Do NetAdmins like snacks? Asking cos here's a dish of tasty network news nibbles

Juniper's new routers emerge, Google QUIC-ens gets load balancing for HTTPS and more

Roundup Be nimble, be QUIC: Google's added secured load balancing support to its QUIC protocol.

The Chocolate Factory created QUIC as a way to speed up Web connections by reducing the number of round trips for connection setup and using UDP instead of TCP, but it's seen only limited adoption outside Google's own infrastructure. In January this year, a mere 161,000 domains were hosted on QUIC-capable infrastructure.

Giving QUIC the ability to accelerate HTTPS infrastructure is a way of enhancing its appeal, and software engineers Michael Behr and Ian Swett wrote that Google's made QUIC-enabling a load balancer a single Google Cloud Platform console setting. The sysadmin then edits their load balancer front-end configuration, and enable QUIC negotiation for the IP address and port.

Oh, and Google continues to negotiate the slow business of making QUIC a standard: the Internet Engineering Task Force working group, formed in 2016, will complete a v1 specification by November, and participants have presented ten implementations for interop testing so far.

ONAP Beijing release lands

A second release of the Linux Foundation's Open Network Automation Platform (ONAP) appeared last week.

Dubbed "beijing", the highlights of the release include Kubernetes support, and contributions from the Metro Ethernet Forum (MEF) and the service providers' TMForum to expand ONAP's APIs.

TMForum APIs carrying MEF-defined payloads are now included in ONAP's northbound interfaces, for better handling of how orders are placed and fulfilled.

Juniper unveils next FBR (flaming big router)

Juniper Networks has an eye to the Internet of Things and 5G markets with the launch of the latest member of its MX Series.

The MX Series 5G Universal Routing Platform uses the company's latest 16nm power-efficient Penta silicon, which gives its MX960, MX480 and MX240 triple the bandwidth, MACsec and IPsec in the crypto engine (able to terminate thousands of IPsec sessions), and FlexE (flexible Ethernet) support.

CUPS – control user-plane separation – is a standard from the 3GPP supported in the MX Series 5G platform on an accelerated 5G user plane.

The platform ships as the MX10008 and MX10016, which ship in the second half of this year; Penta-based line cards will land in the first quarter of 2019.

Patch Wireshark

The popular network sniffer Wireshark needs an update after two vulnerabilities were disclosed this week, one in its RTCP (Real-Time Transport Control Protocol) dissector, the other in its NBAP (Node-B Application Part) dissector.

Both CVE-2018-11355 and CVE-2018-9261 allow an attacker to crash the relevant component by getting Wireshark to process malformed traffic – either by inserting malicious traffic onto the network under test, or by getting it to process packet traces containing attack traffic.

Proof-of-concept code has been published for both vulnerabilities.

The vulnerabilities were addressed in a new download.

A10 points provisioner at Kubernetes

A10 Networks has added Kubernetes to its portfolio.

The company's A10 Ingress Controller for Kubernetes is integrated with the company's container-native load balancing/application delivery solution.

The company says the A10 Ingress Controller also ties into Kubernetes container life cycles, and is automatically updated as application services scale up and down.

It also collects hundreds of application metrics, accessible either via APIs or its A10 Harmony portal.

Its Lightning application delivery controller runs on each Kubernetes node to provide app proxy services like load balancing, content switching, SSL termination, and security.

AppViewX gets new CEO, again

Network automation company AppViewX has appointed Ryan Windham as its CEO – the third to hold the role in the last year.

Windham (formerly with Cedexis, and before that F5 Networks) takes over from Manny Rivelo (also ex-F5 Networks), who took over when Anand Purusothaman became AppViewX's chair.

Windham's been briefed to drive the company's subscription sales with a view to the network automation market.

cPacket accelerates analytics

It's not just Cisco that makes announcements at Cisco Live: there are also partners like cPacket, which this week demonstrated the virtualised version of its cClear network performance dashboard and distributed data collectors, cClear-V.

Deployable either to hypervisor VMs or Docker containers, cClear's cVu traffic sensors do the data collection without dedicated hardware.

The data is then passed back to cClear for troubleshooting, network performance analysis, and capacity planning. ®

Other stories you might like

  • Prisons transcribe private phone calls with inmates using speech-to-text AI

    Plus: A drug designed by machine learning algorithms to treat liver disease reaches human clinical trials and more

    In brief Prisons around the US are installing AI speech-to-text models to automatically transcribe conversations with inmates during their phone calls.

    A series of contracts and emails from eight different states revealed how Verus, an AI application developed by LEO Technologies and based on a speech-to-text system offered by Amazon, was used to eavesdrop on prisoners’ phone calls.

    In a sales pitch, LEO’s CEO James Sexton told officials working for a jail in Cook County, Illinois, that one of its customers in Calhoun County, Alabama, uses the software to protect prisons from getting sued, according to an investigation by the Thomson Reuters Foundation.

    Continue reading
  • Battlefield 2042: Please don't be the death knell of the franchise, please don't be the death knell of the franchise

    Another terrible launch, but DICE is already working on improvements

    The RPG Greetings, traveller, and welcome back to The Register Plays Games, our monthly gaming column. Since the last edition on New World, we hit level cap and the "endgame". Around this time, item duping exploits became rife and every attempt Amazon Games made to fix it just broke something else. The post-level 60 "watermark" system for gear drops is also infuriating and tedious, but not something we were able to address in the column. So bear these things in mind if you were ever tempted. On that note, it's time to look at another newly released shit show – Battlefield 2042.

    I wanted to love Battlefield 2042, I really did. After the bum note of the first-person shooter (FPS) franchise's return to Second World War theatres with Battlefield V (2018), I stupidly assumed the next entry from EA-owned Swedish developer DICE would be a return to form. I was wrong.

    The multiplayer military FPS market is dominated by two forces: Activision's Call of Duty (COD) series and EA's Battlefield. Fans of each franchise are loyal to the point of zealotry with little crossover between player bases. Here's where I stand: COD jumped the shark with Modern Warfare 2 in 2009. It's flip-flopped from WW2 to present-day combat and back again, tried sci-fi, and even the Battle Royale trend with the free-to-play Call of Duty: Warzone (2020), which has been thoroughly ruined by hackers and developer inaction.

    Continue reading
  • American diplomats' iPhones reportedly compromised by NSO Group intrusion software

    Reuters claims nine State Department employees outside the US had their devices hacked

    The Apple iPhones of at least nine US State Department officials were compromised by an unidentified entity using NSO Group's Pegasus spyware, according to a report published Friday by Reuters.

    NSO Group in an email to The Register said it has blocked an unnamed customers' access to its system upon receiving an inquiry about the incident but has yet to confirm whether its software was involved.

    "Once the inquiry was received, and before any investigation under our compliance policy, we have decided to immediately terminate relevant customers’ access to the system, due to the severity of the allegations," an NSO spokesperson told The Register in an email. "To this point, we haven’t received any information nor the phone numbers, nor any indication that NSO’s tools were used in this case."

    Continue reading

Biting the hand that feeds IT © 1998–2021