Justin Azoff

Hi! Random things are here :-)

  • (Ab)using the NixOS Test framework for clean room PCAP generation

    Generating clean room PCAP files can be a difficult orchestration problem. The NixOS Test framework makes this easy.

    Read more…
  • Error messages are hard

    Error messages are hard. When a program logs an error message sometimes both of these things can be true:

    • The error message can be 100% accurate.
    • The error message can be completely unhelpful, if not outright misleading.

    Read more…
  • Ensuring zero allocations in Go tests

    A common goal in Go is wanting to ensure that calling a function results in a small number of allocations. Often you want to go even further and ensure that calling a function results in zero allocations. There are guides on how to write benchmarks that can tell you how many allocations a function is making. However, once you have such a benchmark, it’s up to you to notice if the allocation amount ever changes.

    Read more…
  • Incremental zpool scrub

    Similar to how continuous incremental scanning is a good thing for security tools, zfs supports a way to do incremental pool scrubbing.

    Read more…
  • Acquiring a large SMTP pcap for testing

    Recently I needed a large PCAP of SMTP traffic for testing zeek scripts. Obtaining a capture from a production network would be a straightforward process. However, I needed a file that could be included in test suites, or copied to other hosts without having to worry about leaking sensitive data. I could have taken an archived MBOX file and replayed it into a server. This would have worked, but wouldn’t have included any variability due to client differences.

    Read more…
  • Continuous incremental scanning

    Many security tools could be better. The problem isn’t that they are buggy or don’t work properly, but that they are designed to work in a way that is not as useful to defenders as they could be. The primary example I’m going to use is ssh server weak credential scanning. There are many existing tools that do this, such as ncrack or hydra, but I wrote my own called ssh-auditor .

    Read more…
  • bpf_map_get_next_key pitfalls

    Background eBPF maps are a core component of most XDP programs. I am working on a library called libflowbypass that uses some code and ideas from Suricata to implement flow cutoff inside the kernel using eBPF and XDP in a reusable way for any network monitoring tool. The core of this is 2 maps (one for v4 and one for v6) whose keys are the 5 tuple (proto, src, sport, dst, dstport) of each flow to be dropped in the kernel.

    Read more…
  • Home Network - Part 1 - Bulk Cable

    Wiring an existing home for Ethernet is a fun project. There is a lot of information out there on how to accomplish this, unfortunately much of it is vague or outdated. It’s not uncommon to find guides that talk about using Cat5 cable or show pictures of ancient 10mbit networking devices. Other guides are more modern, but they gloss over specific details and fail to mention various pitfalls. This will be part one in a seven part series:

    Read more…
  • Implementing pluggable backends in go

    When writing a component like a storage backend you often want a way to switch between different implementations like memory, sqlite, or redis. Another common example is authentication backends for LDAP or Kerberos. With interfaces in go you can have multiple implementations of a common API, but it takes a little more work to make them pluggable.1 The goal is that we want to be able to have a configuration file with a section like

    Read more…
  • Syslog is terrible

    I hate syslog.

    The protocol is terrible.
    The message format is terrible.
    The API is terrible.

    Read more…
Older Posts