Alternatives of tcpdump
Posted by
Manish Panchmatia
on Friday, September 20, 2019
Labels:
DevOps,
k8s,
security,
software,
Telecom Wireless
/
Comments: (0)
Full article...>>
There
are many tools similar to tcpdump, as per https://en.wikipedia.org/wiki/Comparison_of_packet_analyzers
Here, I choose only Free and Open Source tools, whose docker
image is available and tool is lightweight.
- Ngrep
is best, for capture only those packets, whose payload has certain
pattern.
- Packetbeat is
lightweight open source packet analyzer. It sends data to Elastic Search
OR Logstash. It is not inline to datapath. So no impact on latency. It
consumes high CPU. Packetbeat can run as sidecar Docker container: https://www.elastic.co/guide/en/beats/packetbeat/current/running-on-docker.html
It supports various protocols https://www.elastic.co/guide/en/beats/packetbeat/current/exported-fields.html
It can capture all HTTP headers from request and
response https://www.elastic.co/guide/en/beats/packetbeat/current/exported-fields-http.html
Some more reference: https://www.elastic.co/products/beats/packetbeat
- Tranalyzer
is Lightweight open-source flow generator and packet analyzer for
practitioners and researchers
- Justniffer
is like tcpdump. Tcpdump is for TCP, while Justniffer for HTTP. Useful to
debug webserver.
https://github.com/reneluria/justniffer
5. Moloch is a large scale, open source, indexed packet capture and search system.
5. Moloch is a large scale, open source, indexed packet capture and search system.
Digital Certificate and SSL
Posted by
Manish Panchmatia
on Tuesday, September 17, 2019
Labels:
security,
software
/
Comments: (0)
Full article...>>
1. cryptographic algorithms,
1.1 Conventional cryptography (symmetric key)
1.2 Public Key cryptography
2. message digest functions, = one-way hash
3. digital signatures
Encrypt 1. digest 2. seq number 3. etc. using private key
Certificate
DER is based on BER. Digital certificate is converted to binary format using DER. Then Base64 convert + add prefix BEGIN + add suffix END = PEM format.
Cipher suite
1. Key Exchange Method : RSA, DH. with / without signature
2. Cipher for data transfer
2.1 No encryption
2.2 Steam cipher
2.3 Block cipher
3. Message Digest for creating MAC.
3.1 no digest
3.2 MD5
3.3 SHA
SSL Record Protocol between TCP and HTTP layers
1. Input from HTTP goes to RPU (Record Protocol Unit)
2. Compress input
3. add MAC
4. encrypt
5. output as TCP payload
1.1 Conventional cryptography (symmetric key)
1.2 Public Key cryptography
2. message digest functions, = one-way hash
3. digital signatures
Encrypt 1. digest 2. seq number 3. etc. using private key
Certificate
DER is based on BER. Digital certificate is converted to binary format using DER. Then Base64 convert + add prefix BEGIN + add suffix END = PEM format.
Cipher suite
1. Key Exchange Method : RSA, DH. with / without signature
2. Cipher for data transfer
2.1 No encryption
2.2 Steam cipher
2.3 Block cipher
3. Message Digest for creating MAC.
3.1 no digest
3.2 MD5
3.3 SHA
SSL Record Protocol between TCP and HTTP layers
1. Input from HTTP goes to RPU (Record Protocol Unit)
2. Compress input
3. add MAC
4. encrypt
5. output as TCP payload
TCPdump inside docker
For TCPDump 1
=============
k get pod productpage-v1-8554d58bff-rz25r -o json | grep containerID
docker exec ff8e6d1a169bc225ad1e357b54445e9055423189b900176bcc6cdd393f9cd83d /bin/bash -c 'cat /sys/class/net/eth0/iflink'
ip link | grep ^47
tcpdump -i
For TCPDump 2
=============
add
- name: tcpdump
image: corfr/tcpdump
command:
- /bin/sleep
- infinity
k get pod productpage-v1-8554d58bff-rz25r -o json | grep containerID
docker exec 867662a10a0324059b71d3be9765069b900eca4f2f5f29fdb2e7b7792fcfc726 tcpdump -s 0 -n -w /tmp/container.pcap
docker cp 867662a10a0324059b71d3be9765069b900eca4f2f5f29fdb2e7b7792fcfc726:/tmp/container.pcap .
=============
k get pod productpage-v1-8554d58bff-rz25r -o json | grep containerID
docker exec ff8e6d1a169bc225ad1e357b54445e9055423189b900176bcc6cdd393f9cd83d /bin/bash -c 'cat /sys/class/net/eth0/iflink'
ip link | grep ^47
tcpdump -i
For TCPDump 2
=============
add
- name: tcpdump
image: corfr/tcpdump
command:
- /bin/sleep
- infinity
k get pod productpage-v1-8554d58bff-rz25r -o json | grep containerID
docker exec 867662a10a0324059b71d3be9765069b900eca4f2f5f29fdb2e7b7792fcfc726 tcpdump -s 0 -n -w /tmp/container.pcap
docker cp 867662a10a0324059b71d3be9765069b900eca4f2f5f29fdb2e7b7792fcfc726:/tmp/container.pcap .
For TCPDump 3
=============
=============
1. run 'docker ps' at worker node.
get the container Id, for target container
2. get pid of that container
docker inspect --format '{{.State.pid}}' "Container ID from previous command"
3. nsenter -t "PID value from previous command" -n tcpdump
Istio Practical - 1
Posted by
Manish Panchmatia
on Sunday, September 1, 2019
Labels:
DevOps,
istio,
k8s
/
Comments: (0)
Full article...>>
Installation
Istio version istio-1.3.0-rc.1 at path Downloads/istio-1.3.0-rc.1
Helm version helm-v2.14.3
sudo apt-get install socat
kubectl create serviceaccount tiller --namespace kube-system
kubectl create clusterrolebinding tiller-cluster-rule --clusterrole=cluster-admin --serviceaccount=kube-system:tiller
helm init --wait --service-account tiller
kubectl create namespace istio-system
helm repo add istio.io https://storage.googleapis.com/istio-release/releases/1.2.5/charts/
helm repo update
helm template Downloads/istio-1.3.0-rc.1/install/kubernetes/helm/istio-init --name istio-init --namespace istio-system | kubectl apply -f -
helm install --wait --name istio --namespace istio-system Downloads/istio-1.3.0-rc.1/install/kubernetes/helm/istio \
--set gateways.istio-ingressgateway.type=NodePort \
--set gateways.istio-egressgateway.type=NodePort \
--set grafana.enabled=true \
--set kiali.enabled=true \
--set kiali.dashboard.grafanaURL=http://localhost:3000 \
--set kiali.dashboard.jaegerURL=http://localhost:16686 \
--set servicegraph.enabled=true \
--set telemetry-gateway.grafanaEnabled=true \
--set telemetry-gateway.prometheusEnabled=true \
--set tracing.enabled=true \
--set sidecarInjectorWebhook.enabled=true \
--set global.mtls.enabled=false
Istio version istio-1.3.0-rc.1 at path Downloads/istio-1.3.0-rc.1
Helm version helm-v2.14.3
sudo apt-get install socat
kubectl create serviceaccount tiller --namespace kube-system
kubectl create clusterrolebinding tiller-cluster-rule --clusterrole=cluster-admin --serviceaccount=kube-system:tiller
helm init --wait --service-account tiller
kubectl create namespace istio-system
helm repo add istio.io https://storage.googleapis.com/istio-release/releases/1.2.5/charts/
helm repo update
helm template Downloads/istio-1.3.0-rc.1/install/kubernetes/helm/istio-init --name istio-init --namespace istio-system | kubectl apply -f -
helm install --wait --name istio --namespace istio-system Downloads/istio-1.3.0-rc.1/install/kubernetes/helm/istio \
--set gateways.istio-ingressgateway.type=NodePort \
--set gateways.istio-egressgateway.type=NodePort \
--set grafana.enabled=true \
--set kiali.enabled=true \
--set kiali.dashboard.grafanaURL=http://localhost:3000 \
--set kiali.dashboard.jaegerURL=http://localhost:16686 \
--set servicegraph.enabled=true \
--set telemetry-gateway.grafanaEnabled=true \
--set telemetry-gateway.prometheusEnabled=true \
--set tracing.enabled=true \
--set sidecarInjectorWebhook.enabled=true \
--set global.mtls.enabled=false