Posts

Why BPF replacing iptables

Image
BPF comes to Firewalls - LWN article - Jonathan Corbet 2018 April 17, 2018 Why is the kernel community replacing iptables with BPF? DEEP DIVE original article from  https://cilium.io/blog/2018/04/17/why-is-the-kernel-community-replacing-iptables/ Author Note: this is a post by long-time Linux kernel networking developer and creator of the Cilium project, Thomas Graf The Linux kernel community recently announced  bpfilter , which will replace the long-standing in-kernel implementation of iptables with high-performance network filtering powered by Linux BPF, all while guaranteeing a non-disruptive transition for Linux users. From humble roots as the packet filtering capability underlying popular tools like tcpdump and Wireshark, BPF has grown into a rich framework to extend the capabilities of Linux in a highly flexible manner without sacrificing key properties like performance and safety. This powerful combination has led forward-leaning users of Linux kernel technolo

Multifactor Authentication Type

Different types of Multifactor Authentication Multi-factor authentication MFA), sometimes referred to as two-factor authentication or 2FA, is a security enhancement that allows a user to present two pieces of evidence – their credentials – when logging in to an account. The credentials fall into any of these three categories: (1) something that you know (like a password or PIN or answers to "secret questions" or a specific keystroke pattern), (2) something that a user has in their possession (like a smart card, a smartphone, or a hardware token like Securid for example), or (3) something you are (like a biometric pattern of a user's fingerprint, an iris scan or a voice print). In order to qualify as a multi-factor, the credentials must come from two different categories (from the above 3 categories) to enhance security. This means that entering two different passwords would not be considered multi-factor. However, entering a password followed by a fingerprint scan would