Read the Latest News From IWL.

Taking Exception to the StringBleed Vulnerability

Posted by Lisa Patel /

Security researchers claim to have discovered an SNMP flaw that affects several models of Internet-connected devices. Presumably hackers could send random values in specific requests to the SNMP agent in various devices and the authentication mechanism would be bypassed.


Is it Okay to Make IPv4 Act Like IPv6?

Posted by Lisa Patel /

Despite what one might read in certain techno-marketing publications, IPv4 is very much alive; it has not by any stretch yet been replaced by IPv6.

So it remains important that vendors of networking products do IPv4 and do it correctly.

But some vendors appear to be getting lazy.

In particular one of the largest vendors seems to be taking a shortcut that could leave users unable to communicate even though those users have otherwise perfectly usable packet service from their network providers.


Have you thought about how you will test the performance of IoT apps and drones? Our new video demonstrates performance testing of an IOT application controlling the ESP8266 Microcomputer mounted on a drone! As you might expect, as the drone flies further away from the wireless base station, perform...


Why did Waze and Google Maps fail?

Posted by Lisa Patel /

Waze, the “…world’s largest community-based traffic and navigation app” failed its users in the Santa Cruz, California area during the month of February 2017. These users who depend on Waze to find out traffic conditions and alternate routes were not able to do so. The same was true for Google Maps. For example, when traffic stalled for up to three hours, Waze and Google Maps happily reported that conditions were just fine.


A New York City based start-up company, Confide, offers a text messaging system “with encrypted messages that self-destruct.” You can download the app at

Confide lets its users “discuss sensitive topics, brainstorm ideas or give unfiltered opinions without fear of the Internet’s permanent, digital record and with no copies left behind.” “Messages disappear forever after they are read once, making them as private and secure as the spoken word.”

What a description! Everyone’s dream come true, right? Certainly a perfect app for individuals wanting to communicate about classified information, military plans, or other top secret information.


Checking for New SNMP Vulnerabilities

Posted by Lisa Patel /

Cisco Systems recently announced a patch for a vulnerability in Simple Network Management Protocol (SNMP) functions of some Cisco routers. “This vulnerability could allow an authenticated, remote attacker to cause high CPU usage on an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to an incorrect initialized variable. An attacker could exploit this vulnerability by performing SNMP polling on MIBs and using only Interface Index (ifIndex) values. A successful exploit could allow the attacker to increase CPU usage to 99% on an affected device and cause a DoS condition.” 1

Whether or not you have Cisco routers, it is important to execute all the SNMP vulnerability tests in SilverCreek to verify that your SNMP agent is not vulnerable to attacks.


Recommended Books From Our Engineers

Posted by Lisa Patel /



How to Manage Your Network Using SNMP by Marshall T. Rose and Keith McCloghrie

Performance and Fault Management by Paul L. Della Maggiora, Christopher E. Elliott, et. al.

Practical Guide to SNMPv3 and Network Management, A by David Zeltserman


The Building Automation and Control network (BACnet) protocol defines a network communication standard for building control systems to communicate. These building control systems include devices and applications for heating, ventilating, and air-conditioning (HVAC) control, lighting control, access...


More on SDN Complexity and Reality

Posted by Karl Auerbach /

Definition: SDN: Software Defined Networks

“SDN Complexity and Reality” by Russ White and Shawn Zandi, was published on page 31 of The Internet Protocol Journal, November 2016 (Volume 19, Number 3). You can download ipj19-3.pdf at

In the article, White and Zandi, examine the original three crucial elements to the SDN story:

First, SDNs were supposed to remove the intelligence from the distributed control planes and consolidate that intelligence in a centralized controller.

Second, SDNs were supposed to provide a more granular level of control – down to the flow level.

Third, SDNs would enable the network to be programmable…


Testing the SNMP Agent

IWL provides the SilverCreek SNMP Test Suite, Libraries and APIs for engineers to find and fix bugs in their SNMP agent implementations.

Testing the SNMP Management Application

Often developers and quality assurance engineers will need to test the SNMP management appli...


The Internet Is an Imperfect and Hostile Place

The world is an imperfect place. The internet is no exception. The internet has its good days and it has its bad days. Or to be more precise, the internet has its good seconds and its bad seconds.

Blemishes in internet performance arise from many sources.