<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: François Dautrême</title>
    <description>The latest articles on Forem by François Dautrême (@fdtm).</description>
    <link>https://forem.com/fdtm</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1490283%2Fdc711545-1281-4fe2-b009-3b3111ec76ae.jpeg</url>
      <title>Forem: François Dautrême</title>
      <link>https://forem.com/fdtm</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/fdtm"/>
    <language>en</language>
    <item>
      <title>Is your ISP blocking you from sharing your internet connection?</title>
      <dc:creator>François Dautrême</dc:creator>
      <pubDate>Sun, 04 Aug 2024 07:14:50 +0000</pubDate>
      <link>https://forem.com/fdtm/is-your-isp-blocking-you-from-sharing-your-internet-connection-2cc4</link>
      <guid>https://forem.com/fdtm/is-your-isp-blocking-you-from-sharing-your-internet-connection-2cc4</guid>
      <description>&lt;p&gt;The other day, I faced a frustrating issue while trying to share my iPhone's internet connection with my MacBook. Although I could connect to the hotspot, there was no internet access on my MacBook, despite having a stable connection on my iPhone. It was puzzling.&lt;/p&gt;

&lt;p&gt;I tried every basic troubleshooting step I could think of: restarting both devices, toggling the hotspot, and forgetting and reconnecting to the network. None of these worked. The iPhone has limited hotspot settings and even fewer troubleshooting options, leaving me stuck.&lt;/p&gt;

&lt;p&gt;Here are some of the troubleshooting options I considered:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Trying with another MacBook (which I didn’t have)&lt;/li&gt;
&lt;li&gt;Trying with another iPhone (which I didn’t have)&lt;/li&gt;
&lt;li&gt;Trying with another carrier&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The last option seemed feasible. I downloaded an eSIM app from the App Store, purchased a data plan from a different carrier, and activated it on my iPhone. Then, I connected my MacBook to the new hotspot. Success! My MacBook had internet access.&lt;/p&gt;

&lt;p&gt;However, switching back to my original carrier's data plan caused the connection issue to reappear. I wondered if my carrier was blocking me from sharing my internet connection, but I couldn't see how they would detect it. I reviewed my contract for any clauses about internet sharing—none existed. The carrier's website also lacked information on this matter. A call to customer service resulted in them denying any such restrictions.&lt;/p&gt;

&lt;p&gt;Before venting my frustration on social media, I did some research. I discovered that some ISPs block internet sharing by checking the TTL (Time to Live) of the packets. The TTL is a value in an IP packet that determines how many routers the packet can pass through before being dropped, it decrements by one each time the packet passes through a router.&lt;/p&gt;

&lt;p&gt;ISPs can detect whether you're sharing your internet connection by examining the TTL value of packets. Typically, a device like your MacBook will send packets with a TTL value of 64. However, when these packets pass through your iPhone (acting as a hotspot), the TTL is reduced by one, arriving at the ISP with a TTL of 63. Some ISPs drop these packets to prevent internet sharing.&lt;/p&gt;

&lt;p&gt;To bypass this, you can set the TTL value on your MacBook to 65. This way, when the packets are routed through your iPhone and reach the ISP, the TTL will be 64, making them appear as if they originated directly from your iPhone.&lt;/p&gt;

&lt;p&gt;To test this, I decided to change the TTL of the packets on my MacBook to 65. I opened Terminal and ran the following commands:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;sudo &lt;/span&gt;sysctl &lt;span class="nt"&gt;-w&lt;/span&gt; net.inet.ip.ttl&lt;span class="o"&gt;=&lt;/span&gt;65
&lt;span class="nb"&gt;sudo &lt;/span&gt;sysctl net.inet6.ip6.hlim&lt;span class="o"&gt;=&lt;/span&gt;65
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;It worked instantly! My MacBook gained internet access, confirming that my ISP was indeed blocking me from sharing my connection. Despite this proof, another call to customer service resulted in them hanging up on me when I explained the situation.&lt;/p&gt;

&lt;p&gt;Now, everything works perfectly, and I can share my iPhone’s internet connection with my MacBook. Problem solved, and I’m happy.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This is for educational purposes only. Please respect your ISP's terms and conditions. If you encounter a similar issue, contact your ISP for assistance.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>internet</category>
      <category>isp</category>
      <category>hotspot</category>
    </item>
    <item>
      <title>Boost your Cloud Security with Network ACLs in your VPC</title>
      <dc:creator>François Dautrême</dc:creator>
      <pubDate>Wed, 22 May 2024 22:29:39 +0000</pubDate>
      <link>https://forem.com/fdtm/boost-your-cloud-security-with-network-acls-in-your-vpc-6c7</link>
      <guid>https://forem.com/fdtm/boost-your-cloud-security-with-network-acls-in-your-vpc-6c7</guid>
      <description>&lt;p&gt;In the digital age, safeguarding your cloud infrastructure is paramount. While security groups offer basic protection for your network interfaces, Network Access Control Lists (&lt;a href="https://docs.aws.amazon.com/vpc/latest/userguide/vpc-network-acls.html" rel="noopener noreferrer"&gt;NACLs&lt;/a&gt;) provide an added layer of defense against potential threats. This blog post will explore the benefits of incorporating NACLs into your Amazon VPC, empowering you to fortify your cloud security posture.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;"Through 2025, 99% of cloud security failures will be the customer's fault."&lt;br&gt;
Source: &lt;a href="https://www.gartner.com/smarterwithgartner/is-the-cloud-secure" rel="noopener noreferrer"&gt;Gartner, Is the Cloud Secure?&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  Network ACLs: A Powerful Line of Defense
&lt;/h2&gt;

&lt;p&gt;A NACL acts as a virtual firewall, governing inbound and outbound traffic at the subnet level within your VPC. By implementing NACLs, you gain granular control over the flow of traffic, allowing you to define precise rules that dictate which traffic is permitted or denied.&lt;/p&gt;

&lt;p&gt;The Advantages of Using NACLs in Your VPC:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Enhanced Security Posture&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;With NACLs, you can establish comprehensive security policies tailored to your specific requirements. Whether you need to restrict access to critical resources or isolate sensitive workloads, NACLs provide the flexibility to implement robust security measures.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Granular Traffic Control&lt;/strong&gt;  &lt;/p&gt;

&lt;p&gt;NACLs enable you to meticulously manage traffic at the subnet level, ensuring that only authorized traffic reaches your resources. This level of control is particularly valuable when dealing with complex network architectures or handling sensitive data.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Ability to Use 'Deny' Rules&lt;/strong&gt;  &lt;/p&gt;

&lt;p&gt;Security groups operate on an allowlist model, where you define which traffic is permitted, while all other traffic is implicitly denied. In contrast, NACLs offer a more flexible approach by enabling you to create explicit 'deny' rules that block specific traffic flows. This feature is particularly valuable when you need to block traffic from untrusted IP addresses or restrict access to sensitive resources.&lt;/p&gt;

&lt;p&gt;By combining 'allow' and 'deny' rules, you can construct intricate security policies that precisely control the flow of traffic within your VPC, providing an additional layer of protection beyond the capabilities of security groups alone.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Compliance and Regulatory Adherence&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Many industries and regulatory bodies mandate stringent security protocols. By incorporating NACLs into your VPC, you can demonstrate your commitment to meeting these standards, fostering trust among your customers and stakeholders.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Defense against Distributed Denial of Service (DDoS) Attacks&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;NACLs can play a crucial role in mitigating the impact of DDoS attacks by filtering out malicious traffic before it reaches your resources, minimizing potential disruptions and ensuring service availability.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Implementing NACLs: A Step-by-Step Approach
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Identify Your Security Requirements&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Begin by assessing your specific security needs and the resources that require protection. This will help you develop a comprehensive ruleset tailored to your environment.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Create and Associate NACLs with Your Subnets&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Within the Amazon VPC console, create NACLs and associate them with the relevant subnets. By default, NACLs allow all inbound and outbound traffic, so you'll need to define rules to restrict or allow specific traffic flows.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Define Inbound and Outbound Rules&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Craft rules that govern inbound and outbound traffic based on your security requirements. Consider factors such as IP addresses, protocols, and port numbers to ensure only authorized traffic is permitted.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Monitor and Adjust&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Continuously monitor your NACLs and adjust the rules as needed to accommodate changes in your environment or emerging security threats.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;




&lt;p&gt;Implementing NACLs in your Amazon VPC is a proactive step towards fortifying your cloud security posture. By harnessing the power of granular traffic control and tailored security policies, you can safeguard your resources and ensure compliance with industry standards.&lt;/p&gt;

&lt;p&gt;Explore the Amazon VPC &lt;a href="https://aws.amazon.com/vpc/" rel="noopener noreferrer"&gt;documentation&lt;/a&gt; to learn more about configuring NACLs and enhancing your cloud security. Stay vigilant and take control of your cloud environment with this robust security measure.&lt;/p&gt;

</description>
      <category>cloud</category>
      <category>security</category>
      <category>aws</category>
    </item>
  </channel>
</rss>
