May 2013 archive

Excellent DNSSEC Sessions Coming Up At DNS-OARC Spring Forum This Weekend

dns-oarcThis weekend begins the “Spring Forum” of the Domain Name System Operations Analysis and Research Center, a.k.a. “DNS-OARC” and it once again represents a gathering of many of the prominent people within the DNS / DNSSEC community.  The event takes place in Dublin, Ireland, on the Sunday and Monday morning prior to the RIPE 66 meeting happening for the rest of the week.

In look at the list of contributions to the DNS-OARC Spring Forum, a number are related to DNSSEC and I’m quite looking forward to listening to them.  They include:

DNS Security: Beyond DNSSEC, A “He Must Be Nearing Retirement” Manifesto
Ed Lewis said on a call that he’s going to be talking about ways he thinks DNS can be better secured. Ed has been around the DNS/DNSSEC world for a long time, so I’m looking forward to his ideas.

Measuring DNSSEC
Geoff Huston recently published a long blog post about “Measuring DNSSEC Performance” that got quite deep into analysis. I am assuming Geoff and George Michaelson will be explaining their findings live at this event.

The Use of Elliptic Curve Cryptography in DNSSEC
This presentation by Francis Dupont should be an interesting view into the viewpoint that we ought to be doing more with elliptic curve cryptography (and specifically ECDSA) within DNSSEC.

GPU-based NSEC3 Hash Breaking
Based on the description, this appears to be about a tool that can be used to break the hashes used in NSEC3 records. Not entirely sure where this one is going… so I will be interested to hear it.

Next Steps In Accelerating DNSSEC Deployment
How do we get DNSSEC more rapidly deployed. I’ll be speaking about what we’ve found in the process of developing the DNSSEC side of Deploy360 as well as what has come up through the dnssec-coord mailing list / conference calls and other industry efforts.

Beyond those DNSSEC-related sessions, I’m definitely interested in the sessions around DNS amplification attacks, DNS monitoring and really all the other topics. Definitely a place for those of us interested in DNS and DNSSEC to gather!

I don’t believe there is a livestream, but I do believe the slides will be available as links off the agenda page as they become available.  If you are going to be there at the DNS-OARC Spring Forum, do say hello – and please do let me know your ideas around how we can help here at Deploy360 with resources related to DNSSEC deployment.

Ebook for "7 Deadliest UC Attacks" Now Available DRM-Free From O’Reilly Books

No-drmI was extremely pleased to recently learn that the ebook of "Seven Deadliest Unified Communications Attacks" is now available DRM-free through a deal between Syngress/Elsvier and O'Reilly. As I noted in a recent podcast about DRM-free books, this allows you as the reader much more flexibility and freedom in being able to read the ebook on the platform and device of your choosing.

You can now purchase 7 Deadliest UC Attacks in either Epub of PDF formats directly from O'Reilly.  

The great part about ordering DRM-free ebooks from O'Reilly is that you can easily get back to your ebooks and download them in multiple formats.  They also alert you to updates if there are any.

Kudos to the folks at Elsevier and Syngress for making all of these ebooks available DRM-free!

Packet Pushers Healthy Paranoia Podcast: IPv6 Security Smackdown

Packet Pushers podcast logoInterested in IPv6 security? Back in October 2012, the Packet Pushers podcast had a great show on the topic called “Healthy Paranoia Show 4:IPv6 Security Smackdown!” Guests included many of the people we’ve routinely interacted with about IPv6 at events and on mailing lists:

  • Fernando Gont, security researcher
  • Eric Vyncke, Cisco Distinguished Consulting Engineer and author
  • Joe Klein, security researcher
  • TJ Evans, IPv6 instructor and engineer
  • Jim Small, Sr. Consultant – Network/Security Architecture and Engineering, CDW
  • Scott Hogg, Cisco Press author and Director of Technology Solutions for RMv6TF

The show runs about 90 minutes and is well worth a listen!

TDYR #004 – 1 Year After Going DRM-free, Tor Books Sees No Increase In Piracy

One year after going DRM-free for their ebooks, Tor Books reports that they have "seen no discernible increase in piracy". In this episode I talk about why that is important, how DRM is anti-consumer and as an author and reader why I prefer DRM-free titles. More: http://www.tor.com/blogs/2013/04/tor-books-uk-drm-free-one-year-later Commentary: http://www.techdirt.com/articles/20130430/22322922899/tor-books-uk-says-ditching-drm-showed-no-increase-piracy.shtml My DRM-free books: http://migratingappstoipv6.com/ (O'Reilly) http://www.7ducattacks.com/ (Published by Syngress and recently made available DRM-free through O'Reilly's ebook platform)

TDYR #003 – Syria Disappears From The Internet (And Then Returns) – What Can We Learn From This?

The entire country of Syria went offline on May 7-8, 2013, for about 19-20 hours. What can we learn from this event? http://www.renesys.com/blog/2013/05/syrian-internet-fragility.shtml http://www.washingtonpost.com/blogs/worldviews/wp/2013/05/08/how-did-syria-cut-off-the-entire-country-from-the-internet/ http://labs.umbrella.com/2013/05/07/breaking-news-traffic-from-syria-disappears-from-internet/ http://www.newyorker.com/online/blogs/comment/2013/05/why-did-syria-shut-down-the-internet.html

Video: Have We Found the Cure for Bufferbloat? (Featured Blog)

Following up on my recent post about how solving the Bufferbloat problem could dramatically increase the speed of Internet usage, I recently learned via a Google+ post by Michael Richardson of this video of a presentation by Jesper Dangaard Brouer of Red Hat at the recent DevConf.cz Brno 2013 titled "Beyond the existences of Bufferbloat - Have we found the cure?" More...

RFC 6180 Offers Guidelines for Using IPv6 Transition Mechanisms

How can you best migrate your network to IPv6? What is the best transition mechanism to use of the many available?  Should you make your network dual-stack? Use tunneling? Go IPv6-only with gateways on the edge?

I’ve been asked this question lately by a number of people and unfortunately the answer to what is “best” is really…

It depends.

There are a lot of variables relating to the type of network you have – the architecture, the equipment, the applications, etc.

Thankfully, there are a good number of documents out there that can help with thinking about what mechanism will work best for your.  One of those is RFC 6180, “Guidelines for Using IPv6 Transition Mechanisms during IPv6 Deployment“, available at:

http://tools.ietf.org/html/rfc6180

It is an informational RFC (i.e. not a “standard” but a document intended to be helpful) that outlines four different deployment scenarios and how you might use them.  While it was published in early 2011 and a LOT has happened with IPv6 in the two years since, the document is still a good reference document and one I would encourage you to review.

Most importantly, just start getting IPv6 deployed!

 

TDYR #002 – On The Incredible Importance Of Owning Your Online Platform

TDYR #002 - On The Incredible Importance Of Owning Your Online Platform by Dan York

FIR #702 – 5/6/13 – For Immediate Release

Soundcloud interview is up; B2B Huddle keynotes are coming; Quick News: 300 social media policies, retracting tweets, thoughts after using Google Glass, Lowe's cracks Vine marketing code; Ragan promo; News That Fits: the future of PR agencies, Michael Netzley's Asia report, Media Monitoring Minute from CustomScoop, listener comments, MOOCs will disrupt how we learn, Dan York's report; music from Kim Jarrett; and more.

FIR #702 – 5/6/13 – For Immediate Release

Soundcloud interview is up; B2B Huddle keynotes are coming; Quick News: 300 social media policies, retracting tweets, thoughts after using Google Glass, Lowe's cracks Vine marketing code; Ragan promo; News That Fits: the future of PR agencies, Michael Netzley's Asia report, Media Monitoring Minute from CustomScoop, listener comments, MOOCs will disrupt how we learn, Dan York's report; music from Kim Jarrett; and more.