5 years
Text
3 Things About Cloud and IoT You Need to Consider
The internet of things (IoT) and cloud-based providers are bound at the hip. That said, most people don’t understand how, why, or what to expect. I’ve been asked some good questions that drove me to do some research and testing. Perhaps the answers are of interest to you as well.
  Read more at: InfoWorld
from martinos https://www.linux.com/news/3-things-about-cloud-and-iot-you-need-consider-0
0 notes
jamesmcphee30 · 5 years
Text
Linux 5.1 Picking Up Keyboard Mappings For Full-Screen, Toggle Display Keys
Coming as a late addition to the Linux 5.1 kernel are some long overdue keyboard key mappings for different functionality...
  Read more at: Phoronix
from martinos https://www.linux.com/news/linux-51-picking-keyboard-mappings-full-screen-toggle-display-keys
0 notes
jamesmcphee30 · 5 years
Text
Tutorial: Deploying a Web Application on Google Cloud Run
Google Cloud Run is a serverless environment to run containers. For the background and context of this latest Google Cloud Platform (GCP) service, refer to my previous article.
from martinos https://www.linux.com/news/tutorial-deploying-web-application-google-cloud-run
0 notes
jamesmcphee30 · 5 years
Text
The Confluence of SD-WAN and Microsegmentation
If you had to pick two really hot topics in the networking space right now, you’d be hard-pressed to find two more discussed than SD-WAN and microsegmentation. SD-WAN is the former “king of the hill” in the network engineering. I can remember having more conversations about SD-WAN in the last couple of years than anything else. But as the SD-WAN market has started to consolidate and iterate, a new challenger has arrived. Microsegmentation is the word of the day.
However, I think that SD-WAN and microsegmentation are quickly heading toward a merger of ideas and solutions. There are a lot of commonalities between the two technologies that make a lot of sense running together.
SD-WAN isn’t just about packet switching and routing any longer. That’s because networking people have quickly learned that packet-by-packet processing of traffic is inefficient. All of our older network analysis devices could only see things one IP packet at a time. But the new wave of devices think in terms of flows. They can analyze a stream of packets to figure out what’s going on. And what generates those flows?
Applications.
The key to the new wave of SD-WAN technology isn’t some kind of magic method of nailing up VPNs between branch offices. It’s not about adding new connectivity types. Instead, it’s about application identification. App identification is how SD-WAN does QoS now. The move to using app markers means a more holistic method of treating application traffic properly.
SD-WAN has significant value in application handling. I recently chatted with Kumar Ramachandran of CloudGenix and he echoed that part of the reason why they’ve been seeing growth and recently received a Series C funding round was because of what they’re doing with applications. The battle of MPLS versus broadband has already been fought. The value isn’t going to come from edge boxes unless there is software that can help differentiate the solutions.
Segmenting Your Traffic
So, what does this have to do with microsegmentation? If you’ve been following that market, you already know that the answer is the application. Microsegmentation doesn’t work on a packet-by-packet basis either. It needs to see all the traffic flows from an application to figure out what is needed and what isn’t. Platforms that do this kind of work are big on figuring out which protocols should be talking to which hosts and shutting everything else down to secure that communication.
Microsegmentation is growing in the cloud world for sure. I’ve seen and talked to people from companies like Guardicore, Illumio, ShieldX, and Edgewise in recent months. Each of them has a slightly different approach to doing microsegmentation. But they all look at the same basic approach form the start. The application is the basic building block of their technology.
With the growth of microsegmentation in the cloud market to help ensure traffic flows between hosts and sites is secured, it’s a no-brainer that the next big SD-WAN platform needs to add this functionality to their solution. I say this because it’s not that big of a leap to take the existing SD-WAN application analytics software that optimizes traffic flows over links and change it to restrict traffic flow with policy support.
For SD-WAN vendors, it’s another hedge against the inexorable march of traffic into the cloud. There are only so many Direct Connect analogs that you can build before Amazon decides to put you out of business. But, if you can integrate the security aspect of application analytics into your platform you can make your solution very sticky. Because that functionality is critical to meeting audit goals and ensuring compliance. And you’re going to wish you had it when the auditors come calling.
Tom’s Take
I don’t think the current generation of SD-WAN providers are quite ready to implement microsegmentation in their platforms. But I really wouldn’t be surprised to see it in the next revision of solutions. I also wonder if that means that some of the companies that have already purchased SD-WAN companies are going to look at that functionality. Perhaps it will be VMware building NSX microsegmentaiton on top of VeloCloud. Or maybe Cisco will include some of their microsegmentation from ACI in Viptela. They’re going to need to look at that strongly because once companies that are still on their own figure it out they’re going to be the go-to solution for companies looking to provide a good, secure migration path to the cloud. And all those roads lead to an SD-WAN device with microsegmentation capabilities.
Advertisements
__ATA.cmd.push(function() { __ATA.initSlot('atatags-26942-5cb880bb33ccc', { collapseEmpty: 'before', sectionId: '26942', width: 300, height: 250 }); });
__ATA.cmd.push(function() { __ATA.initSlot('atatags-114160-5cb880bb33cce', { collapseEmpty: 'before', sectionId: '114160', width: 300, height: 250 }); });
from martinos https://networkingnerd.net/2019/04/18/the-confluence-of-sd-wan-and-microsegmentation/
0 notes
jamesmcphee30 · 5 years
Text
Linux Server Hardening Using Idempotency with Ansible: Part 3
Title: 
Linux Server Hardening Using Idempotency with Ansible: Part 3
16 Apr
Learn more
from martinos https://www.linux.com/blog/linux-server-hardening-using-idempotency-ansible-part-3
0 notes
jamesmcphee30 · 5 years
Text
Troubleshooting slow WiFi on Linux
Title: 
Troubleshooting slow WiFi on Linux
15 Apr
Learn more
from martinos https://www.linux.com/blog/troubleshooting-slow-wifi-linux
0 notes
jamesmcphee30 · 5 years
Text
Cloud Foundry’s Eirini and the Commitment to Interoperability
A major theme at Cloud Foundry Summit North America last week in Philadelphia was interoperability and its importance to Cloud Foundry — as the core functional tests validating Cloud Foundry Application Runtime releases for Project Eirini begin.
Speaking to this during a podcast, hosted by The New Stack’s Alex Williams, founder and editor-in-chief, were:
from martinos https://www.linux.com/news/cloud-foundrys-eirini-and-commitment-interoperability-0
0 notes
jamesmcphee30 · 5 years
Text
Move data to the cloud with Azure Data Migration
Title: 
Move data to the cloud with Azure Data Migration
15 Apr
Learn more
from martinos https://www.linux.com/blog/move-data-cloud-azure-data-migration
0 notes
jamesmcphee30 · 5 years
Text
Best Open Source Tools for Staying on Top of Projects
The type of organizing tools you use to plan your projects can make your work routine more efficient and improve your productivity. A project management application is an essential tool in some business environments.
from martinos https://www.linux.com/news/best-open-source-tools-staying-top-projects-1
0 notes
jamesmcphee30 · 5 years
Text
Key Differences in Security, Management for Serverless vs. Containers
Serverless functions and containers are two of the hottest topics in the IT world today. They’re also two technologies that share a lot in common — after all, both are ways to deploy code inside isolated, discrete environments. They are by no means identical technologies, but in the abstract, they function in similar ways.
And yet.
from martinos https://www.linux.com/news/key-differences-security-management-serverless-vs-containers
0 notes