May 2013 archive

Slides from RIPE66: Making an Application Fully IPv6 Compliant

Today at the RIPE66 meeting in Dublin, Ireland, Bert Hubert of PowerDNS fame gave a great presentation about “Making an application fully IPv6 compliant“:
Slide: Making an application fully IPv6 compliant

The video and audio for the session should be available soon. I very much enjoyed Bert’s presentation and he had a few points that I will think about adding to the next version of the book. One specific point is around collecting statistics. Bert noted that in IPv4 you again typically only have one IP address to worry about for each connection, while in IPv6 you may have many different IP addresses for a connection (or you could have). And so you may need to think about your storage of all that statistics information.

I only had two minor quibbles with Bert’s slides:

  • On slide 11, Bert suggests there could be several different ways of displaying IPv6 addresses with port numbers.  As I stated in the question time, RFC 5952 states that it should be Bert’s choice “a”.
  • On the issue of how to choose whether to use the IPv6 or IPv4 interface, the “Happy Eyeballs” technique defined in RFC 6555 is one that many developers are now using.

Overall, I was very glad to see Bert’s presentation out there as we need to have more such presentations helping application developers think about these issues of migrating to IPv6.

P.S. If you want to easily refer people to Bert’s slides, he provided the very easy URL of:

tinyurl.com/ipv6-checklist

Slides from RIPE66: Making an Application Fully IPv6 Compliant

Today at the RIPE66 meeting in Dublin, Ireland, Bert Hubert of PowerDNS fame gave a great presentation about “Making an application fully IPv6 compliant“:
Slide: Making an application fully IPv6 compliant

The video and audio for the session should be available soon. I very much enjoyed Bert’s presentation and he had a few points that I will think about adding to the next version of the book. One specific point is around collecting statistics. Bert noted that in IPv4 you again typically only have one IP address to worry about for each connection, while in IPv6 you may have many different IP addresses for a connection (or you could have). And so you may need to think about your storage of all that statistics information.

I only had two minor quibbles with Bert’s slides:

  • On slide 11, Bert suggests there could be several different ways of displaying IPv6 addresses with port numbers.  As I stated in the question time, RFC 5952 states that it should be Bert’s choice “a”.
  • On the issue of how to choose whether to use the IPv6 or IPv4 interface, the “Happy Eyeballs” technique defined in RFC 6555 is one that many developers are now using.

Overall, I was very glad to see Bert’s presentation out there as we need to have more such presentations helping application developers think about these issues of migrating to IPv6.

P.S. If you want to easily refer people to Bert’s slides, he provided the very easy URL of:

tinyurl.com/ipv6-checklist

TDYR #006 – At RIPE66 In Dublin Talking IPv6 And DNS/DNSSEC

This week I have been in Dublin, Ireland, at the DNS-OARC and RIPE66 meetings meeting people and talking all about IPv6 and DNS / DNSSEC. It has been a great week and this is a quick report from the site. You can get the slides and archives from: http://www.dns-oarc.net/ http://ripe66.ripe.net/

Watch LIVE Today – RIPE66 Panel On Routing Resiliency

RIPE 66 Logo

In about 90-ish minutes, during the session block from 16:00-17:30 local time in Dublin, Ireland, our Internet Society colleague Andrei Robachevsky will be co-moderating a panel about routing resiliency and anti-spoofing of routes and IP addresses. You can watch and listen live at:

https://ripe66.ripe.net/live/main/

As noted in the RIPE 66 Meeting Plan, the panel comes after two talks related to DNS security (that also look quite interesting).  The session block starts at 16:00 – we expect the panel will probably start somewhere between 16:30 – 17:00.

A description of the panel is:

Panel: Seven Years of Anti-Spoofing: What Happened Since the RIPE Task Force and What Still Needs to be Done
Tuesday, 14 May, in the 16:00-17:30 block
This panel of network operators, security experts and vendors to dive into the issue of spoofed IP addresses and how they contribute to Distributed Denial-of-Service (DDoS) attacks. Given that there are known mitigation approaches such as BCP 38, why are DDoS attacks still so common? What can the larger operator community be doing to combat IP spoofing?

This session is extremely relevant to the new Routing Resiliency/Security section of the site that we are seeking to build out, so we’ll definitely be listening to the conversations and feedback.

FYI, if you would like to reach either Jan Zorz or I to meet with us while we are here at RIPE66, please send us an email at deploy360@isoc.org.

SoundCloud Rolls Out Auto-Sharing To Google+

Soundcloud iosYesterday SoundCloud released a new version 2.6 of their iOS app that for the first time allows sharing to Google+. This is rather intriguing because right now very few applications are able to share directly into Google+. Google has very tightly controlled access to their Google+ APIs to the dismay of many of us who want to more easily share the content we create into our Google+ accounts.

The new SoundCloud app for iOS provides the following new features related to Google+:

  1. The ability to login to SoundCloud with your Google+ credentials. This is only really useful to people who are new to SoundCloud as it simplifies the account creation process by letting you login with your Google+ ID.

  2. The ability to share sounds out to Google+ from within the iOS app.

  3. Automatic sharing of new sounds you create to your Google+ account.

The last one is the most interesting to me and the focus of what I'll write about here. I'll note, too, that according to multiple reports, including an article in TheNextWeb, the ability to login to SoundCloud via Google+ is also available in the Android SoundCloud app, although apparently the sharing is not there. The automatic sharing is centrally configured in SoundCloud's web interface and so may not have a dependence on the mobile app.

Automatic Sharing From SoundCloud To Google+

This is again the most important feature of the update to me. SoundCloud has for quite some time had the ability to automatically share any new sound you upload out to Twitter, Facebook (including Facebook Pages) and Tumblr. This new release adds Google+ to the mix.

You need to login to your SoundCloud account and go to Settings -> Connections. Once there you will see a new Google+ button: Sc connections

Selecting the button allows you to go through the standard Google+ process to authorize this application to connect to your Google+ account. Once you do that, you will see a new connection at the bottom of your list of connections: Sc googleplus

Somewhat bizarrely it doesn't use a Google+ icon but rather something that reminds me more of MySpace.

Similarly, over in the iOS app, after you save a recording and are getting ready to post the sound to SoundCloud, the "Sharing Options" now have a Google+ option at the top - but without any icon: Ios app sc 1 In theory, this should all allow the auto-publishing of links to new sounds out to your Google+.

Sounds Great... But Didn't Work :-(

So, after configuring all of this, I recorded a new episode 5 of my The Dan York Report on this topic... and it did NOT auto-post to Google+. When I was in Google+ there was a yellow message that appeared several times at the top of my screen that said something like:

"Oops... there was a problem posting "TYDR #005 ..." Retrying.

Unfortunately it appeared and disappeared too quickly to get a screenshot.

Manually Sharing From SoundCloud Web or iOS App

The good news is that the SoundCloud web also provides a mechanism to manually share a sound out to Google+. If you click on the Share icon on the page for a sound, you can select the Google+ tab: Soundcloud sharing and then write a message about the sound and choose who to share it with: Share on googleplus

Similarly, you can now do this sharing from within the iOS app itself: Ios app sharing

I'm showing these windows for sharing the sound I created, but this could be for ANY sound that you listen to within the SoundCloud app or web interface.

So What About That Auto-Sharing?

Why didn't my first episode after configuring Google+ integration auto-publish out to Google+? I don't know. I'm going to assume this was perhaps a "teething pain" as the folks at SoundCloud get this integration working.

Regardless, it's good to see this integration with Google+ happening (assuming it starts working) and more apps being able to connect into Google+.


An audio commentary about part of this announcement can be found at:


If you found this post interesting or useful, please consider either:


TDYR #005 – SoundCloud Unveils Auto-Sharing To Google+

SoundCloud has rolled out a new release of their iOS app that will, in theory, auto-publish a link to your sound to Google+ after you configure it. This is interesting because Google has so far only allowed a very few applications to connect directly into Google+ to share information. (Having said all this, this first episode after configuring Google+ sharing failed to post to Google+ with an "Oops" error message showing up in Google+.)

Watch LIVE Today – RIPE66 Talk On Best Current Operational Practices

RIPE 66 LogoCurious to know more about what we are interested in doing to help with sharing of best current operational practices (BCOP)? And with getting operator feedback incorporated into the standards process?

In about 90 minutes, at 16:00 local time in Dublin, Ireland, our team member Jan Zorz will be presenting on this topic and asking for feedback from the RIPE 66 attendees. You can watch and listen live at:

https://ripe66.ripe.net/live/main/

Jan’s slides about BCOP are available for viewing now.

Jan’s session is in the Plenary block from 16:00 – 17:30 and is listed after what also sounds like an interesting presentation from Michele McCann about “Building The Case For Africa”. I suspect his talk may happen around 16:30.  It will be recorded and available for later viewing.

For those who are here at RIPE 66, Jan will also be hosting a “Birds of a Feather” (BOF) session from 18:00-19:00 in the main room of the RIPE 66 meeting where he will be seeking further feedback from attendees.

If you would like to reach either Jan or I to meet with us while we are here at RIPE66, please send us an email at deploy360@isoc.org.

FIR #703 – 5/13/13 – For Immediate Release

First B2B Huddle keynote is up, Philip Sheldrake book review is coming; Quick News: Calgary Zoo publishes annual report to Instagram, Salesforce acquires bookmarking startup Clipboard, AP updates its social media guidelines, Facebook newsfeed to get video ads; Ragan promo; News That Fits: American Airlines' misleading influencer promotion with Klout, Dan York's report, McDonald's finds trouble with real-time marketing, Media Monitoring Minute from CustomScoop, listener comments, the dark side of reputation management, Michael Netzley's Asia report, Fleishman-Hillard data reveals an authenticity gap; how to comment; music from Novi Novak; and more.

DNSSEC and DNS Security Talks At DNS-OARC Spring Forum Streaming Live Out of Dublin Today And Tomorrow

dns-oarcCan’t get to Dublin, Ireland, to attend the DNS-OARC Spring Forum 2013 but interested in all the DNS and DNSSEC-related talks?  The good news is that there is a webcast / livestream of the event via Adobe Connect at:

 http://icann.adobeconnect.com/dns-oarc/

As I wrote about last week, there are a good number of the talks related to DNSSEC and DNS security. The event has been extremely interesting so far today.

To watch the livestream, you should reference the DNS-OARC timetable – and remember that all times are Irish Standard Time (currently UTC/GMT+1).

Slides for the talks are also listed on the timetable page.

I’ll be speaking this afternoon at 5:35pm Dublin time about some of the challenges we’ve seen related to DNSSEC deployment and asking for feedback.

Tomorrow morning, Monday, May 13, the timetable is full of DNSSEC talks from 9:00 to 10:40 am that should make for good listening.

 

RIPE66 Next Week: Sessions on IPv6, DNS and Routing

RIPE 66 LogoNext week in Dublin, Ireland, the RIPE 66 Meeting will take place from May 13-17 and a number of Internet Society technical staff will be onsite including two of us from Deploy360: Jan Zorz and myself (Dan York).  The meeting plan has a great number of topics of interest, but two in particular that we’ll be tracking include:

Best Current Operational Practices – Efforts from the Internet Society
Monday, 13 May 16:00-17:00 (Irish Standard Time – currently UTC+1)
Jan will be speaking about the work he has been doing to explore how information from the operations community can best be made more widely available – and asking for feedback from those attending.

Panel: Seven Years of Anti-Spoofing: What Happened Since the RIPE Task Force and What Still Needs to be Done
Tuesday, 14 May 16:00-17:00
Our Internet Society colleague Andrei Robachevsky along with Benno Overeinder of NLnet Labs will be moderating this panel of network operators, security experts and vendors to dive into the issue of spoofed IP addresses and how they contribute to Distributed Denial-of-Service (DDoS) attacks.   Given that there are known mitigation approaches such as BCP 38, why are DDoS attacks still so common? What can the larger operator community be doing to combat IP spoofing?

This last session is extremely relevant to the new Routing Resiliency/Security section of the site that we are seeking to build out, so we’ll definitely be listening to the conversations and feedback.

Naturally we’ll also be paying attention to these working group sessions:

The event will be streamed live and as soon as we have that information we’ll update this post.

We’re very much looking forward to the RIPE 66 event – if you are going to be there please do say hello!