Ein Vortrag von jgjl auf der GPN18.
Recent developments in networking such as the Open Compute Project, Software-Defined Networking, OpenFlow, and the P4 language enable the use of open source software with high-performance networking hardware. This talk investigates the state of openness in this hitherto very closed area of the IT industry.
Until a few years ago, getting any information on network switch or router hardware required an NDA. Getting the required SDK or drivers to write open source software for these devices was impossible, even buying switches with an open operating system was difficult if not impossible.
This changed with the introduction of the Open Compute Project and OpenFlow. The first introduced pressure on the switch ASIC vendors to open up, the latter provides an API for switch hardware, and comes with an open source ecosystem. As an exemplary result, Broadcom, an incumbent switch ASIC vendor, released open API information on their switch ASICs (SAI, OF-DPA, SDKLT), as well as driver blobs for open source operating systems. This, in combination with bare-metal switches and a standardized OS installer, kicked off a wide array of Linux-based operating systems.
In this talk investigates the different aspects of networking hardware and their respective state of openness as well as opportunities for implementing new ideas and open source contributions. The goal of the talk is to spread the awareness of this topic and provide an architectural overview on the area.
This talk is based on my experiences during my work as a research assistant in the field of Software-Defined Networking and Networks Function Virtualization at Technische Universität Darmstadt.
Links
Fahrplan |
Hauptseite | Feedback | FAQ
What to hack Seitenkanal-Angriffe innerhalb FPGA-Chips RFID/NFC-Grundlagen - A Pentesters Perspective Einführung: Schlangenprogrammiernacht 2018 GameJam Einführung Sprich mit uns! Eine Ermunterung für neue Speaker. Einführung in die Chaosvermittlung Meltdown and Spectre for normal people Channelizing with GnuRadio HTTP Security & Headers Good Patterns for Deep Learning with Tensorflow How we CARE OpenPGP Keys anstarren faheus Finally - Venenerkennung hacken. Practical Cryptography Patterns Automatically Assessing Security and Privacy Properties of Web Sites Concepts and Tooling in Reverse Engineering Deep Learning with Tensorflow from Zero to Hero in 60 Minutes Can you hug yourself? Alles was ihr schon immer über Glasfasern wissen wolltet robotcowboy: A Wearable One-Man-Band Cyborg Performance Project Binary Ninja plugin development Domain-Automatisierung mit cryptdomainmgr Recht auf (k)ein Geschlecht Offenheit der IT Supply Chain einschließlich Tools und Fabs pluto - a not so smart smart watch Persistance of Vision Generative Kunst mit paper.js tuwat:Bildung im Gespräch Hacking a 15$ Quadcop for Adding a Computer Interface for Flight Control How the Internet has changed being Intersex HowTo: Moving Objects Gimmicks into Augmented reality Sysadmin Nightmares 2018 Key to Historical Object Juxtaposition Using and creating console oriented services (such as wttr.in, cheat.sh, rate.sx, etc) Vorlesungsaufzeichnung an der Uni - vollautomatisch Mitgliederverwaltung mit byro Git from the inside Frida - (Game)Hacking mit JavaScript Open Source in High-Performance Networks Language Without Code: The Extremes of Nonprogrammable and Conceptual Programming Languages The Death of Localhost - Hands-on Cloud Development with node.js, PHP, python or your favorite language.. CCCamp 2019 Badge Ideen und Konzepte $QL from Hell Logbuch:Netzpolitik 253 tmux - Warum ein schwarzes Fenster am Bildschirm reicht Go für ProgrammiererInnen automated number plate readers How to ... conflict Crypto für CTFs MicroOrchestra: Electroacoustic Laptop Performance using Pure Data Latin Lounge One Brain, One Keyboard, One Editor Hacking relationships Backstage of the Web: Analysis of IoT Firmwares to Find Web 0-Days Computational Narratives - Philosophical perspectives on Jupyter Notebook Geschichte_n der Informatik Kausalität, nichtlineare Systeme und ein Spiel gr-iridium: Unter der Haube Hold Steering Wheel! Autopilots and Autonomous Driving. Beziehungsnormativität hacken - Workshop zum Thema Polyamorie Editieren unter Unix mit ed(1) That time my great grandfather didn't die Ich komme aus einem anderen Land - Telematik in der Medizin Building security - Coding "Nicht mitten auf der Straße!" oder was bringt die OSM für uns Fußgänger? Build your own Twitter bot! F.U.C.K. Germany - FLTI* und Computer Kram Disintegrating Rockets - Softwarefehler in der Raumfahrt (und wie wir versuchen sie zu vermeiden) Moderne Stoffwindelsysteme Cloud Security Suite - One stop tool for AWS & GCP Security Audit Warum Henry Ford die besseren Web Applikationen gebaut hätte Datacenter in a Box - High Performance Computing mobil Lightning Talks für Fragen AUR Pakete bauen für Anfänger Laserlabyrinth Aerodynamics 101 ada_conf - the making of a separatistic IT conference The Basics Of Audio Compressors an introduction into digital model railroads Ein Exzellenzkodex für den Congress Building your Pen & Paper world Märchenhafte Protokolle kinX: keyboard hacking Pilot I: Decentralised Autonomous Organisation eine Diskussion Die Katze ist der Chef im Haus... Und der Geek muss es ausbaden. Security Champions Interfacedesign aus Designersicht World Domination - more achievable than ever? - GameJam@GPN U2Fishing: Potential Security Threat Introduced by U2F Key Wrapping Mechanism AI and the End of the World horizon EDA - ein Jahr später Moderne Kommandozeilen Werkzeuge Lasst uns Massenverschlüsslung ausrollen! DSGVO - Was bedeutet das für uns? Cthulhu Pen&Paper Session Standards - Gut, dass so Viele zur Auswahl stehen Linux Network Namespaces vs. VRFs Publish your research! - Warum öffentlich finanzierte Forschung nicht veröffentlicht wird Lightning Talks Demoshow SSH Certificates Dezentrale soziale Netzwerke – Theorie und Praxis Hackerspaces.org - Quo vadis? Infrastructure Review and Closing