The next version of HTTP won’t be using TCP

Enlarge (credit: Andy Maguire / Flickr)
The next version of the Hypertext Transfer Protocol (HTTP)—the network protocol that defines how browsers talk to Web servers—is going to make a major break from the versions in use today.
Today’s HTTP (versions 1.0, 1.1, and 2) are all layered on top of TCP (Transmission Control Protocol). TCP, defined as part of the core set of IP (Internet Protocol) layers, provides reliable, ordered, and error-checked delivery of data over an IP network. “Reliable” means that if some data goes missing during transfer (due to a hardware failure, congestion, or a timeout), the receiving end can detect this and demand that the sending end re-send the missing data; “ordered” means that data is received in the order that it was transmitted in; “error-checked” means that any corruption during transmission can be detected.
These are all desirable properties and necessary for a protocol such as HTTP, but


Original URL: https://arstechnica.com/?p=1410285

Original article

Tunnelled IPv6 Attacks Bypass Network Intrusion Detection Systems

“The transition to internet protocol version 6 has opened up a whole new range of threat vectors that allow attackers to set up undetectable communications channels across networks, researchers have found.”
Slashdot reader Bismillah summarizes a report from IT News.

Researchers at NATO’s Cooperative Cyber Defence Centre of Excellence and Estonia’s University of Tallinn have worked out how to set up communications channels using IPv6 transition mechanisms, to exfiltrate data and for systems control over IPv4-only and dual-stack networks — without being spotted by network intrusion detection systems.

The article argues that “Since IPv6 implementations and security solutions are relatively new and untested, and systems engineers aren’t fully aware of them, the new protocol can become a network backdoor attackers can exploit undetected.” The researchers’ paper is titled “Hedgehog In The Fog.”

Read more of this story at Slashdot.


Original URL: http://rss.slashdot.org/~r/Slashdot/slashdot/~3/717LsGA7oQs/tunnelled-ipv6-attacks-bypass-network-intrusion-detection-systems

Original article

Intel’s Atom is underwhelming no more: New chip packs 16 cores

Intel’s Atom was mostly known as a low-end chip for mobile devices that underperformed. That may not be the case anymore.
The latest Atom C3000 chips announced on Tuesday have up to 16 cores and are more sophisticated than ever. The chips are made for storage arrays, networking equipment, and internet of things devices.[ Further reading: Intel looks to modernize data centers with new Xeon server chips ]

The new chips have features found mostly in server chips, including networking, virtualization, and error correction features.To read this article in full or to leave a comment, please click here


Original URL: http://www.computerworld.com/article/3171081/servers/intels-atom-is-underwhelming-no-more-new-chip-packs-16-cores.html#tk.rss_all

Original article

Switches coming out this year will drive open networking forward

Two moves by open networking vendors this week are likely to chip a little bit more off the monolith of proprietary, appliance-like equipment that still moves most packets around enterprise data centers.
On Thursday, network OS supplier Cumulus Networks introduced turnkey switches based on standard hardware from Edgecore Networks running Cumulus software. They’re designed to allow customers who are new to open networking to get started quickly and easily.
Earlier in the week, Barefoot Networks announced that Edgecore and another Taiwan-based manufacturer called WNC would start shipping switches that use the company’s fully programmable chips.To read this article in full or to leave a comment, please click here


Original URL: http://www.computerworld.com/article/3159390/networking/switches-coming-out-this-year-will-drive-open-networking-forward.html#tk.rss_all

Original article

Proudly powered by WordPress | Theme: Baskerville 2 by Anders Noren.

Up ↑

%d bloggers like this: