Mess with DNS
Julia Evans has built a site where you can do experiments with DNS. It shows you a live stream of all DNS queries coming in for records on the free subdomain provided to you (a “behind the scenes” view).
You can make up your experiments or check out her examples of experiments you can try., including "weird" (when you broke something), "useful" and "tutorial" experiments.
#dns
Julia Evans has built a site where you can do experiments with DNS. It shows you a live stream of all DNS queries coming in for records on the free subdomain provided to you (a “behind the scenes” view).
You can make up your experiments or check out her examples of experiments you can try., including "weird" (when you broke something), "useful" and "tutorial" experiments.
#dns
👍9😱1
A friend of mine has shared some news about recent security breaches in government websites. Unfortunately, the possibility of a security breach is an inherent vice of any software system.
Developing systems is hard. Catching all the edge cases and unexpected behaviors is even harder. That’s why we almost always rely on the community of fellow engineers to spot the bugs and security vulnerabilities. Unfortunately, there is also a backside of this coin.
Some people are spamming infrasec contacts with insignificant problems demanding money. Thus, people are getting tired with that and really critical issues have a chance of being buried under an avalanche of these requests.
Troy Hunt - a founder of haveibeenpwned.com - summarized this behavior with a few examples in his article “Beg Bounties”
P.S. Also, Inherent Vice is a cool movie, that I can recommend if you like a slow-pacing dramas that focus on acting.
#culture #security
Developing systems is hard. Catching all the edge cases and unexpected behaviors is even harder. That’s why we almost always rely on the community of fellow engineers to spot the bugs and security vulnerabilities. Unfortunately, there is also a backside of this coin.
Some people are spamming infrasec contacts with insignificant problems demanding money. Thus, people are getting tired with that and really critical issues have a chance of being buried under an avalanche of these requests.
Troy Hunt - a founder of haveibeenpwned.com - summarized this behavior with a few examples in his article “Beg Bounties”
P.S. Also, Inherent Vice is a cool movie, that I can recommend if you like a slow-pacing dramas that focus on acting.
#culture #security
Troy Hunt
Beg Bounties
When someone passed me hundreds of thousands of records on kids taken from CloudPets a few years ago, I had a nightmare of a time getting in touch with the company. They'd left a MongoDB instance exposed to the public without a password and someone had snagged…
Another cybersecurity post.
A few days prior Log4j storm, researchers from Orca Security discovered CloudFormation vulnerability and managed to get access to an internal account. It means that an attacker could potentially get access to any AWS account by mimicking CloudFormation API calls.
Previously, Orca Security research team managed to do something similar with [AWS Glue.
Kudos to AWS team here. They managed to fix this vulnerability in less than 25 hours and it took 6 days to populate the fix in all their regions.
#aws #security
A few days prior Log4j storm, researchers from Orca Security discovered CloudFormation vulnerability and managed to get access to an internal account. It means that an attacker could potentially get access to any AWS account by mimicking CloudFormation API calls.
Previously, Orca Security research team managed to do something similar with [AWS Glue.
Kudos to AWS team here. They managed to fix this vulnerability in less than 25 hours and it took 6 days to populate the fix in all their regions.
#aws #security
Orca Security
AWS CloudFormation Vulnerability | Orca Research Pod
Orca Security discovered a zero day AWS XXE (XML External Entity) CloudFormation vulnerability, which AWS quickly mitigated within 6 days. Learn more here!
👍3
Open Policy Agent (OPA) is a powerful framework that allows you to validate your data structures against some policies, written in Rego. There are multiple implementations of OPA for various tools and systems e.g. Gatekeeper for Kubernetes.
However, you can write your own implementation and use if, for example, for unit tests. This articles provides some examples of how to write your own OPA checks in Go.
#programming #opa
However, you can write your own implementation and use if, for example, for unit tests. This articles provides some examples of how to write your own OPA checks in Go.
#programming #opa
DZone
Building With Open Policy Agent (OPA) for Better Policy as Code
Dive into a new way of thinking about Policy as Code. Learn to leverage OPA for learning deep insights about your systems, their resource utilization, and more.
Microsoft in its blog reviled some details on the recent cyberattack on the number of Ukrainian governmental websites
Investigation is still ongoing. However, we already know that attackers have overridden Master Boot Record (MBR) on infected machines. Microsoft also published hashes of malicious software in the same blog article.
I also found information that hackers initially broke through a proprietary Content Management System (CMS) tool. However, I haven’t found any official proofs of it.
#security
Investigation is still ongoing. However, we already know that attackers have overridden Master Boot Record (MBR) on infected machines. Microsoft also published hashes of malicious software in the same blog article.
I also found information that hackers initially broke through a proprietary Content Management System (CMS) tool. However, I haven’t found any official proofs of it.
#security
Microsoft News
Destructive malware targeting Ukrainian organizations
Microsoft Threat Intelligence Center (MSTIC) has identified evidence of a destructive malware operation targeting multiple organizations in Ukraine.
After I published my article about Kubernetes backups, I got some questions regarding cluster organization and maintenance procedure. Specifically about managing Kubernetes clusters “as cattle” and this statement:
…*investing in cluster automation early on* is important. You may end up in a situation when you need to re-create a cluster from scratch.
I started writing an article about managing clusters “as cattle” to address these questions. Moreover, that was my initial plan. However, I realized that I have very little exposure on how other people are managing their clusters! I have only the perspective of my current and my previous employers.
Thus, I decided to issue a survey on how people are managing their Kubernetes clusters, their core components like CNI, Ingress, etc., and business applications.
I would appreciate it, if you can spend some time filling up this survey. You can also reach out to me directly and share your story of managing Kubernetes in your company. I left contacts in that Google form.
Here’s the link to that article about backups, in case you missed it.
Have a great week, y’all!
#kubernetes
…*investing in cluster automation early on* is important. You may end up in a situation when you need to re-create a cluster from scratch.
I started writing an article about managing clusters “as cattle” to address these questions. Moreover, that was my initial plan. However, I realized that I have very little exposure on how other people are managing their clusters! I have only the perspective of my current and my previous employers.
Thus, I decided to issue a survey on how people are managing their Kubernetes clusters, their core components like CNI, Ingress, etc., and business applications.
I would appreciate it, if you can spend some time filling up this survey. You can also reach out to me directly and share your story of managing Kubernetes in your company. I left contacts in that Google form.
Here’s the link to that article about backups, in case you missed it.
Have a great week, y’all!
#kubernetes
Google Docs
Kubernetes Cluster Operations Survey by CatOps
Hello and thank you for participating in our Kubernetes Cluster Operations Survey!
The goal of this survey for us to have a glance on how do people manage their Kubernetes clusters, what is the adoption rate for cloud cluster management solutions, and what…
The goal of this survey for us to have a glance on how do people manage their Kubernetes clusters, what is the adoption rate for cloud cluster management solutions, and what…
I'm a bit late with these news, but it looks like Helm plugin helm-diff now supports three-way-merge option.
Thus, it should be able to show, which changes were made manually aka the drift.
#kubernetes #helm
Thus, it should be able to show, which changes were made manually aka the drift.
#kubernetes #helm
GitHub
upgrade command add three-way-merge option by luxurine · Pull Request #304 · databus23/helm-diff
upgrade command add three-way-merge option to show diff for actual state vs desired state #176
prepared resource for testing
1、last release:
---
# Source: base-app/templates/service.yaml
apiVersion...
prepared resource for testing
1、last release:
---
# Source: base-app/templates/service.yaml
apiVersion...
The channel denoscription says "... and other issues", right?
So, today I want to share with you WSJF model of SAFe framework, which helps to compare priorities of different projects. WSJF stands for "Weighted Shortest Job First".
This concept won't be new at all for the product people and project managers. And this is exactly why I want to share it here. Through my career, I saw a lot of examples, when platform teams or OPS teams didn't have their dedicated product/project manager. Therefore, there were a lot of struggles in what to prioritize among multiple projects.
I saw this framework in action and I think it's useful. Ofc, this is not a silver bullet. You may need to make a few tweaks to the process here and there, but in general this is a good start if you're not sure what you should pick up next from the pile of platform work.
#management #agile #safe
So, today I want to share with you WSJF model of SAFe framework, which helps to compare priorities of different projects. WSJF stands for "Weighted Shortest Job First".
This concept won't be new at all for the product people and project managers. And this is exactly why I want to share it here. Through my career, I saw a lot of examples, when platform teams or OPS teams didn't have their dedicated product/project manager. Therefore, there were a lot of struggles in what to prioritize among multiple projects.
I saw this framework in action and I think it's useful. Ofc, this is not a silver bullet. You may need to make a few tweaks to the process here and there, but in general this is a good start if you're not sure what you should pick up next from the pile of platform work.
#management #agile #safe
👍2🔥1
Not so long time ago, I shared with you a tool called Acra for encryption/decryption of sensitive data in a database. This tool is written in Go, and obviously it uses TLS.
Now, they have written an article about TLS implementation in Go, specifically about the implementation of OCSP and CRL extensions.
This article would be interesting for you, foremost, to get some ideas on OCSP and CRL extensions and their use cases. Secondly, if you need to implement TLS in your apps or advise on the implementation to your developers.
#security #programming #go #tls
Now, they have written an article about TLS implementation in Go, specifically about the implementation of OCSP and CRL extensions.
This article would be interesting for you, foremost, to get some ideas on OCSP and CRL extensions and their use cases. Secondly, if you need to implement TLS in your apps or advise on the implementation to your developers.
#security #programming #go #tls
Cossack Labs
TLS certificate validation in Golang: CRL & OCSP examples | Cossack Labs
All developers need to know about using OCSP and CRL for validating TLS certificates in Go apps. Things we’ve learnt while building our own OCSP/CRL validation tooling: design, implementation and security tips, example code and popular mistakes.
If you haven’t read a Roblox’s postmortem on October‘s 73-hour outage, you definitely should!
Even though this event happened in October, the postmortem was released just a few days ago. And in this case, this is a very good decision! Especially, because this write up provides a detailed analysis on what happened at that time and what chain of events caused that.
It‘s cool to read postmortem the next day after an outage - we are all curious human beings. Unfortunately, those postmortems usually they are lacking many details. This is understandable: it‘s not enough time for a thorough analysis, also your team is probably already tired.
In this case, though, you can have a detailed overview of what happened as well as plans to prevent this chain of events happening again. Moreover, with some plans already implemented.
It‘s a pity that not may companies do similar postmortems. And I must say that this is probably in their disadvantage either. After reading this document I have a feeling that Roblox is a cool place to work, TBH.
#postmortem #hashicorp #consul
Even though this event happened in October, the postmortem was released just a few days ago. And in this case, this is a very good decision! Especially, because this write up provides a detailed analysis on what happened at that time and what chain of events caused that.
It‘s cool to read postmortem the next day after an outage - we are all curious human beings. Unfortunately, those postmortems usually they are lacking many details. This is understandable: it‘s not enough time for a thorough analysis, also your team is probably already tired.
In this case, though, you can have a detailed overview of what happened as well as plans to prevent this chain of events happening again. Moreover, with some plans already implemented.
It‘s a pity that not may companies do similar postmortems. And I must say that this is probably in their disadvantage either. After reading this document I have a feeling that Roblox is a cool place to work, TBH.
#postmortem #hashicorp #consul
Roblox
Roblox Return to Service | Roblox
Roblox is a global platform where millions of people gather together every day to imagine, create, and share experiences with each other in immersive, user-generated 3D worlds.
👍7
Just a friendly reminder that we still have our Kubernetes survey form opened!
We would appreciate it if you can spend some time filling it!
Cheers!
#kubernetes
We would appreciate it if you can spend some time filling it!
Cheers!
#kubernetes
Google Docs
Kubernetes Cluster Operations Survey by CatOps
Hello and thank you for participating in our Kubernetes Cluster Operations Survey!
The goal of this survey for us to have a glance on how do people manage their Kubernetes clusters, what is the adoption rate for cloud cluster management solutions, and what…
The goal of this survey for us to have a glance on how do people manage their Kubernetes clusters, what is the adoption rate for cloud cluster management solutions, and what…
RedHat presented their own minimal Kubernetes distribution targeted at edge devices - MicroShift.
Functionally, MicroShift repackages OpenShift core components into a single binary that weighs in at a relatively tiny 160MB executable (without any compression/optimization).
As a monolith, it provides an “all-or-nothing” start/stop behavior that works well with systemd and enables fast (re)start times of a few seconds.
So first of all, you can now install OpenShift on a Raspberry Pi as a single binary. Secondly, your car will probably run Kubernetes in the nearest future.
#kubernetes #OpenShift #RedHat
Functionally, MicroShift repackages OpenShift core components into a single binary that weighs in at a relatively tiny 160MB executable (without any compression/optimization).
As a monolith, it provides an “all-or-nothing” start/stop behavior that works well with systemd and enables fast (re)start times of a few seconds.
So first of all, you can now install OpenShift on a Raspberry Pi as a single binary. Secondly, your car will probably run Kubernetes in the nearest future.
#kubernetes #OpenShift #RedHat
Red Hat Emerging Technologies
Introducing MicroShift
MicroShift has been specifically designed for edge computing use cases, with a goal of fitting in the limited storage capacity of field-deployed devices that can be embedded into a variety of appliances such as cars, factory lines, airplanes or even satellites.
👍5
It's time to patch node OS for your Kubernetes clusters. If you manage nodes on your own, of course.
CVE-2022-0185 can allow a container in Kubernetes to escape using
#kubernetes #security
CVE-2022-0185 can allow a container in Kubernetes to escape using
unshare Linux command. Usually, it's blocked by Docker's seccomp filter, which is disabled by default in Kubernetes.#kubernetes #security
Aqua
CVE-2022-0185 in Linux Kernel Can Allow Container Escape in Kubernetes
A high-severity CVE was released that affects the Linux kernel, allowing unprivileged users to escalate those rights to root and escape from the container
And another security update comes from Let's Encrypt.
Let's Encrypt will revoke all active certificates that were issued and validated with the TLS-ALPN-01 challenge before 00:48 UTC on 26 January 2022. Because of a bug, those certificates are considered mis-issued.
They estimate this is <1% of all active certificates, so it's not that bad, though.
#security #tls
Let's Encrypt will revoke all active certificates that were issued and validated with the TLS-ALPN-01 challenge before 00:48 UTC on 26 January 2022. Because of a bug, those certificates are considered mis-issued.
They estimate this is <1% of all active certificates, so it's not that bad, though.
#security #tls
Let's Encrypt Community Support
2022.01.25 Issue with TLS-ALPN-01 Validation Method
At 16:48 UTC on Tuesday Jan 25, 2022, a third party informed Let’s Encrypt / ISRG that, while examining the Boulder codebase, they had noticed two instances of specification non-compliance in our implementation of the “TLS Using ALPN” validation method (BRs…
Some Friday material.
This short article is a perfect analogy for programming and systems design in general!
This short article is a perfect analogy for programming and systems design in general!
The Oatmeal
Erasers are wonderful
An eraser is not a highlighter of mistakes. An eraser is a tool.
🔥7
Consul API Gateway is now in beta.
It also got TCPRoute Support as well as now it's supported in the official Helm Chart.
There is also a new learning material for you to take a closer look at it.
#hashicorp #kubernetes #networking #consul
It also got TCPRoute Support as well as now it's supported in the official Helm Chart.
There is also a new learning material for you to take a closer look at it.
#hashicorp #kubernetes #networking #consul
HashiCorp
Consul API Gateway Now Generally Available
The Consul API Gateway has now reached its first GA release, adding TCPRoute support, Helm chart support, and a new HashiCorp Learn tutorial.
👍1
So, if you want to know, how the real serverless looks like, here you are.
WebVM allows you to run fully functional Debian virtual machine in your browser.
The article provides an overview of the technology as well as the things that make this possible.
Obviously, there are not many businesses implementations for this at the moment, but I see great potential in it.
#serverless #wasm
WebVM allows you to run fully functional Debian virtual machine in your browser.
The article provides an overview of the technology as well as the things that make this possible.
Obviously, there are not many businesses implementations for this at the moment, but I see great potential in it.
#serverless #wasm
Leaning Technologies Developer Hub
WebVM: server-less x86 virtual machines in the browser
We made a server-less virtual Linux environment that runs unmodified Debian binaries in the browser. This is powered by CheerpX, a WebAssembly virtualization platform. Feel free to play with it and report bugs: https://webvm.io
Information from our chat.
Be careful committing to SOPS for your secret management.
It looks like they're looking for maintainers at the moment, which means that this project is not supported right now to a degree it was before.
P.S.: If you want to share any interesting information, feel free to join our chat! Although, keep in mind that a mix of Ukrainian and Russian is used there.
#security
Be careful committing to SOPS for your secret management.
It looks like they're looking for maintainers at the moment, which means that this project is not supported right now to a degree it was before.
P.S.: If you want to share any interesting information, feel free to join our chat! Although, keep in mind that a mix of Ukrainian and Russian is used there.
#security
GitHub
New maintainers · getsops/sops · Discussion #927
It's quite apparent to me that neither @ajvb nor me currently have enough time to maintain the project, with PRs sitting unreviewed. I think it's time to look for some new maintainers. I do...
👍3😱3
HUG Kyiv #13: Q/A session with HashiCorp co-founders in 1 day!
When: Thursday 3rd February, 19:50 (Kyiv TZ)
Where: Online
Language: English
Feel free ask and vote for questions here
#event
When: Thursday 3rd February, 19:50 (Kyiv TZ)
Where: Online
Language: English
Feel free ask and vote for questions here
#event
👍12
This post will be interesting to those, who run Java application in Kubernetes. Specifically, if you use OkHttp client for Java.
Kubernetes network load balancing using OkHttp client - the name speaks for itself. Basically, the problem is that
This article provides some useful insights on how to trace down this issue and how to fix it in your code, as well as it mentions tradeoffs of such fix.
#kubernetes #java #programming
Kubernetes network load balancing using OkHttp client - the name speaks for itself. Basically, the problem is that
OkHttp uses persistent connections to communicate with the peers. Therefore, IPVS - the default K8s load balancer - is unable to properly balance those connections. Thus, you may have all the connections served by a single replica of your downstream service!This article provides some useful insights on how to trace down this issue and how to fix it in your code, as well as it mentions tradeoffs of such fix.
#kubernetes #java #programming
Medium
Kubernetes network load balancing using OkHttp client
Don’t always believe in features that run out of the box. Always check the behaviour and tune. Sometimes it’s easier than you expect.