Dan York

Just a guy in Vermont trying to connect all the dots...

Author's posts

Catching Up With Mitel …

Mitel logo 2014By way of a tweet I stumbled upon analyst Blair Pleasant's UC Strategies post, "Change - The Only Thing That's Constant", that showed me that while I've been off in the worlds of IPv6 and DNSSEC there has been a great amount of activity happening in the world of my former employer Mitel.

Heck, I didn't even realize they had a new logo! :-)

But indeed they do (apparently back in 2013 in October 2014 (see comments))... and Blair's great look at the world of Unified Communications mentions that and a good bit more. I was aware of the acquisition of Aastra, but did not realize that PrairieFyre had finally been folded into Mitel (it had always seemed to be a likely acquisition candidate as its products worked primarily with Mitel's systems).

With my focus changing a bit, and most of my interest here on Disruptive Telephony focused around WebRTC and some of the newer disruptions to Internet communications, the last time I really mentioned Mitel was back in April with the passing of Simon Gwatkin. My posts about Mitel prior to that go back to 2011 and before.

In looking at Mitel's web site, their rebranding is clear in so many ways. From the nice clean website to the "Mi<whatever>" product naming... there's obvious a great amount of work that's gone on.

Congratulations to the Mitel team, too, on being named a leader in the Gartner Magic Quadrant for UC. Having worked with Gartner analysts in the past on these reports (as a vendor representative), I know what a huge amount of effort goes in to making your case for why your company should be positioned highly - and I also know how powerfully these reports can help in enterprise sales. I read the UC Magic Quadrant report, too, and Gartner had very nice words about Mitel.

While I no longer really focus on the IP-PBX and the "enterprise" side of UC, it's great to see this evolution of Mitel. I still know many excellent people who work there and certainly during my time there (2001-2007) the R&D teams were (and presumably still are) some of the best in the industry.

Congrats to all involved at Mitel!


If you found this post interesting or useful, please consider either:


DNS Security Advisories Out Today For BIND, PowerDNS and Unbound – Time To Upgrade!

DNSWhile this has nothing to do specifically with the topic of DNSSEC that we cover here on Deploy360, there is important news in the broader world of “DNS security”.  The vendors of three of the major DNS recursive resolvers today released security advisories about a particularly nasty bug where the resolver can be tricked into trying to follow essentially an infinite loop and wind up exhausting all resources and potentially shutting down.  The advisories from BIND, PowerDNS and Unbound are found at these links:

The advisories from both PowerDNS and Unbound indicate that this bug would be difficult for an attacker to exploit unless they were within the user base of the recursive resolver.  The BIND advisory is more open-ended and indicates the bug could be executed remotely.

In all cases the easiest solution is to upgrade to the newest versions:

While there are apparently no known exploits of the bug in the wild yet, that will now only be a matter of time.  It would be best to upgrade your recursive resolvers as soon as possible.

P.S. While you are in there updating your DNS resolver, if you are using BIND or Unbound, why not enable DNSSEC validation?  It’s a simple change in the configuration file, as shown in this SURFnet white paper.

That moment when your computer makes a notification sound… but you can’t identify it, nor know which browser tab or app made the sound!

That moment when your computer makes a notification sound… but you can’t identify it, nor know which browser tab or app made the sound!

TDYR 192 – Where Are The Positive TV Shows Like The West Wing?

Where are the TV shows that are ultimately positive and hopeful like The West Wing? I'm looking for series like that, but all the recent drama series seems to be dark and gritty...

IPv6 Privacy Addresses Provide Protection Against Surveillance And Tracking

IPv6 BadgeRecently we’ve seen several articles, such as one out today, that assert that IPv6 addresses will make it easier for security services and law enforcement to track you. Surprisingly, these articles seem to miss that when IPv6 is implemented today on mobile devices or other computers, it is almost always implemented using what are called “privacy extensions” that generate new IPv6 addresses on a regular basis.

To put it simply – almost every mobile device or computer using IPv6 in 2014 changes its IPv6 address on a daily basis (usually) to prevent exactly this kind of surveillance.

To step back a bit – if you read any of the documents explaining the basics of IPv6, they inevitably mention that the “auto-configured” IPv6 address for a device is created using the network address and the MAC address assigned to the device’s network interface. This gives a theoretically globally unique address for your computer, mobile phone, or device.

If this were the only IPv6 address your device had, it would be something that could be easily tracked.

But…

The engineers who created IPv6 were very concerned that IPv6 could be used in this way and so way back in 2007 they published RFC 4941 defining “privacy extensions for IPv6″ autoconfiguration. This standard defines a mechanism where a device generates a random host address and uses that instead of the device’s MAC address.

The device also changes that IPv6 address on a regular interval. The interval can be set to anything, but typically is configured on most operating systems to be one day. In mobile networks, the IPv6 address may change based on the link to which you are connecting, so as you move around you will be generating and using new IPv6 addresses all the time throughout the day.

As we wrote about in a resource page about IPv6 privacy extensions, the following operating systems use IPv6 privacy extensions BY DEFAULT:

  • All versions of Windows after Windows XP
  • All versions of Mac OS X from 10.7 onward
  • All versions of iOS since iOS 4.3
  • All versions of Android since 4.0 (ICS)
  • Some versions of Linux (and for others it can be easily configured)

So if you are using a Windows or Mac OS X computer, or any of the major mobile devices, you are already using IPv6 privacy addresses.

I know from my own network analysis in my home office network that all my devices are constantly changing their IPv6 addresses. (In fact, these IPv6 privacy addresses can cause problems for some applications that expect IP addresses to be stable – which brought about RFC 7217 this year suggesting a way to create a random address when your device is on a given network but then have that change when you move to another network.)

In the end, the ability of security services to track you on IPv4 versus IPv6 is pretty much about the same. With IPv4, you generally have a public IPv4 address that is assigned to the edge of your network, perhaps your home router or the router at the edge of your corporate network. You then use NAT to assign private IPv4 addresses to all devices on the inside of your IPv4 network. On the public Internet, all that an observer can see and track is your public IPv4 address – there is no further information about the device on the inside of the network beyond a port number.

With IPv6, you typically have a public IPv6 network address assigned to the edge of your network and then the devices internally configure themselves using IPv6 privacy extensions. On the public Internet, an observer can see and track your public IPv6 address, but that will be changing each and every day, making any kind of long-term tracking rather difficult or resource-consuming.

We definitely want to see more articles about IPv6 security appearing out in the mainstream media as these are extremely important conversations to have – but when talking about IPv6 addresses and surveillance, let’s please try to focus on how IPv6 is actually being implemented rather than how it could theoretically be done.

NOTE: For a lengthier technical discussion on this topic, please view this Internet Draft: draft-ietf-6man-ipv6-address-generation-privacy

For more information on how to get started with IPv6, please visit our Start Here page to find resources focused on your role or type of organization.

P.S. From a privacy perspective, I am personally far more worried about the application-layer tracking that occurs through “cookies” (including the new “super cookies” deployed by some mobile network providers) and other mechanisms. For these tracking mechanisms, the underlying IP address is completely irrelevant.

 

Internet Society Seeks Nominations for Board of Trustees (Featured Blog)

Are you passionate about preserving the global, open Internet? Do you have experience in Internet standards, development or public policy? If so, please consider applying for one of the open seats on the Internet Society Board of Trustees. The Internet Society serves a pivotal role in the world as a leader on Internet policy, technical, economic, and social matters, and as the organizational home of the Internet Engineering Task Force (IETF). More...

Internet Society Seeks Nominations For Board of Trustees (Featured Blog)

More...

In Every Action We Take, We Create The World We Want To Live In

In our every action... each moment of the day... we make the choice to build people up or to tear people down. The choice we make determines the type of person we are - and the type of world we want to live in.

Serene lake

No Adults! An Awesome Aspect of Youth Curling Games

Today I was reminded of one of the truly awesome and wonderful aspects of youth curling bonspiels (tournaments) - when the kids go through the door out onto the ice, the game is ENTIRELY up to *them*.

No adults are allowed out on the ice. No coaches. No parents. No one.

Just the youth.

Unlike other youth team sports there are no coaches helping call the shots or determine the flow of play. There is no one to consult with. (Although we are nearby if there is a rules question that needs addressing or if there are safety issues.) From the initial start with a shaking of hands and a coin toss all the way to the end... it is entirely up to the kids.

The strategy. The scoring. The flow of the game. The making of the shots. The interpretation of the rules.

All of it... by them.

Of course we as coaches work with them to teach them all the different aspects of the sport and to prepare them for the games.

But when they go through that door... it is entirely up to them!

We are left to just watch from behind the glass... to celebrate... and sometimes to cringe... but there is absolutely nothing we can do but watch!

Pretty awesome for the kids!

No Adults! An Awesome Aspect of Youth Curling Games

TDYR 191 – No Adults! An Awesome Aspect of Youth Curling Games

An aspect of youth curling bonspiels (tournaments) is that...