Just a guy in Vermont trying to connect all the dots...
Author's posts
Nov 21
LinkedIn Joins The World IPv6 Launch Measurements Project
We were very pleased to read that LinkedIn is joining the WorldIPv6 Launch measurements effort and providing data about what it is seeing in the way of IPv6 deployment among the many visitors coming to LinkedIn’s sites. In that post to the World IPv6 Launch blog, our colleague Mat Ford also pointed that the November 2014 IPv6 measurements are now out and show the continued growth of IPv6.
LinkedIn is no stranger to IPv6. You may recall the LinkedIn IPv6 case study we published earlier this year where they outlined their work on using IPv6 for SMTP. I can also personally attest to the fact that when I connect to LinkedIn’s web site I can see via the IPvFoo plugin for Chrome that I’m connecting over IPv6.
Kudos to LinkedIn for stepping forward to help out with IPv6 measurements! We look forward to seeing the continued growth of IPv6 as we have for the past months.
Nov 20
TDYR 186 – Japanese Dining Customs and other Reflections On My Short Visit
Nov 20
Watch Live Today at 13:00 US EST – DNSSEC Root KSK Ceremony 19
If you are interested in understanding a bit more about how the overall DNSSEC infrastructure operates, you can watch the “Root DNSSEC KSK Ceremony 19″ live today, November 20, 2014, from a data center in Culpeper, Virginia, USA, starting at 1:00 pm US Eastern time, which is 18:00 UTC. All the information and the link to the live stream can be found at:
https://www.iana.org/dnssec/ceremonies/19
The key ceremonies are part of the activities performed by the Internet Corporation for Assigned Names and Numbers (ICANN) under its contract to operate the Internet Assigned Numbers Authority (IANA). As explained on the overview page:
Ceremonies are usually conducted four times a year to perform operations using the Root Key Signing Key, and involving Trusted Community Representatives. In a typical ceremony, the KSK is used to sign a set of operational ZSKs that will be used for a three month period to sign the DNS root zone. Other operations that may occur during ceremonies include installing new cryptographic officers, replacing hardware, or generating or replacing a KSK.
This ceremony today is to use the “master” root Key Signing Key (KSK) to generate a set of Zone Signing Keys (ZSKs) that will then be used until the next key ceremony.
There is a complete script that outlines the overall process that is used by ICANN to perform this operation today. In the interest of transparency there is also a live video stream that will show the entire process and that will be archived for later viewing.
The “root key” is at the top of the “global chain of trust” that is used to ensure the correct validation of DNSSEC signatures (for more info see “The Two Sides of DNSSEC“) and so it is critical that the security and integrity of this root key be maintained. Ceremonies such as the one today are a part of that effort. If you are interested in learning more, today is a bit of a peek behind the curtain about how all of this happens…
P.S. If you want to learn more about how to get started with DNSSEC, please visit our “Start Here” page to find resources focused on your type of role or organization.
Nov 19
Testing Out Writing in Markdown
This is a top heading
This is some random text that I’m including purely for the sake of having some text here.
This is some more random text.
This should be a next level heading.
And here is some text from Bacon Ipsum:
Bacon ipsum dolor amet venison filet mignon tenderloin, short ribs jerky chuck pancetta pig pork chop. Tri-tip pastrami sausage tail, meatball shank spare ribs bacon jerky corned beef pig alcatra ball tip cow. Turkey bacon meatball brisket hamburger kielbasa. Pig chuck ground round cupim. Landjaeger tail boudin, shank pork belly ribeye biltong meatball sausage bresaola rump hamburger beef ribs pork chop. Ribeye doner capicola, shoulder rump prosciutto ground round pork loin kevin pork chop turkey pork belly shankle beef ribs corned beef. Ball tip ribeye hamburger bresaola.
Another 2nd-level heading
Brisket cow t-bone shank. Porchetta hamburger beef ribs, meatball biltong cow doner swine bacon shankle ribeye. Ground round andouille ham hock, sirloin t-bone tail rump prosciutto ham short loin spare ribs filet mignon. Short loin fatback pork chop, picanha short ribs ground round beef ham. Turducken short loin flank prosciutto salami.
And some bullets:
- bacon
-
steak
-
turducken
Brisket tail ham hock, short loin jowl ribeye prosciutto shankle boudin landjaeger picanha. Turkey ribeye sirloin shoulder short ribs bacon sausage. Leberkas beef ribs beef shoulder fatback hamburger chuck ham sirloin pig short ribs shankle. Spare ribs bresaola ham hock, leberkas corned beef turkey picanha venison ham jerky sirloin hamburger boudin. Turkey landjaeger pork belly, ball tip hamburger rump swine.
Doner chicken pig porchetta beef ribs fatback cow jowl boudin short ribs landjaeger. Turkey drumstick brisket strip steak hamburger. Pork belly andouille pork shank venison salami tail ball tip shankle flank chuck. Drumstick prosciutto turkey pastrami ground round turducken cupim brisket leberkas kielbasa. Picanha tongue shank meatball, landjaeger turkey pork loin cow kevin tenderloin.
Nov 19
Nominations For Board of Public Interest Registry (Operator of .ORG) Close Nov 24 (Featured Blog)
Nov 19
TDYR 185 – Lessons Learned About Public Speaking With Japanese Translation
Nov 18
Norway’s .NO ccTLD Now Signed With DNSSEC
Norway’s .NO became the latest country-code top-level-domain (ccTLD) to be completely integrated into DNSSEC’s global chain of trust with the publication of their DS record in the root zone of DNS over the weekend. As noted in the tweet below (and an earlier one), the team in Norway is rather excited about this event!
#DNSSEC cake, no lie! pic.twitter.com/ejHRIPuNv3
— Unni Solås (@unniquity) November 11, 2014
I don’t know that I’ve seen anyone bake a cake before to celebrate the signing of a top-level domain, but this is pretty cool!
Congratulations to the team at .NO that made this happen! We’ve updated the DNSSEC deployment maps with the info so that Norway now shows up in a “green” status.
On a page about DNSSEC on the Norid web site, they indicate that they will start accepting DNSSEC records on 9 December 2014. This means that .NO domain registrants will very soon be able to experience the higher security of DNSSEC and DANE!
If you would like to learn more about how you can secure your domain with DNSSEC, please visit our Start Here page to find resources targeted at your type of organization.
Nov 17

