Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You'll be affected if you use a veth (becoming more popular with docker/container schedulers) and have a corrupt packet floating through your network.


... and are not using authenticated encryption as you should.


In my experience, there is a bit of hardware (which was the root cause in the articles case) between SSL termination and application servers. So even using encryption, you are still vulnerable.


In many situations, you might still have unencrypted traffic, even if your app is using authenticated encryption. Like, for example, if you're doing DNS lookups, or syslog to a remote host, etc.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: