lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:   Tue, 28 Feb 2017 08:24:21 -0500
From:   Jamal Hadi Salim <jhs@...atatu.com>
To:     "netdev@...r.kernel.org" <netdev@...r.kernel.org>
Cc:     netfilter-devel@...r.kernel.org, netfilter@...r.kernel.org,
        info@...devconf.org, linux-wireless@...r.kernel.org,
        tech-committee@...devconf.org, David Miller <davem@...emloft.net>,
        Stephen Jaworski <jaws@...atatu.com>, lwn@....net,
        people@...devconf.org, Brenda Butler <bjb@...atatu.com>
Subject: ANNOUNCE: Netdev 2.1 update Feb 28

A few announcements:


1) Going forward we are going to be sending more frequent
announcements to the conference discussion/announcement list:
people@...devconf.org

You can subscribe via mailman here:
https://lists.netdevconf.org/cgi-bin/mailman/listinfo/people

We urge people to subscribe to that list to get more up to date
information and conference discussions. We will still be sending
weekly summaries and announcements on the netdev list.

If you have already registered for the conference we will
very likely have registered you already.

2) Reminder: Early registration was extended to March 5.

Register early so we can plan better (and so you can save some $$).
https://onlineregistrations.ca/netdev21/

- hotel (If you can get the hotel cheaper online than conference
rates please send us email, dont book ):
https://www.netdevconf.org/2.1/hotel.html

3) Tech committee has accepted another exciting talk. This
time from Gilberto Bertin on how Cloudfare is integrating XDP in
their DDoS mitigation approach. More description:

----
This talk provides an introduction to how we are planning to integrate
XDP into our DDoS mitigation pipeline at Cloudflare, which every day
helps defend our infrastructure from thousands of different attacks,
in the range of 50-150 Gbps (with peaks of 500 Gbps).

The main points of the presentation are:
* introduction to the current architecture: from how attack traffic
is sampled, to attack detection and mitigation, to how BPF fits in
the current pipeline
* architecture changes we are expecting, and new tools required
after we move from our current network kernel bypass setup to XDP
* issues and questions regarding the current state of XDP
-----------

cheers,
jamal

Powered by blists - more mailing lists