Dan York

Just a guy in Vermont trying to connect all the dots...

Author's posts

LinkedIn Joins The World IPv6 Launch Measurements Project

LinkedIn logoWe were very pleased to read that LinkedIn is joining the WorldIPv6 Launch measurements effort and providing data about what it is seeing in the way of IPv6 deployment among the many visitors coming to LinkedIn’s sites.  In that post to the World IPv6 Launch blog, our colleague Mat Ford also pointed that the November 2014 IPv6 measurements are now out and show the continued growth of IPv6.

LinkedIn is no stranger to IPv6. You may recall the LinkedIn IPv6 case study we published earlier this year where they outlined their work on using IPv6 for SMTP.  I can also personally attest to the fact that when I connect to LinkedIn’s web site I can see via the IPvFoo plugin for Chrome that I’m connecting over IPv6.

Kudos to LinkedIn for stepping forward to help out with IPv6 measurements!  We look forward to seeing the continued growth of IPv6 as we have for the past months.

TDYR 186 – Japanese Dining Customs and other Reflections On My Short Visit

Some thoughts on dining customs in Japan and other cultural differences...

Watch Live Today at 13:00 US EST – DNSSEC Root KSK Ceremony 19

IANA logoIf you are interested in understanding a bit more about how the overall DNSSEC infrastructure operates, you can watch the “Root DNSSEC KSK Ceremony 19″ live today, November 20, 2014, from a data center in Culpeper, Virginia, USA, starting at 1:00 pm US Eastern time, which is 18:00 UTC.  All the information and the link to the live stream can be found at:

https://www.iana.org/dnssec/ceremonies/19

The key ceremonies are part of the activities performed by the Internet Corporation for Assigned Names and Numbers (ICANN) under its contract to operate the Internet Assigned Numbers Authority (IANA). As explained on the overview page:

Ceremonies are usually conducted four times a year to perform operations using the Root Key Signing Key, and involving Trusted Community Representatives. In a typical ceremony, the KSK is used to sign a set of operational ZSKs that will be used for a three month period to sign the DNS root zone. Other operations that may occur during ceremonies include installing new cryptographic officers, replacing hardware, or generating or replacing a KSK.

This ceremony today is to use the “master” root Key Signing Key (KSK) to generate a set of Zone Signing Keys (ZSKs) that will then be used until the next key ceremony.

There is a complete script that outlines the overall process that is used by ICANN to perform this operation today.  In the interest of transparency there is also a live video stream that will show the entire process and that will be archived for later viewing.

The “root key” is at the top of the “global chain of trust” that is used to ensure the correct validation of DNSSEC signatures (for more info see “The Two Sides of DNSSEC“) and so it is critical that the security and integrity of this root key be maintained.  Ceremonies such as the one today are a part of that effort.  If you are interested in learning more, today is a bit of a peek behind the curtain about how all of this happens…

P.S. If you want to learn more about how to get started with DNSSEC, please visit our “Start Here” page to find resources focused on your type of role or organization.

Testing Out Writing in Markdown

This is a top heading

This is some random text that I’m including purely for the sake of having some text here.

This is some more random text.

This should be a next level heading.

And here is some text from Bacon Ipsum:

Bacon ipsum dolor amet venison filet mignon tenderloin, short ribs jerky chuck pancetta pig pork chop. Tri-tip pastrami sausage tail, meatball shank spare ribs bacon jerky corned beef pig alcatra ball tip cow. Turkey bacon meatball brisket hamburger kielbasa. Pig chuck ground round cupim. Landjaeger tail boudin, shank pork belly ribeye biltong meatball sausage bresaola rump hamburger beef ribs pork chop. Ribeye doner capicola, shoulder rump prosciutto ground round pork loin kevin pork chop turkey pork belly shankle beef ribs corned beef. Ball tip ribeye hamburger bresaola.

Another 2nd-level heading

Brisket cow t-bone shank. Porchetta hamburger beef ribs, meatball biltong cow doner swine bacon shankle ribeye. Ground round andouille ham hock, sirloin t-bone tail rump prosciutto ham short loin spare ribs filet mignon. Short loin fatback pork chop, picanha short ribs ground round beef ham. Turducken short loin flank prosciutto salami.

And some bullets:

  • bacon

  • steak

  • turducken

Brisket tail ham hock, short loin jowl ribeye prosciutto shankle boudin landjaeger picanha. Turkey ribeye sirloin shoulder short ribs bacon sausage. Leberkas beef ribs beef shoulder fatback hamburger chuck ham sirloin pig short ribs shankle. Spare ribs bresaola ham hock, leberkas corned beef turkey picanha venison ham jerky sirloin hamburger boudin. Turkey landjaeger pork belly, ball tip hamburger rump swine.


Doner chicken pig porchetta beef ribs fatback cow jowl boudin short ribs landjaeger. Turkey drumstick brisket strip steak hamburger. Pork belly andouille pork shank venison salami tail ball tip shankle flank chuck. Drumstick prosciutto turkey pastrami ground round turducken cupim brisket leberkas kielbasa. Picanha tongue shank meatball, landjaeger turkey pork loin cow kevin tenderloin.

Nominations For Board of Public Interest Registry (Operator of .ORG) Close Nov 24 (Featured Blog)

Would you be interested in helping guide the future of the Public Interest Registry (PIR), the non-profit operator of the .ORG domain? If so, the Internet Society is seeking nominations for three positions on the PIR Board of Directors. The nominations deadline is Monday, November 24, 2014. More information, qualification requirements and the submission form can be found here. More...

Nominations For Board of Public Interest Registry (operator of .ORG) Close Nov 24 (Featured Blog)

More...

TDYR 185 – Lessons Learned About Public Speaking With Japanese Translation

At our ION Tokyo event this week, I learned a good bit from talking with Japanese translators who then translated my talk... More info about the event: http://www.internetsociety.org/deploy360/ion/tokyo2014/

Congrats to FreeBSD On Their $1 Million Donation

FreeBSD Foundation logoWow! Many congratulations to the folks at the FreeBSD Foundation for receiving a generous $1 million donation from Jan Koum, CEO and Co-Founder of WhatsApp.

And of course many, MANY thanks to Jan Koum for giving back in this way!  As he states in his Facebook post (reprinted in that link above), the FreeBSD operating system helped him get started in his career and got him to where he is today.  This is a wonderful recognition of the power of open source operating systems – and it is wonderful that Jan Koum made this donation.

While most of the UNIX-related work in my life has been focused around Linux versus FreeBSD, I’ve used FreeBSD on a number of projects and found it quite good.  From a strategic point of view, I’m glad to see this donation to the FreeBSD Foundation to help advance its own plans.  Much of the world’s attention to “open source” matters focuses around Linux – and Linux receives the majority of corporate support and donations. But the Internet thrives on diversity and it is great to have a strong set of operating systems out there.  This donation is good for the health of the overall Internet and the open source ecosystem.

Kudos to Jan Koum for making this donation now that he has risen to such a successful point in his life where he can make a donation like this.  I hope he will inspire others who are in such situations to do so as well!

Norway’s .NO ccTLD Now Signed With DNSSEC

Norway’s .NO became the latest country-code top-level-domain (ccTLD) to be completely integrated into DNSSEC’s global chain of trust with the publication of their DS record in the root zone of DNS over the weekend. As noted in the tweet below (and an earlier one), the team in Norway is rather excited about this event!

I don’t know that I’ve seen anyone bake a cake before to celebrate the signing of a top-level domain, but this is pretty cool!

Congratulations to the team at .NO that made this happen!  We’ve updated the DNSSEC deployment maps with the info so that Norway now shows up in a “green” status.

On a page about DNSSEC on the Norid web site, they indicate that they will start accepting DNSSEC records on 9 December 2014.  This means that .NO domain registrants will very soon be able to experience the higher security of DNSSEC and DANE!

If you would like to learn more about how you can secure your domain with DNSSEC, please visit our Start Here page to find resources targeted at your type of organization.

FIR #782 – 11/17/14 – For Immediate Release

FIR is in a new podcast directory; please rate us in iTunes; Quick News: Google Glass's clouded future, beware of domain laundering, is YouTube the new television?, troubling results from popular podcast; Ragan promo; News That Fits: why does nobody ask what could go wrong?, Dan York's Tech Report, study reveals privacy say-do gap, Media Monitoring Minute from CustomScoop, listener comments, Facebook organic reach is not dead yet, Igloo Software promo, the past week on the FIR Podcast Network; music from Adri-Anne Ralph; and more.