Welcome!

It's not the Network! Ok, maybe it's the network...

Jason Rahm

Subscribe to Jason Rahm: eMailAlertsEmail Alerts
Get Jason Rahm via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Jason Rahm

Back in October, my son’s robotics team said “Hey! You work for a software company, can you build us an application that will help us with scouting and competitions?” Foolishly, ego stepped in before a careful outsourced review of my existing skills could take place, so I said “Sure! Not a web developer, but how hard could it be?” Seriously… how hard could this be? I see web application traffic all the time. On the wire. And I can even manipulate that traffic at the protocol level and do amazing things with it programmatically. But…changing application traffic in flight is not development of that application. Nor is it an understanding of all the considerations one must evaluate and handle to get from idea to solution. So yeah, it is hard. Dang hard. Actually, getting to a dynamic web experience "hello world” is easy, but getting to a working application? Not so ea... (more)

Live from Microsoft Tech Ed: Final Day

So I guess I’m on the even days plan here at Tech Ed, today being the fourth and final day of Tech Ed…  Yesterday I got the chance to walk around the exhibitor hall and take a look at the exciting offerings on the floor.  Microsoft had three very large sections with breakout booths for all their product offerings.  I stopped and chatted with a few experts in the Server 2008 R2 virtualization offerings, and watched a couple System Center demos as well.  Speaking of System Center, did you know F5 has a management pack for System Center?  I talked to several booth visitors yesterday... (more)

Let iRules Work Around that ASP.NET Padding Oracle Attack

Microsoft released advisory 2416728 on Friday after researchers Thai Duong and Juliano Rizzo demonstrated the attack on ASP.NET with their Padding Oracle Exploit Tool.  The attack itself preys on a bug in ASP.NET’s AES implementation, which you can read about over here at threatpost.  So what’s the reward for a successful attack?  It’s not going to allow the attacker to execute code or elevate rights, but it does all the attacker to read potentially sensitive data that could then be further used to compromise the system. The mitigation for this attack is to obfuscate the server ... (more)

Mitigate Java Vulnerability with iRules

I got a request yesterday morning to asking if there was a way to drop HTTP requests if a certain number was referenced in the Accept-Language header.  The user referenced this post on Exploring Binary.  The number, 2.2250738585072012e-308, causes the Java runtime and compiler to go into an infinite loop when converting it to double-precision binary floating-point.  Not good.  Twitter is ablaze on the issue, and there is a good discussion thread on Hacker News as well.  So how do you stop it?  At first, this appeared to be a no-brainer, just copy that string and drop if found in that... (more)

The Wait Is Over: Edit Your iRules on Linux!

DevCentral has many rock star contributors.  Most are not affiliated officially with F5 Networks, or DevCentral for that matter, but there are several F5ers who believe in the community, and really believe in the F5 story.  One of those F5ers is Matt Cauthorn, or as you know him in the community, L4L7.  You may recognize Matt as the author of pyControl.  Well, not only did he provide this entrance to a better iControl experience, he has also delivered in a major way with his Vim plugin for editing iRules (utilizing pyControl of course to make those calls to BIG-IP).  I had toyed ... (more)