Tag: cyberstorm.mu

IETF 103 hackathon remotely by cyberstorm.mu – Day 2 & 3

In case you missed Day-0 and Day-1 for the IETF 103 hackathon by the cyberstorm.mu team, feel free to have a look. I should admit that Day-2 was a more relaxed day for the SSH team compared to those working for the TLS 1.3 and HTTP 451 projects. Several PR’s sent for all the three tracks which are HTTP 451, SSH and TLS 1.3. It’s more about the testing.


It looks that we had enough time to discuss even more about our future move for the next IETF hackathon. All teams were ready with the patches and several Pull Requests sent. We seized the opportunity to discuss several aspects and experience during the hackathon. Overall, the IETF 103 hackathon went well for all the three tracks.

As regards for the NetSSH project which I worked there was a comment from Mzafekas on Github: “

@jmutkawoa thanks much for the PR. Since this is in some means a breaking change, this would be in the next major version.”

I’m glad that we will have the RC4 deprecated in the new version of NetSSH. We had our live presentation remotely from Mauritius during the IETF 103 hackathon live in Bangkok, Thailand. You can view the presentation here:


IETF Hackathons encourage developers to collaborate and develop utilities, ideas, sample code and solutions that show practical implementations of IETF standards. More than 200 participants have gathered in Bangkok to make the Internet work better.
 
As usual, someone got an idea to do a mega splash in the pool with the slow-motion video which is pretty nice 🙂
 

 

I’m glad that TheRegister also published an interesting article about RC4 deprecation. At cyberstorm.mu, we are also looking forward to the next IETF 104 hackathon which has been scheduled remotely at Prague, Czech.

IETF 103 hackathon remotely by cyberstorm.mu – Day 1

Day-0 for the IETF 103 hackathon was really fun. We had two first-timers who worked pretty hard. It was really an intense moment on Day 1. Everyone was busy with their projects. I should admit it was pretty intense. Our first pull request was already merged by Muzaffar from the TLS 1.3 whereas kheshav had the testing part to complete for HTTP 451. I already send a pull request for SSH for the NetSSH Ruby library. We discussed a lot on implementation and testing part. Nathan, Jeremy, and Rahul also worked heavily on the TLS 1.3 implementation. For the IETF 103, we decide to skip the interoperability testing and focus more on implementation.

IETF 103 DAY1

Flickr Album Gallery Powered By: WP Frank

When it comes to goodies, WolfSSL congratulated us for a good job and sent us several goodies and other stuff.

However, on the SSH side, we have to deprecate RC4 in several projects such as NetSSH and JSCH, a JAVA library. On TLS 1.3, SNI added to Httperf, a TLS 1.3 library is still on progress on CSharp and LUA. We also have one module for Drupal and Django for HTTP 451.

IETF 103 hackathon remotely by cyberstorm.mu – Day 0

Today is the first day for the IETF 103 remote hackathon in Mauritius. The cyberstorm.mu team is ready to lead and participate in all the three tracks as champions for the event. We have the TLS 1.3, SSH and HTTP 451. All the three tracks are lead by cyberstorm.mu as champions.

Members participating in the event are :

TLS 1.3 protocol

HTTP 451 protocol

SSH protocol

Our first timers for the IETF 103 hackathon is Kheshav Sewnundun, creator of XpressLiteCoin.com and Devops Engineer at Linkbynet Indian Ocean. We also have Diresh Soomirtee, Junior system administrator at Linkbynet Indian Ocean.

Prior before the hackathon, we did some shopping for the basic amenities.  We reached at the quarter at a Mauritius Villas, a bungalow in Pointe Aux Piments at around 13:00 hrs. The network was set up with two different ISPs in case of breakdown, we can still be live during the hackathon.

We also celebrated Kifah’s birthday during the hackathon.

At cyberstorm.mu, it’s always the pool that brings more relaxing time. We are also in the Halloween week and some guys even brought their Halloween costumes and went swimming inside the pool.

IMG_1718
d816b387-bd2a-4b1d-816e-13e99de47561
d816b387-bd2a-4b1d-816e-13e99de47561
Screen Shot 2018-11-03 at 10.19.59 AM
IMG_1729
IMG_1729
IMG_1713
IMG_1724
Screen Shot 2018-11-03 at 10.32.20 AM
IMG_1722
IMG_1717
IMG_1728
IMG_1723
IMG_1723
IMG_1720
IMG_1714
IMG_1712

Most of us already started working on our projects and some pull requests already sent. More testing on progress as well as creating of several patches. We even need to have a discussion on open source licensing to make sure that there are incompatibility issues between different licenses. We made a plan for the three tracks we are championing and it looks to start pretty fine.

By this time, it’s already late here. I really need some sleep to start day 1 for the IETF 103 hackathon 🙂

Operation KSK-ROLL by cyberstorm.mu – KSK Rollover Explained

The last cyberstorm.mu event was on OpenSource licensing with Dr. Till Jaeger at Flying Dodo, Bagatelle Mall Mauritius. We discussed several issues concerning cybersecurity laws, trademarks, OpenSource licensing issues etc.. Dr. Till Jaeger appreciated the meetup and encouraged us to evangelize more on OpenSource. The event was organized by Loganaden Velvindron member of cyberstorm.mu.

Dr. Till Jaeger and logan with a surprise gift.
Dr. Till Jaeger brought a surprise gift to Logan 🙂

I should say that we were already planning about our next event, hence, a hackathon on Operation KSK-ROLL by the cyberstorm.mu team which was pretty easy, important and successful. Dr. Till Jaeger congratulate us for creating the cyberstorm.mu team. Several pull requests sent to many repositories to encourage developers to adopt the new key.

What is Operation KSK-ROLL?

At cyberstorm.mu all Non-IETF hackathons are usually given a name. This time for the KSK rollover hackathon we have chosen 'Operation KSK-Roll'. Operation KSK-ROLL has been started to make sure that software is up-to-date with the new KSK key.

What is the KSK rollover?

The DNS KSK Rollover happened on 11 October at 11:00 UTC. Rolling the KSK means generating a new key cryptographic key pair (public and private key).

What are those keys?

The public key is distributed to those who operate valid DNS resolvers such as ISPs, network administrators, system integrators etc.. whilst, the private key is kept secret.

If its secret, why do we need to generate another secret key?

For security purpose, the secret key is generated anew and this ensures that DNS resolvers have a more robust security layer on top of the DNS AKA: DNSSEC

What are DNS resolvers?

All websites, example tunnelix.com which is a domain name is behind an IP Address. For your browser to be able to resolve the website, a DNS resolver which is located at several parts of the world will identify the IP with the domain name. Consequently, this will render the website on your browser.

What is DNSSEC?

As mentioned previously, DNSSEC (DNS Security) is a layer added by ICANN to ensure by means of cryptographic keys to ensure an online protection from the provider of the root domain name to your browser.

How will you know if a website is DNSSEC signed?

There is a tool by VeriSign lab which provides DNSSEC Analyzer. You can enter the name of the domain, say tunnelix.com which will analyze the domain show you the public key and the chain from the . (dot),  com and tunnelix.com.

credits to: verisignlabs.com
credits to: verisignlabs.com

Is there another way to verify it?

Yes, you can use the nslookup or dig tool to check it. In the case of the dig tool here is a screenshot.

What is the logic behind the DIG command?

Some years back (the Year 2015), I explained the anatomy of the dig command. You can view more details about the blog post called "Anatomy of a simple dig result".


What is the role of the KSK?

The KSK private key is used to generate a digital signature for the ZSK. In fact, the KSK public key is stored in the DNS to be used for authenticating the ZSK. So, the KSK is a key to sign another key for the ZSK. That is why it is called the "Key Signing Key".

So, what is the ZSK?

The ZSK (Zone Signing Key) is another private-public key pair which is used to generate a digital signature known as RRSIG ( Resource Record Signature). The RRSIG in itself is a digital signature for each RRSET (Resource Record Sets) in a zone. In fact, the ZSK is stored in the domain name system to authenticate the RRset.

What are RRsets?

RRsets (Resource Record sets) is a group of records DNS Record Set (RRsets) with the same record type, for example, all DNS A records are one RRset.

My contributions for KSK ROLL

Please follow me on my Github account. One of the repositories is Nagval which is a plugin to check the validity of one of more DNSSEC domains.

For more information about DNSSEC, ZSK, PSK etc, I would advise to check out Cloudflare which provided a good source of information.

Cyberstorm.mu continue to go beyond and further with innovations and more ideas to protect and secure the Internet. We believe that though we are a small team will be able to recruit more people who are strongly interested in developing their skills to strive for excellence.

I also wish to seize this opportunity to thanks Manuv Panchoo for designing the logo of  tunnelix.com


All rights reserved: tunnelix.com
All rights reserved: tunnelix.com

cyberstorm.mu meetup on OpenSource Licensing with Dr Till Jaeger

It was a great opportunity to meet with Dr. Till Jaeger, Attorney at Law on cybersecurity, laws, trademarks and opensource licensing on Tuesday the 02nd of October 2018 at Flying Dodo, Bagatelle Mall. The event was announced on the official cyberstorm.mu community Facebook group by Logan days back. Those present for the meetup was Loganaden Velvindron, Jagveer Loky, Rahul Golam, Kifah Meeran, Veegish Ramdani, Muzaffar Auhammud, Jeremie Daniel and myself from the cyberstorm.mu team.

Who is Dr. Till Jaeger? – Till Jaeger has been a partner at JBB Rechtsanwälte since 2001. He advises large and medium-sized IT businesses as well as government authorities and software developers on matters involving contracts, licensing and online use. Till Jaeger also covers conventional areas of copyright law and entertainment law, advising corporate clients on matters relating to open content, web design and photography. – Source: JBB.DE

Some pictures during the informal event:

 

OpenSource licensing with Dr. Till Jaeger and cyberstorm.mu

42935540_10212323570864049_8368692107799429120_n
42968234_10212323572504090_2567889336288673792_n
42950830_10212323576784197_4654246000414687232_n
43006824_10212323574624143_3826122953662136320_n
42972026_10212323735508165_2228714038051733504_n
42985512_10212323573544116_1829255669769830400_n
43021478_10212323736348186_8197301708435488768_n
43070514_249074402474539_4146444367671853056_n
43097410_10212323575984177_8134476138010378240_n
43119656_10212323575344161_97068219394686976_n
51e27cd0-87f1-402d-a02a-474cf81b9f39
Screen Shot 2018-10-07 at 6.59.57 PM
Screen Shot 2018-10-07 at 7.00.09 PM
Screen Shot 2018-10-07 at 6.59.25 PM
Screen Shot 2018-10-07 at 6.59.25 PM

I should admit that it was really an informal meeting over some beers, juice, Dame-Blanche, and Pizzas with Dr. Till Jaeger. It was very fruitful and amazing to the team. We received lots of advice for ourselves as well as for the cyberstorm.mu team. Some days back, the National Computer Board conducted a workshop on Opensource licensing which where Dr. Till Jaeger was the main resource person to deliver this workshop. Thanks to the National Computer Board for making this event a success. Cyberstorm.mu members were also invited to the event.

We have also welcomed Rahul Golam for joining cyberstorm.mu team and looking forward to work together. I seized this opportunity to announce that cyberstorm.mu  is proud to announce it’s official logo. Thanks to the hard work of the team.


Photo Credits: cyberstorm.mu
Photo Credits: cyberstorm.mu

Photo Credits: cyberstorm.mu
Photo Credits: cyberstorm.mu