SlideShare a Scribd company logo
1© 2018 Mellanox Technologies
SmartNICs ..are awesome!
2© 2018 Mellanox Technologies
Agenda
 Data center trends
 Enter the SmartNIC
 The SmartNIC data center
 Beyond the network
3© 2018 Mellanox Technologies
The Compute Problem
 Everything is getting closer to the data
 “Smart edge, dumb pipe”
 Infrastructure and appliances both are
virtualized onto servers
 Higher network speeds + more
network infrastructure on host ==
severely decreased software efficiency
You don’t want to hear more about this, right?
4© 2018 Mellanox Technologies
The Attack Surface Problem
 Services consolidate on the same host
 User applications, infrastructure, data plane
services all sharing the same resources
 Lots of software running with escalated
privileges
 Traditional trust domains are now squashed
together
Host-based security is…oh boy…
5© 2018 Mellanox Technologies
1988
Ping Pong
Virus
Stateful
Firewall
1990
1994
Application
Layer Firewalls
Microsoft
Windows 98
1999
Software
Security
Goes
Mainstream
2000
The Year
of the
Worm
2012
Sandboxing
2013
Next
Generation
Endpoint
Packet Filters
Microsoft
Windows 95
1995
1998
Network
Intrusion
Detection
Stuxnet
2010
2017
WannaCry
Petya
2018
Meltdown
Spectre
2014
SSLv3 Protocol
Vulnerability and
POODLE attack
TLS 1.3
DNS Cache
Poisoning
GNU Bash
Remote Code
Execution
Vulnerability
OpenSSL
Heartbleed
Conficker
Worm
2015
Venom
2008
The Morris
Worm
2005
Advanced
Persistent
Threats (APT)
2006
SSL is
Invented
30 Years of Total Host Failures
"I think a lot of people think the nation states, they're running on this engine of
zero-days. You go out with your master skeleton key and unlock the door and
you're in. It's not that. Take these big, corporate networks, these large
networks, any large network -- I will tell you that persistence and focus will get
you in, will achieve that exploitation, without the zero-days.”
- Rob Joyce, TAO @ NSA
6© 2018 Mellanox Technologies
(With strict power consumption restrictions)
A SmartNIC is a computer
7© 2018 Mellanox Technologies
The “must-haves”
SmartNIC at its core
 High speed networking performance
 Robust and useful accelerators and offloads
 Supports networking virtualization and scaling
 Security and trust bonuses
 Software flexibility
 Management infrastructure
8© 2018 Mellanox Technologies
SmartNIC at a glance
9© 2018 Mellanox Technologies
SmartNIC Isolation
10© 2018 Mellanox Technologies
Embedded
compute physical
function – override
host PF + VF config
VFs share hardware resources
SRIOV == 0
hypervisor
involvement
Host bypass
Data
protection
between
guests
Near bare
metal
performance
“host” physical function allocates VFs
as it normally would
SmartNIC Isolation
11© 2018 Mellanox Technologies
Hardware offload
Data-plane Programming
12© 2018 Mellanox Technologies
PEP
PDP
Additional
PEPs
Policy Enforcement Point
Data-plane Programming
13© 2018 Mellanox Technologies
Data-plane Policy
1
2
3Miss in the
offloaded switch
Packet -> Software
Program flow into
switch
14© 2018 Mellanox Technologies
Policy Enforcement
15© 2018 Mellanox Technologies
Enforcing policy checklist…
Policy Management
 Authenticate the policy
 Program the flow tables
 Exchange information between SmartNICs
 Identify where applications are running
 Program packet engine software
 Create tunnels
 Track sessions/flows
16© 2018 Mellanox Technologies
Programming for Solutions
 Major options
 Embedded compute as control plane (isolated modification of hardware NFV)
 OVS based solutions
 DPDK etc
 Appliance-in-the-wire (nginx, for example)
 Linux kernel networking config
 Or….
 Anything at all??
 Linux applications that free up host CPU cycles or require greater isolation
17© 2018 Mellanox Technologies
Simple SmartNIC Firewall
ovs-vsctlshow
12ed5b74-1521-4ba9-8b0d-45f88fe25cc7
Bridge"br0"
Port"rep0-0"
Interface"rep0-0"
Port"enp3s0f0"
Interface"enp3s0f0"
Port"enp3s0f1"
Interface"enp3s0f1"
Port"rep1-0"
Interface"rep1-0"
Port"br0"
Interface"br0"
type:internal
ovs_version:"2.9.1"
18© 2018 Mellanox Technologies
Simple SmartNIC Firewall
ovs-ofctldel-flowsbr0
wire=`ovs-vsctlget Interfaceenp3s0f0ofport`
host=`ovs-vsctlget Interfacerep0-0ofport`
ovs-ofctladd-flowbr0table=0,priority=1,action=drop
ovs-ofctladd-flowbr0table=0,priority=10,arp,action=normal
ovs-ofctladd-flowbr0table=0,priority=100,ip,ct_state=-trk,action="ct(table=1)"
ovs-ofctladd-flowbr0
priority=50,table=1,in_port=$host,udp,tcp_dst=53,ct_state=+trk+new,
action="ct(commit),normal"
ovs-ofctladd-flowbr0
priority=50,table=1,in_port=$wire,ip,ct_state=+trk+est,action=normal
ovs-ofctladd-flowbr0
priority=50,table=1,in_port=$host,ip,ct_state=+trk+est,action=normal
ovs-ofctladd-flowbr0priority=40,table=1,action=drop
19© 2018 Mellanox Technologies
Simple SmartNIC Firewall
 Open SSH to host
 Allow outbound traffic
ovs-ofctladd-flowbr0
priority=50,table=1,in_port=$wire,tcp,tcp_dst=22,ct_state=+trk+new,
action="ct(commit),normal"
ovs-ofctladd-flowbr0
priority=50,table=1,in_port=$host,tcp,ct_state=+trk+new,
action="ct(commit),normal"
ovs-ofctladd-flowbr0
priority=50,table=1,in_port=$host,udp,ct_state=+trk+new,
action="ct(commit),normal"
ovs-ofctladd-flowbr0
priority=50,table=1,in_port=$host,icmp,ct_state=+trk+new,
action="ct(commit),normal"
20© 2018 Mellanox Technologies
Isolated and Embedded Functions
 Use OVS to switch between host VFs,
physical ports, and embedded
applications
 Full use of flow table criteria and
software for matching
 Application can be anything!
21© 2018 Mellanox Technologies
Isolated and Embedded Functions
iplink addveth1 typeveth peer name veth2
ovs-vsctladd-portbr0veth1
ovs-vsctlshow
12ed5b74-1521-4ba9-8b0d-45f88fe25cc7
Bridge"br0"
Port"rep0-0"
Interface"rep0-0"
Port"veth1"
Interface"veth1"
Port"enp3s0f0"
Interface"enp3s0f0"
Port"enp3s0f1"
Interface"enp3s0f1"
Port"rep1-0"
Interface"rep1-0"
Port"br0"
Interface"br0"
type:internal
ovs_version:"2.9.1"
22© 2018 Mellanox Technologies
A Second Look…
 Use OVS + kernel networking stack to
build transparent IPsec tunnels
 (Transparent to the host, that is)
 Steps:
 Create OVS bridge
 Create veth pair for the tunnel & add to OVS
 Enable IP forwarding
 Add gw IP to veth tail
 Add OF rule to forward packets into the
tunnel
 Add linux route to forward from kernel to
veth
 IKE!
 Manage the tunnel…
How can we improve this…
23© 2018 Mellanox Technologies
What if we had host information…
 SmartNIC is a PCIe device…it can access host memory
 …..all of it!
 Silence alarm bells for a moment
 SmartNIC has embedded compute to parse that memory…
 SmartNIC has accelerators to RDMA between two systems….
 Embedded compute and host are two systems!
 SmartNIC has processing accelerators on the embedded compute…
Let’s put it all together!
24© 2018 Mellanox Technologies
Host introspection via SmartNIC
Hardware-based
accelerators used to
speed lookup and data
analysis (Regular
Expression, hardware
address translation, SHA)
Leverages hardware DMA
engines for secure
memory acquisition. No
dependence on runtime
software at host
Rapid interval based reads to
selective memory regions to
determine activity in real-time
Reconstruct data structures to
analyze process lists, vtable
modifications, and other
information
Analysis running in an isolated
trust domain
Network traffic
inspection
25© 2018 Mellanox Technologies
Demo!
26© 2018 Mellanox Technologies
Thank You

More Related Content

What's hot

Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
ArianeSpano
 
MISE EN PLACE DE SERVICES RESEAUX ET OPTIMISATION DE LA SECURITE AU SEIN DE l...
MISE EN PLACE DE SERVICES RESEAUX ET OPTIMISATION DE LA SECURITE AU SEIN DE l...MISE EN PLACE DE SERVICES RESEAUX ET OPTIMISATION DE LA SECURITE AU SEIN DE l...
MISE EN PLACE DE SERVICES RESEAUX ET OPTIMISATION DE LA SECURITE AU SEIN DE l...
mouliom matapit hermann cedric
 
Iot & cloud
Iot & cloudIot & cloud
Iot & cloud
YAZIDI Imran
 
security-reference-architecture.pdf
security-reference-architecture.pdfsecurity-reference-architecture.pdf
security-reference-architecture.pdf
JoniGarcia9
 
SDWAN vs MPLS: What Enterprises need?
SDWAN vs MPLS: What Enterprises need?SDWAN vs MPLS: What Enterprises need?
SDWAN vs MPLS: What Enterprises need?
Haris Chughtai
 
Ansible
Ansible Ansible
Cloud security
Cloud securityCloud security
Cloud security
BikashPokharel3
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
Er. Ajay Sirsat
 
Alphorm.com Formation Certification NSE4 : Fortinet Fortigate Security 6.x
Alphorm.com Formation Certification NSE4 : Fortinet Fortigate Security 6.xAlphorm.com Formation Certification NSE4 : Fortinet Fortigate Security 6.x
Alphorm.com Formation Certification NSE4 : Fortinet Fortigate Security 6.x
Alphorm
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Bilel BARHOUMI
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
IBM Security
 
ETUDE ET MISE EN PLACE D'UNE SOLUTION DE CLOUD COMPUTING PRIVÉ BASÉE SUR UN ...
ETUDE ET MISE EN PLACE D'UNE SOLUTION DE CLOUD COMPUTING  PRIVÉ BASÉE SUR UN ...ETUDE ET MISE EN PLACE D'UNE SOLUTION DE CLOUD COMPUTING  PRIVÉ BASÉE SUR UN ...
ETUDE ET MISE EN PLACE D'UNE SOLUTION DE CLOUD COMPUTING PRIVÉ BASÉE SUR UN ...
Borel NZOGANG
 
Sécurité dans le cloud
Sécurité dans le cloudSécurité dans le cloud
Sécurité dans le cloud
Hassan EL ALLOUSSI
 
Automating Disaster Recovery for Faultless Service Delivery
Automating Disaster Recovery for Faultless Service DeliveryAutomating Disaster Recovery for Faultless Service Delivery
Automating Disaster Recovery for Faultless Service Delivery
CA Technologies
 
Diapo présentation cloud
Diapo présentation cloudDiapo présentation cloud
Diapo présentation cloud
Roatta Cyril
 
Alphorm.com Formation Analyse de Malware 1/2 : Le guide complet
Alphorm.com Formation Analyse de Malware 1/2 : Le guide completAlphorm.com Formation Analyse de Malware 1/2 : Le guide complet
Alphorm.com Formation Analyse de Malware 1/2 : Le guide complet
Alphorm
 
Etude et mise en place d’une solution open source de gestion de la sécurité d...
Etude et mise en place d’une solution open source de gestion de la sécurité d...Etude et mise en place d’une solution open source de gestion de la sécurité d...
Etude et mise en place d’une solution open source de gestion de la sécurité d...
Mohammed LAAZIZLI
 
projet fin d'étude IWAN
projet fin d'étude IWANprojet fin d'étude IWAN
projet fin d'étude IWAN
Med Amine El Abed
 
Investigation de cybersécurité avec Splunk
Investigation de cybersécurité avec SplunkInvestigation de cybersécurité avec Splunk
Investigation de cybersécurité avec Splunk
Ibrahimous
 

What's hot (20)

Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
 
MISE EN PLACE DE SERVICES RESEAUX ET OPTIMISATION DE LA SECURITE AU SEIN DE l...
MISE EN PLACE DE SERVICES RESEAUX ET OPTIMISATION DE LA SECURITE AU SEIN DE l...MISE EN PLACE DE SERVICES RESEAUX ET OPTIMISATION DE LA SECURITE AU SEIN DE l...
MISE EN PLACE DE SERVICES RESEAUX ET OPTIMISATION DE LA SECURITE AU SEIN DE l...
 
Iot & cloud
Iot & cloudIot & cloud
Iot & cloud
 
security-reference-architecture.pdf
security-reference-architecture.pdfsecurity-reference-architecture.pdf
security-reference-architecture.pdf
 
SDWAN vs MPLS: What Enterprises need?
SDWAN vs MPLS: What Enterprises need?SDWAN vs MPLS: What Enterprises need?
SDWAN vs MPLS: What Enterprises need?
 
Ansible
Ansible Ansible
Ansible
 
Cloud security
Cloud securityCloud security
Cloud security
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
 
Alphorm.com Formation Certification NSE4 : Fortinet Fortigate Security 6.x
Alphorm.com Formation Certification NSE4 : Fortinet Fortigate Security 6.xAlphorm.com Formation Certification NSE4 : Fortinet Fortigate Security 6.x
Alphorm.com Formation Certification NSE4 : Fortinet Fortigate Security 6.x
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
ETUDE ET MISE EN PLACE D'UNE SOLUTION DE CLOUD COMPUTING PRIVÉ BASÉE SUR UN ...
ETUDE ET MISE EN PLACE D'UNE SOLUTION DE CLOUD COMPUTING  PRIVÉ BASÉE SUR UN ...ETUDE ET MISE EN PLACE D'UNE SOLUTION DE CLOUD COMPUTING  PRIVÉ BASÉE SUR UN ...
ETUDE ET MISE EN PLACE D'UNE SOLUTION DE CLOUD COMPUTING PRIVÉ BASÉE SUR UN ...
 
Sécurité dans le cloud
Sécurité dans le cloudSécurité dans le cloud
Sécurité dans le cloud
 
Automating Disaster Recovery for Faultless Service Delivery
Automating Disaster Recovery for Faultless Service DeliveryAutomating Disaster Recovery for Faultless Service Delivery
Automating Disaster Recovery for Faultless Service Delivery
 
Diapo présentation cloud
Diapo présentation cloudDiapo présentation cloud
Diapo présentation cloud
 
Alphorm.com Formation Analyse de Malware 1/2 : Le guide complet
Alphorm.com Formation Analyse de Malware 1/2 : Le guide completAlphorm.com Formation Analyse de Malware 1/2 : Le guide complet
Alphorm.com Formation Analyse de Malware 1/2 : Le guide complet
 
Etude et mise en place d’une solution open source de gestion de la sécurité d...
Etude et mise en place d’une solution open source de gestion de la sécurité d...Etude et mise en place d’une solution open source de gestion de la sécurité d...
Etude et mise en place d’une solution open source de gestion de la sécurité d...
 
projet fin d'étude IWAN
projet fin d'étude IWANprojet fin d'étude IWAN
projet fin d'étude IWAN
 
Investigation de cybersécurité avec Splunk
Investigation de cybersécurité avec SplunkInvestigation de cybersécurité avec Splunk
Investigation de cybersécurité avec Splunk
 
Cloud computing-ppt
Cloud computing-pptCloud computing-ppt
Cloud computing-ppt
 

Similar to Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CON 2018

Open Source Edge Computing Platforms - Overview
Open Source Edge Computing Platforms - OverviewOpen Source Edge Computing Platforms - Overview
Open Source Edge Computing Platforms - Overview
Krishna-Kumar
 
Brain in the Cloud: Machine Learning on OpenStack & Kubernetes Done Right - E...
Brain in the Cloud: Machine Learning on OpenStack & Kubernetes Done Right - E...Brain in the Cloud: Machine Learning on OpenStack & Kubernetes Done Right - E...
Brain in the Cloud: Machine Learning on OpenStack & Kubernetes Done Right - E...
Cloud Native Day Tel Aviv
 
Mastering the move
Mastering the moveMastering the move
Mastering the move
Trivadis
 
ECI - The Elastic Network - winds of change
ECI - The Elastic Network - winds of changeECI - The Elastic Network - winds of change
ECI - The Elastic Network - winds of change
ECI – THE ELASTIC NETWORK™
 
Advanced Networking: The Critical Path for HPC, Cloud, Machine Learning and more
Advanced Networking: The Critical Path for HPC, Cloud, Machine Learning and moreAdvanced Networking: The Critical Path for HPC, Cloud, Machine Learning and more
Advanced Networking: The Critical Path for HPC, Cloud, Machine Learning and more
inside-BigData.com
 
Gervais Peter Resume Oct :2015
Gervais Peter Resume Oct :2015Gervais Peter Resume Oct :2015
Gervais Peter Resume Oct :2015Peter Gervais
 
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
NETSCOUT
 
PLNOG14: The benefits of "OPEN" in networking for operators - Joerg Ammon, Br...
PLNOG14: The benefits of "OPEN" in networking for operators - Joerg Ammon, Br...PLNOG14: The benefits of "OPEN" in networking for operators - Joerg Ammon, Br...
PLNOG14: The benefits of "OPEN" in networking for operators - Joerg Ammon, Br...
PROIDEA
 
Edge Computing risks and Opportunities for Telco and hyperscalers
Edge Computing risks and Opportunities for Telco and hyperscalersEdge Computing risks and Opportunities for Telco and hyperscalers
Edge Computing risks and Opportunities for Telco and hyperscalers
Patrick Lopez
 
The Data Center Network Evolution
The Data Center Network EvolutionThe Data Center Network Evolution
The Data Center Network Evolution
Cisco Canada
 
PLNOG 6: Henk Bruijns - Enabling Cloud Providers with Converged Infrastructure
PLNOG 6: Henk Bruijns - Enabling Cloud Providers with Converged Infrastructure PLNOG 6: Henk Bruijns - Enabling Cloud Providers with Converged Infrastructure
PLNOG 6: Henk Bruijns - Enabling Cloud Providers with Converged Infrastructure
PROIDEA
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
Amazon Web Services
 
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
Cisco Canada
 
Istio Service Mesh
Istio Service MeshIstio Service Mesh
Istio Service Mesh
Lew Tucker
 
Open vSwitch Implementation Options
Open vSwitch Implementation Options Open vSwitch Implementation Options
Open vSwitch Implementation Options
Netronome
 
Ip tunneling and vpns
Ip tunneling and vpnsIp tunneling and vpns
Ip tunneling and vpns
DAVID RAUDALES
 
HPC DAY 2017 | The network part in accelerating Machine-Learning and Big-Data
HPC DAY 2017 | The network part in accelerating Machine-Learning and Big-DataHPC DAY 2017 | The network part in accelerating Machine-Learning and Big-Data
HPC DAY 2017 | The network part in accelerating Machine-Learning and Big-Data
HPC DAY
 
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and CiscoWho Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
ThousandEyes
 
PLNOG 17 - Andrzej Jeruzal - Dell Networking OS10: sieciowy system operacyjny...
PLNOG 17 - Andrzej Jeruzal - Dell Networking OS10: sieciowy system operacyjny...PLNOG 17 - Andrzej Jeruzal - Dell Networking OS10: sieciowy system operacyjny...
PLNOG 17 - Andrzej Jeruzal - Dell Networking OS10: sieciowy system operacyjny...
PROIDEA
 

Similar to Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CON 2018 (20)

Open Source Edge Computing Platforms - Overview
Open Source Edge Computing Platforms - OverviewOpen Source Edge Computing Platforms - Overview
Open Source Edge Computing Platforms - Overview
 
Brain in the Cloud: Machine Learning on OpenStack & Kubernetes Done Right - E...
Brain in the Cloud: Machine Learning on OpenStack & Kubernetes Done Right - E...Brain in the Cloud: Machine Learning on OpenStack & Kubernetes Done Right - E...
Brain in the Cloud: Machine Learning on OpenStack & Kubernetes Done Right - E...
 
Mastering the move
Mastering the moveMastering the move
Mastering the move
 
ECI - The Elastic Network - winds of change
ECI - The Elastic Network - winds of changeECI - The Elastic Network - winds of change
ECI - The Elastic Network - winds of change
 
CloudX on OpenStack
CloudX on OpenStackCloudX on OpenStack
CloudX on OpenStack
 
Advanced Networking: The Critical Path for HPC, Cloud, Machine Learning and more
Advanced Networking: The Critical Path for HPC, Cloud, Machine Learning and moreAdvanced Networking: The Critical Path for HPC, Cloud, Machine Learning and more
Advanced Networking: The Critical Path for HPC, Cloud, Machine Learning and more
 
Gervais Peter Resume Oct :2015
Gervais Peter Resume Oct :2015Gervais Peter Resume Oct :2015
Gervais Peter Resume Oct :2015
 
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
 
PLNOG14: The benefits of "OPEN" in networking for operators - Joerg Ammon, Br...
PLNOG14: The benefits of "OPEN" in networking for operators - Joerg Ammon, Br...PLNOG14: The benefits of "OPEN" in networking for operators - Joerg Ammon, Br...
PLNOG14: The benefits of "OPEN" in networking for operators - Joerg Ammon, Br...
 
Edge Computing risks and Opportunities for Telco and hyperscalers
Edge Computing risks and Opportunities for Telco and hyperscalersEdge Computing risks and Opportunities for Telco and hyperscalers
Edge Computing risks and Opportunities for Telco and hyperscalers
 
The Data Center Network Evolution
The Data Center Network EvolutionThe Data Center Network Evolution
The Data Center Network Evolution
 
PLNOG 6: Henk Bruijns - Enabling Cloud Providers with Converged Infrastructure
PLNOG 6: Henk Bruijns - Enabling Cloud Providers with Converged Infrastructure PLNOG 6: Henk Bruijns - Enabling Cloud Providers with Converged Infrastructure
PLNOG 6: Henk Bruijns - Enabling Cloud Providers with Converged Infrastructure
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
 
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
 
Istio Service Mesh
Istio Service MeshIstio Service Mesh
Istio Service Mesh
 
Open vSwitch Implementation Options
Open vSwitch Implementation Options Open vSwitch Implementation Options
Open vSwitch Implementation Options
 
Ip tunneling and vpns
Ip tunneling and vpnsIp tunneling and vpns
Ip tunneling and vpns
 
HPC DAY 2017 | The network part in accelerating Machine-Learning and Big-Data
HPC DAY 2017 | The network part in accelerating Machine-Learning and Big-DataHPC DAY 2017 | The network part in accelerating Machine-Learning and Big-Data
HPC DAY 2017 | The network part in accelerating Machine-Learning and Big-Data
 
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and CiscoWho Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
 
PLNOG 17 - Andrzej Jeruzal - Dell Networking OS10: sieciowy system operacyjny...
PLNOG 17 - Andrzej Jeruzal - Dell Networking OS10: sieciowy system operacyjny...PLNOG 17 - Andrzej Jeruzal - Dell Networking OS10: sieciowy system operacyjny...
PLNOG 17 - Andrzej Jeruzal - Dell Networking OS10: sieciowy system operacyjny...
 

More from 44CON

They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
44CON
 
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
44CON
 
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
44CON
 
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
44CON
 
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
44CON
 
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
44CON
 
Pwning the 44CON Nerf Tank
Pwning the 44CON Nerf TankPwning the 44CON Nerf Tank
Pwning the 44CON Nerf Tank
44CON
 
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
44CON
 
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON
 
44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Is there an EFI monster inside your apple?44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Is there an EFI monster inside your apple?
44CON
 
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON
 
44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - How to drive a malware analyst crazy44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - How to drive a malware analyst crazy
44CON
 
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON
 
44CON London 2015 - Going AUTH the Rails on a Crazy Train
44CON London 2015 - Going AUTH the Rails on a Crazy Train44CON London 2015 - Going AUTH the Rails on a Crazy Train
44CON London 2015 - Going AUTH the Rails on a Crazy Train
44CON
 
44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security
44CON
 
44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - DDoS mitigation EPIC FAIL collection44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON
 
44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Hunting Asynchronous Vulnerabilities44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON
 
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON
 
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON
 
44CON London 2015 - reverse reverse engineering
44CON London 2015 - reverse reverse engineering44CON London 2015 - reverse reverse engineering
44CON London 2015 - reverse reverse engineering
44CON
 

More from 44CON (20)

They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
They're All Scorpions - Successful SecOps in a Hostile Workplace - Pete Herzo...
 
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
 
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and...
 
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
Reverse Engineering and Bug Hunting on KMDF Drivers - Enrique Nissim - 44CON ...
 
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
 
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
Weak analogies make poor realities – are we sitting on a Security Debt Crisis...
 
Pwning the 44CON Nerf Tank
Pwning the 44CON Nerf TankPwning the 44CON Nerf Tank
Pwning the 44CON Nerf Tank
 
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
Security module for php7 – Killing bugclasses and virtual-patching the rest! ...
 
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
44CON London 2015 - Stegosploit - Drive-by Browser Exploits using only Images
 
44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Is there an EFI monster inside your apple?44CON London 2015 - Is there an EFI monster inside your apple?
44CON London 2015 - Is there an EFI monster inside your apple?
 
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
 
44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - How to drive a malware analyst crazy44CON London 2015 - How to drive a malware analyst crazy
44CON London 2015 - How to drive a malware analyst crazy
 
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
 
44CON London 2015 - Going AUTH the Rails on a Crazy Train
44CON London 2015 - Going AUTH the Rails on a Crazy Train44CON London 2015 - Going AUTH the Rails on a Crazy Train
44CON London 2015 - Going AUTH the Rails on a Crazy Train
 
44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security44CON London 2015 - Software Defined Networking (SDN) Security
44CON London 2015 - Software Defined Networking (SDN) Security
 
44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - DDoS mitigation EPIC FAIL collection44CON London 2015 - DDoS mitigation EPIC FAIL collection
44CON London 2015 - DDoS mitigation EPIC FAIL collection
 
44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Hunting Asynchronous Vulnerabilities44CON London 2015 - Hunting Asynchronous Vulnerabilities
44CON London 2015 - Hunting Asynchronous Vulnerabilities
 
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
44CON London 2015 - Reverse engineering and exploiting font rasterizers: the ...
 
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
 
44CON London 2015 - reverse reverse engineering
44CON London 2015 - reverse reverse engineering44CON London 2015 - reverse reverse engineering
44CON London 2015 - reverse reverse engineering
 

Recently uploaded

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 

Using SmartNICs to Provide Better Data Center Security - Jack Matheson - 44CON 2018

  • 1. 1© 2018 Mellanox Technologies SmartNICs ..are awesome!
  • 2. 2© 2018 Mellanox Technologies Agenda  Data center trends  Enter the SmartNIC  The SmartNIC data center  Beyond the network
  • 3. 3© 2018 Mellanox Technologies The Compute Problem  Everything is getting closer to the data  “Smart edge, dumb pipe”  Infrastructure and appliances both are virtualized onto servers  Higher network speeds + more network infrastructure on host == severely decreased software efficiency You don’t want to hear more about this, right?
  • 4. 4© 2018 Mellanox Technologies The Attack Surface Problem  Services consolidate on the same host  User applications, infrastructure, data plane services all sharing the same resources  Lots of software running with escalated privileges  Traditional trust domains are now squashed together Host-based security is…oh boy…
  • 5. 5© 2018 Mellanox Technologies 1988 Ping Pong Virus Stateful Firewall 1990 1994 Application Layer Firewalls Microsoft Windows 98 1999 Software Security Goes Mainstream 2000 The Year of the Worm 2012 Sandboxing 2013 Next Generation Endpoint Packet Filters Microsoft Windows 95 1995 1998 Network Intrusion Detection Stuxnet 2010 2017 WannaCry Petya 2018 Meltdown Spectre 2014 SSLv3 Protocol Vulnerability and POODLE attack TLS 1.3 DNS Cache Poisoning GNU Bash Remote Code Execution Vulnerability OpenSSL Heartbleed Conficker Worm 2015 Venom 2008 The Morris Worm 2005 Advanced Persistent Threats (APT) 2006 SSL is Invented 30 Years of Total Host Failures "I think a lot of people think the nation states, they're running on this engine of zero-days. You go out with your master skeleton key and unlock the door and you're in. It's not that. Take these big, corporate networks, these large networks, any large network -- I will tell you that persistence and focus will get you in, will achieve that exploitation, without the zero-days.” - Rob Joyce, TAO @ NSA
  • 6. 6© 2018 Mellanox Technologies (With strict power consumption restrictions) A SmartNIC is a computer
  • 7. 7© 2018 Mellanox Technologies The “must-haves” SmartNIC at its core  High speed networking performance  Robust and useful accelerators and offloads  Supports networking virtualization and scaling  Security and trust bonuses  Software flexibility  Management infrastructure
  • 8. 8© 2018 Mellanox Technologies SmartNIC at a glance
  • 9. 9© 2018 Mellanox Technologies SmartNIC Isolation
  • 10. 10© 2018 Mellanox Technologies Embedded compute physical function – override host PF + VF config VFs share hardware resources SRIOV == 0 hypervisor involvement Host bypass Data protection between guests Near bare metal performance “host” physical function allocates VFs as it normally would SmartNIC Isolation
  • 11. 11© 2018 Mellanox Technologies Hardware offload Data-plane Programming
  • 12. 12© 2018 Mellanox Technologies PEP PDP Additional PEPs Policy Enforcement Point Data-plane Programming
  • 13. 13© 2018 Mellanox Technologies Data-plane Policy 1 2 3Miss in the offloaded switch Packet -> Software Program flow into switch
  • 14. 14© 2018 Mellanox Technologies Policy Enforcement
  • 15. 15© 2018 Mellanox Technologies Enforcing policy checklist… Policy Management  Authenticate the policy  Program the flow tables  Exchange information between SmartNICs  Identify where applications are running  Program packet engine software  Create tunnels  Track sessions/flows
  • 16. 16© 2018 Mellanox Technologies Programming for Solutions  Major options  Embedded compute as control plane (isolated modification of hardware NFV)  OVS based solutions  DPDK etc  Appliance-in-the-wire (nginx, for example)  Linux kernel networking config  Or….  Anything at all??  Linux applications that free up host CPU cycles or require greater isolation
  • 17. 17© 2018 Mellanox Technologies Simple SmartNIC Firewall ovs-vsctlshow 12ed5b74-1521-4ba9-8b0d-45f88fe25cc7 Bridge"br0" Port"rep0-0" Interface"rep0-0" Port"enp3s0f0" Interface"enp3s0f0" Port"enp3s0f1" Interface"enp3s0f1" Port"rep1-0" Interface"rep1-0" Port"br0" Interface"br0" type:internal ovs_version:"2.9.1"
  • 18. 18© 2018 Mellanox Technologies Simple SmartNIC Firewall ovs-ofctldel-flowsbr0 wire=`ovs-vsctlget Interfaceenp3s0f0ofport` host=`ovs-vsctlget Interfacerep0-0ofport` ovs-ofctladd-flowbr0table=0,priority=1,action=drop ovs-ofctladd-flowbr0table=0,priority=10,arp,action=normal ovs-ofctladd-flowbr0table=0,priority=100,ip,ct_state=-trk,action="ct(table=1)" ovs-ofctladd-flowbr0 priority=50,table=1,in_port=$host,udp,tcp_dst=53,ct_state=+trk+new, action="ct(commit),normal" ovs-ofctladd-flowbr0 priority=50,table=1,in_port=$wire,ip,ct_state=+trk+est,action=normal ovs-ofctladd-flowbr0 priority=50,table=1,in_port=$host,ip,ct_state=+trk+est,action=normal ovs-ofctladd-flowbr0priority=40,table=1,action=drop
  • 19. 19© 2018 Mellanox Technologies Simple SmartNIC Firewall  Open SSH to host  Allow outbound traffic ovs-ofctladd-flowbr0 priority=50,table=1,in_port=$wire,tcp,tcp_dst=22,ct_state=+trk+new, action="ct(commit),normal" ovs-ofctladd-flowbr0 priority=50,table=1,in_port=$host,tcp,ct_state=+trk+new, action="ct(commit),normal" ovs-ofctladd-flowbr0 priority=50,table=1,in_port=$host,udp,ct_state=+trk+new, action="ct(commit),normal" ovs-ofctladd-flowbr0 priority=50,table=1,in_port=$host,icmp,ct_state=+trk+new, action="ct(commit),normal"
  • 20. 20© 2018 Mellanox Technologies Isolated and Embedded Functions  Use OVS to switch between host VFs, physical ports, and embedded applications  Full use of flow table criteria and software for matching  Application can be anything!
  • 21. 21© 2018 Mellanox Technologies Isolated and Embedded Functions iplink addveth1 typeveth peer name veth2 ovs-vsctladd-portbr0veth1 ovs-vsctlshow 12ed5b74-1521-4ba9-8b0d-45f88fe25cc7 Bridge"br0" Port"rep0-0" Interface"rep0-0" Port"veth1" Interface"veth1" Port"enp3s0f0" Interface"enp3s0f0" Port"enp3s0f1" Interface"enp3s0f1" Port"rep1-0" Interface"rep1-0" Port"br0" Interface"br0" type:internal ovs_version:"2.9.1"
  • 22. 22© 2018 Mellanox Technologies A Second Look…  Use OVS + kernel networking stack to build transparent IPsec tunnels  (Transparent to the host, that is)  Steps:  Create OVS bridge  Create veth pair for the tunnel & add to OVS  Enable IP forwarding  Add gw IP to veth tail  Add OF rule to forward packets into the tunnel  Add linux route to forward from kernel to veth  IKE!  Manage the tunnel… How can we improve this…
  • 23. 23© 2018 Mellanox Technologies What if we had host information…  SmartNIC is a PCIe device…it can access host memory  …..all of it!  Silence alarm bells for a moment  SmartNIC has embedded compute to parse that memory…  SmartNIC has accelerators to RDMA between two systems….  Embedded compute and host are two systems!  SmartNIC has processing accelerators on the embedded compute… Let’s put it all together!
  • 24. 24© 2018 Mellanox Technologies Host introspection via SmartNIC Hardware-based accelerators used to speed lookup and data analysis (Regular Expression, hardware address translation, SHA) Leverages hardware DMA engines for secure memory acquisition. No dependence on runtime software at host Rapid interval based reads to selective memory regions to determine activity in real-time Reconstruct data structures to analyze process lists, vtable modifications, and other information Analysis running in an isolated trust domain Network traffic inspection
  • 25. 25© 2018 Mellanox Technologies Demo!
  • 26. 26© 2018 Mellanox Technologies Thank You