April 2014 archive

FIR #752 – 4/21/14 – For Immediate Release

Interview with JerryGarcia.com developers is up; Quick News: US Court says blogs are media, General Mills backpedals on new online terms of service, LinkedIn releases Slideshare app, Americans are optimistic about upcoming technology advances; Ragan promo; News That Fits: US Airways doesn't fire staffer who sent objectionable tweet, Dan York's Tech Report, monetizing your blog content, Media Monitoring Minute from CustomScoop, listener comments, how advertisers and marketers are using mobile messaging apps, the past week on FIR, Michael Netzley's Asia Report, Igloo Software promo, enterprise social networks need to do more than assimilate new-hires; how to comment; music from Plastic Sky; and more.

Hello world!

Welcome to DeepDark.blue.  This is an experimental site created purely for me to experiment with a newgTLD (.blue).   The site is, of course, signed with DNSSEC and is also available over IPv6.

Call For IPv6 Case Studies For World IPv6 Launchiversary

World IPv6 Launch LogoHave you already deployed IPv6 in your network? Have you migrated your application to work over IPv6? Have you made your website or online service available over IPv6?

If so, WE WANT YOUR EXAMPLE AS A CASE STUDY!

Friday, 6 June 2014, marks the 2-year “Launchiversary” of World IPv6 Launch, the day when sites and networks all across the Internet turned on IPv6 permanently. To celebrate, we want to promote stories about what people have done to make IPv6 “the new normal” within their network, service, application or device.

In the time around 6 June, we want to publish and promote many different kinds of “case studies.” So we want to hear from you! We want to help tell your story of what you did to move to IPv6. In some cases, the story might be how incredibly easy it was to make the move – in other cases the story might be how difficult it was and what steps you had to take.

Now, when we say we want to promote a “case study” we are not necessarily talking about some long whitepaper full of charts and diagrams. That could be the form it takes, if you already have such a document – or if you and we have the time to do that. But a “case study” could also be in the form of:

  • A guest blog post here on Deploy360 with several paragraphs walking through what you did.
  • A video interview posted up on YouTube or another video service.
  • A slide deck that outlines the steps of your transition and the lessons learned.
  • An audio interview posted on our site.
  • A recording of a presentation you have given at a recent industry conference where you talked about your transition.

It could be any of those forms!

If you have a story to tell, please email us at deploy360@isoc.org or fill out our feedback form.

We already have a number of case studies we’re intending to publicize, but we want more! We’re interested in hearing from many different types of people, too, including:

  • Operators of small, medium and large Internet Service Providers (ISPs)
  • Network operators at enterprises
  • Operators of networks for small businesses
  • Consumer electronics vendors
  • Application developers
  • Manufacturers of home routers and other devices for home networks
  • Cloud service providers
  • Data center network operators
  • ???

Basically… if you’ve done anything to move a product/service/application/network over to IPv6, we’d like to hear from you. In the case studies, we’re looking to answer questions such as these:

  • What was involved in making the move to IPv6? What was your business case?
  • What did you need to do to prepare?
  • Was it easy/hard? What was the most challenging aspect of the move? What was the easiest aspect?
  • Was there anything you wish you had known before you started?
  • What advice would you give anyone in a similar situation looking to make the move?

Again, we could capture that in text… in a video interview… in an audio interview… or whatever other form we can think of. We’re ready to work with you to help create that content – and if you already have existing content we’re open to pointing to that, too.

IPv6 deployment has come a long way in the two years since World IPv6 Launch on 6 June 2012.  We want to help spread the word about all the great work that has happened. Please join us!

If you would like to participate, please email us at deploy360@isoc.org or fill out our feedback form so that we can find out more.

We’ll highlight the best case studies we get, and may start doing that before 6 June, so the earlier you submit yours, the better! We’d like to have all submissions in by no later than 30 May so that we can get everything ready for the big day. But, to start, just fire us a message letting us know you are interested – why not do that NOW?

Thanks for your help – and we look forward to celebrating the 2-year Launchiversary with you all on 6 June!

R.I.P. Simon Gwatkin

Simon gwatkinI was greatly saddened to learn today of the death of Simon Gwatkin this past weekend. For those of us in the VoIP / telecom space, the world is a little bit darker now.

I came to know Simon when I worked at Mitel Networks in Ottawa from 2001-2007, although it wasn't really until the later years when I wound up working in Mitel's Office of the CTO and looking more strategically at what the future might hold for companies like Mitel. A lot of my research and time wound up being spent looking at social media and the changing communication landscape. With Simon's role as head of strategic marketing at Mitel we wound up having any number of quite lengthy conversations about where things were going. We didn't always agree, which led to very useful and valuable discussions. Simon also got me engaged with industry analysts and helped set me down a path that was quite useful in many later years.

I also spent a good bit of time interacting with some of the startups that were being nurtured under the umbrella of Wesley Clover, the investment vehicle of Sir Terry Matthews. Simon was involved with Terry's investments there and had this intense passion for helping new entrepeneurs. (And starting in 2008 had a more permanent role with Wesley Clover.) He was fascinated by the communications business (both the telecom kind of "communications" as well as the marketing/PR kind) and by all the different ways we communicate.

When I was part of the large layoff that happened when Mitel purchased Inter-Tel in 2007, Simon helped with his vast network of contacts to try to find a place for me to land. While I ultimately wound up at Voxeo by virtue of some of the blogging I was doing, a couple of his leads were ones that I explored.

After that we stayed in touch over the years and increasingly found ourselves interacting more with each other through Facebook and social networks. One of his sons was doing something with security work at one point, and I'd shared some VoIP security resources I knew of. A few years back when my wife was dealing with breast cancer, a good friend of Simon's was battling it, too, and so we shared information - and shared with each other that intense frustration of being unable to do a whole lot to help someone we care about.

Along the way we had fun teasing each other about language and many other topics. Being a Brit with his very dry wit, he could always rise to the bait of commentary about the English language (versus "American") or other similar topics.

Simon was a gentleman and just a great guy in so many ways. I never knew his children but knew from his comments and posts that he was quite proud of them. He will be missed - and my thoughts and condolences are certainly with his family right now.

For those in the Ottawa region, or able to get there (and I am not able to do so), the obituary says a memorial service will be held tomorrow, April 17, 2014, at 2:30pm. An online guestbook is available for those who wish to leave messages for his family.

R.I.P., Simon. Thank you for all that you did.


If you found this post interesting or useful, please consider either:


Verizon Wireless Approaching 50% IPv6 In Latest World IPv6 Launch Measurements

The latest World IPv6 Launch measurements of network operators were published yesterday and among the charts available for the top 10 networks was this great one showing Verizon Wireless’ network as almost hitting 50% IPv6 deployment:

Verizon Wireless IPv6 deployment

The actual measurement this month was 48.71% but on that growth path I expect we should see it climb over the 50% mark by next month.

As we have written about in the past, and as mentioned on the bottom of the World IPv6 Launch measurements page, the measurements are for the % of IPv6 deployment that is seen from each registered network by the four companies participating in the measurements program:  Google, Facebook, Yahoo! and Akamai. The different methodologies used by the four companies are explained at the bottom of that World IPv6 Launch page.

Very cool to see this amount of IPv6 deployment happening within a mobile network.  How about you?  Are you ready for IPv6?  If not, you may want to start with our IPv6 resources and please do let us know how we can help you!

As Of April 15, Yammer Will Be Effectively Dead To Me

Sadly, as of tomorrow, April 15, 2014, Microsoft's Yammer service will be effectively dead to me. For that is the day when the Yammer desktop client dies:

Yammer mac

Yes, indeed:

This app is out of date and will be discontinued on Apr 15, 2014. For the best Yammer experience, please use your web browser.

Except, of course, that the web browser isn't the "best" Yammer experience for me.

This change was first announced earlier this year with a brief statement on Office365 site that had this as an answer for "why?":

We are refocusing our desktop efforts on creating a companion app to our web experience, rather than a replacement for the website. We’ve seen that our users prefer our desktop experience for real-time alerts, but prefer our web experience to post messages and share content. We’ve developed our Windows Notifier with this in mind - the app will provide real-time notifications on desktop to complement and serve as a companion to the Yammer web experience.

As noted by multiple people in the comments to that page, I'm not sure who Microsoft asked, but for many of us the desktop app was the way we preferred to post and share content.

Microsoft notes that they offer a "Desktop Notifier" app for Yammer, which they do, but it has one wee little problem:

Desktop Notifier Yammer Desktop App

Yep, it's only for Windows. I'm a Mac user. They apparently don't care about me.

That app also seems to only generate notifications... not let you actually interact with the Yammer feed. It is very definitely NOT a "replacement". As stated in one of the community support threads on Microsoft's site by a user named Rob Sparre:

A decision has already been made by MSFT to kill the nice streamlined and useful Yammer desktop app and replace it with the horrible desktop notifier and force us to keep a web browser open with a busy and bulky screen layout. It is disappointing to lose the nice app and have to use a big fat confusing web page.

You may as well close this thread as I do not foresee any good news about it in the future.

Exactly.

Even if I had the new "app" on my Mac, my only choice now is to use the web interface to interact with Yammer.

The problem with using a web interface is that at any given moment I've typically got 57 zillion web browser windows and tabs open on my system and... somewhere ... buried in all those windows and tabs is going to be Yammer.

Yammer is already "yet-another-place-to-check" that isn't fully part of my workflow, and so I don't check it all that much... but having the separate desktop application provided several benefits on my Mac:

1. A SEPARATE APP I COULD SWITCH TO - If I ever wanted to see what was being posted in Yammer I could just click on the Dock icon or Alt+Tab over to Yammer and check in on the flow of messages.

2. A DOCK ICON WITH NOTIFICATIONS - Similarly, Yammer has its own icon in my "dock" on the bottom of my Mac's desktop where it can get a little red circle with the number of new messages in it. A visual indicator that I might want to go check it out.

3. A SIMPLE, COMPACT WINDOW - As the user Rob Sparre pointed out above, the Yammer Desktop client provides a nice easy way to keep track of the feed and interact with messages there. Simple. Easy.

Now judging from other comments I'm guessing that keeping up another desktop client - and one based on rival Adobe Systems' AIR technology, at that - was too much effort for the current staffing level that Microsoft has for Yammer developers.

I understand. You have to prioritize and part of that involves looking at what you remove. I get that. I'm a long-time Apple user... I'm used to having functionality stripped away. :-)

But it's just a disappointment, particularly that they offer no other replacement for Mac users (and a shadow of a replacement for Windows users).

Yes, there are the mobile apps for iPhone, iPad and Android... but the thing is that when I most post to Yammer it is when I am on my work computers... NOT when I am mobile. I often want to share links to things I am working on or articles I find interesting. I'm not going to switch to a mobile device to do that!

So as of tomorrow I don't expect I'll be using Yammer nearly as much as I have been. Sure, I can login to the bloated, Facebook-like web interface... and sure, I can bookmark it or make a pinned tab or something like this... but as I said, Yammer was already "yet-another-place-to-check". The app just made that easier.

Goodbye, Yammer Desktop... 'twas nice knowing you...


UPDATE, April 15, 2014 - As promised, the Yammer Desktop app is dead today:

Yammer desktop dead


If you found this post interesting or useful, please consider either:


FIR #751 – 4/14/14 – For Immediate Release

Critical Mass interview coming; no correspondent reports this week; Quick News: FTC investigates a Pinterest contest, Staples wants to bring 3D printing to the masses, journalists are mining anonymous secret-sharing apps, 44% of Twitter accounts have never sent a tweet; Ragan promo; News That Fits: journalist's jaundiced view of PR's value, decline in serious reading as brain adapts to scanning, Media Monitoring Minute from CustomScoop, listener comments, Igloo Software promo, the past week on the FIR Podcast Network, are social media pundits hypocrites when it comes to engagement?; music from Matt Shenk, and more.

What Can App Developers Learn From Heartbleed?

Heartbleed bugWhat lessons can application developers take from the Heartbleed bug?  How can we use this experience to make the Internet more secure?  Unless you have been offline in a cave for the past few days, odds are that you’ve seen the many stories about the Heartbleed bug (and many more stories today) and, hopefully, have taken some action to update any sites you have that use the OpenSSL library.  If you haven’t, then stop reading this post and go update your systems! (You can test if your sites are vulnerable using one of the Heartbleed test tools.) While you are at it, it would be a good time to change your passwords at services that were affected (after they have fixed their servers). There is an enormous list of the Alexa top 10000 out there, but sites like Mashable have summarized the major sites affected.  (And periodically changing your password is just a general “best practice”, so even if the site was not affected, why not spend a few minutes to make the changes?)

Client Applications Need Updating, Too

For application developers, though, it is also important to update any client applications you may have that use the OpenSSL libraries to implement TLS/SSL connections.  While most of the attention has been focused on how attackers can gain access to information stored on servers, it is also true that a malicious site could harvest random blocks of memory from clients visiting that site.  There is even demonstration code that lets you test this with your clients.  Now, granted, for this attack to work an attacker would need to set up a malicious site and get you to visit the site through, for instance, a phishing email or link shared through social media.  The attacker could then send malformed heartbeat messages to your vulnerable client in an attempt to read random blocks of memory… which then may or may not have any useful information in them.

Again, the path for an attacker to actually exploit this would be a bit complex, but you definitely should test any client applications you have that rely on any OpenSSL libraries.

With all that said, since we have started this “TLS For Applications” topic here are on Deploy360, what are some of the important lessons we can take away from this experience?  Here are a few I see coming out of this – I’d love to hear the lessons you take from all of this in the comments.

Security Testing Is Critical

It turns out that this was an incredibly trivial coding error. As Sean Cassidy points out in his excellent Diagnosis of the OpenSSL Heartbleed Bug, the issue boils down to this:

What if the requester didn’t actually supply payload bytes, like she said she did? What if pl really is only one byte? Then the read from memcpy is going to read whatever memory was near the SSLv3 record and within the same process.

There was no checking on the input and this allowed reading from other parts of the computer’s memory.  As Cassidy later writes about the fix:

This does two things: the first check stops zero-length heartbeats. The second check checks to make sure that the actual record length is sufficiently long. That’s it.

Today’s XKCD comic shows this all in an even simpler explanation.

This is the kind of trivial mistake that probably every developer has made at some point of his or her life.  I am sure that if I were to go back through many lines of code in my past I’d find cases where I didn’t do the appropriate input or boundary testing.  It highlights the importance of doing security testing – and of setting up security unit tests that are just done as part of the ongoing testing of the application. It also highlights the need for ongoing security audits, and for reviewers of code submissions to also be testing for security weaknesses.  But again, this is a common type of error that probably every developer has made.  You need testing to catch things like this.

In this instance it just happens that the mistake was in a piece of software that has now become critical for much of the Internet!  Which leads to a second lesson…

Having A Rapid Upgrade Path/Plan Is Important

As people learned about this bug earlier this week there has been a massive push to upgrade software all across the Internet. Which raises the question: how easy is it for your users to upgrade their software in a high priority situation such as this?

In many cases, it may be quite easy for users to install an update either from some kind of updated package or a download from an online application store.  In other cases, it may be extremely difficult to get updates out there.  In the midst of all this I read somewhere that many “home routers” may be vulnerable to this bug.  Given that these are often something people buy at their local electronics store, plug in, and pretty much forget… the odds of them getting updated any time soon are pretty slim.

Do you have a mechanism whereby people can rapidly deploy critical security fixes?

UPDATE: A ZDNet post notes that both Cisco and Juniper have issued update statements for some of their networking products. I expect other major vendors to follow soon.

Marketing Is Important To Getting Fixes Deployed

Finally, Patrick McKenzie had a great post out titled “What Heartbleed Can Teach The OSS Community About Marketing” that nicely hits on key elements of why we’re seeing so much attention to this – and why we are seeing fixes deployed.  He mentions the value of:

  1. Using a memorable name (“Heartbleed” vs “CVE-2014-0160″)
  2. Clear writing
  3. A dedicated web presence with an easy URL to share
  4. A visual identity that can be widely re-used

His article is well worth reading for more details.  His conclusion includes this paragraph that hit home for me (my emphasis added):

Given the importance of this, we owe the world as responsible professionals to not just produce the engineering artifacts which will correct the problem, but to advocate for their immediate adoption successfully.  If we get an A for Good Effort but do not actually achieve adoption because we stick to our usual “Put up an obtuse notice on a server in the middle of nowhere” game plan, the adversaries win.  The engineering reality of their compromises cannot be thwarted by effort or the feeling of self-righteousness we get by not getting our hands dirty with marketing, it can only be thwarted by successfully patched systems.

Exactly!

We need to make it easy for people to deploy our technologies – and our updates to those technologies.  (Sound like a familiar theme?)

What other lessons have you taken from this Heartbleed bug?  What else should application developers be thinking about to make TLS/SSL usage more secure?

Please do leave a comment here or on social media sites where this article is posted.  (And if you’re interested in helping us get more documentation out to help app developers with TLS/SSL, how about checking out our content roadmap for the TLS area?  What other items should we include?  Do you know of existing documents we should consider pointing to?  Interested in writing some documents?  Please do let us know.)

P.S. There’s now a post out about the process the Codenomicon team went through in disclosing the bug that is worth reading.

FIR #750 – 4/7/14 – For Immediate Release

Quick News: Google Glass app interprets emotions, SEC okays third-party endorsements for investment advisers, Audicity Unconference 2014 announced, NPR expeeriments with voice-recognition-enabled ads; Ragan promo; News That Fits: does it matter if third-party reports are more credible than branded content?, Michael Netzley's Asia Report, five ways local customers get from your blog to your business, Media Monitoring Minute from CustomScoop, listener comments, is Facebook still a viable channel for brands seeking organic reach?, Dan York's Tech Report, Igloo Software promo, last week on the FIR Podcat Network, the evolving conversation ecosystem; music from Stars and Skylines; and more.

TDYR #146 – Running In The Snow And Sleet Of Colorado

TDYR #146 - Running In The Snow And Sleet Of Colorado by Dan York