netstack.fm

Plabayo BV

A podcast about networking, Rust, and everything in between. Join us as we explore the stack: from protocols and packet flows to the people and projects building the modern internet — all through the lens of Rust. Featuring deep dives, crate spotlights, and expert interviews.

  1. HÁ 10 H

    Tokio with Carl Lerche (Ep 5 Remastered)

    Episode 34 — Tokio with Carl Lerche (Ep 5 Remastered). In this remastered episode, Glen speaks with Carl Lerche, the creator and maintainer of the Tokio Runtime, about his journey into technology, the evolution of programming languages, and the impact of Rust on the software development landscape. They discuss the rise of async programming, the development of networking libraries, and the future of Rust in infrastructure. Carl shares insights on the creation of the Bytes crate, the implications of io_uring, and his role at Amazon. The conversation also touches on the upcoming Tokio conference and the introduction of Toasty, a new query engine for Rust. Learn more: https://tokio.rs/https://www.tokioconf.com/https://github.com/carllerche Rama If you like this podcast you might also like our modular network framework in Rust: https://ramaproxy.org Chapters 00:00 Intro01:26 Introduction to Carl and His Journey in Tech16:30 How Carl got into Rust21:18 How Mio/Tokio begun47:15 The Evolution of IO-URing and Its Practicality53:11 Amazon's Adoption of Rust and Tokyo55:06 Transitioning Leadership in the Tokyo Project57:15 Toasty01:08:55 AI in Software Development: A Tool for Productivity01:25:53 First Tokio Conference01:34:28 Outro Netstack.FM More information: https://netstack.fm/#episode-34Join our Discord: https://discord.gg/29EetaSYCDReach out to us: hello@netstack.fm Music for this episode was composed by Dj Mailbox. Listen to his music at https://on.soundcloud.com/4MRyPSNj8FZoVGpytj.

    1h 36min
  2. 31 DE MAR.

    Protocol Shorts: TLS Encrypted Client Hello

    Episode 33 – Protocol Shorts: TLS Encrypted Client Hello. This episode explores TLS Encrypted Client Hello (ECH) and how it improves privacy on the internet by hiding sensitive metadata that was previously exposed during the TLS handshake. While traditional TLS encrypts the actual data exchanged between client and server, key details like the Server Name Indication (SNI), which reveals the website you are visiting, remained visible to intermediaries such as ISPs or network middleboxes. Glen explains how ECH addresses this gap by encrypting most of the Client Hello message using keys obtained via secure DNS, preventing third parties from easily identifying user activity. The discussion also covers real-world implications, including the impact on network infrastructure that relies on traffic inspection and the role of cloud providers in TLS termination. Learn more: https://datatracker.ietf.org/doc/rfc9849/ — TLS Encrypted Client Hellohttps://blog.cloudflare.com/encrypted-client-hello/ — Practical explanation of ECH and deploymenthttps://developer.mozilla.org/en-US/docs/Web/Security/Transport_Layer_Security — TLS fundamentals and handshake overviewhttps://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/ — another TLS handshake overviewhttps://tls12.xargs.org/ — a tls 1.2 handshake, explained byte by bytehttps://tls13.xargs.org/ — a tls 1.3 handshake, explained byte by bytehttps://www.rfc-editor.org/rfc/rfc8446 — TLS 1.3 specification and handshake detailshttps://blog.mozilla.org/security/2021/01/07/encrypted-client-hello-the-future-of-esni-in-firefox/ — Firefox perspective on ECH adoptionhttps://blog.mozilla.org/security/2021/01/07/encrypted-client-hello-the-future-of-esni-in-firefox/ — Firefox perspective on ECH adoptionhttps://samueloph.dev/blog/i-use-curl-with-ech-btw-in-debian/ — blog article about adding ECH into curlhttps://www.rfc-editor.org/rfc/rfc9460 — a DNS record type that publishes connection parameters for a servicehttps://fosdem.org/2026/schedule/event/CKANPK-programmable_networking_with_rama/ — FOSDEM 2026 talk about Rama Rama If you like this podcast you might also like our modular network framework in Rust: https://ramaproxy.org Chapters 00:00 Intro00:27 Understanding the TLS Handshake Process06:54 Understanding Middle Boxes and Network Behavior08:33 The Privacy Gap in Network Traffic14:08 Current Usage and Future of ECH18:00 Consequences of ECH for Existing Infrastructures24:19 Future of ECH: Privacy vs. Trust26:32 Outro Netstack.FM More information: https://netstack.fm/#episode-33 Join our Discord: https://discord.gg/29EetaSYCD Reach out to us: hello@netstack.fm Music for this episode was composed by Dj Mailbox. Listen to his music at https://on.soundcloud.com/4MRyPSNj8FZoVGpytj.

    28 min
  3. 24 DE MAR.

    Datastar and Hypermedia (Ep 4 Remastered)

    Episode 32 – Datastar and Hypermedia. In this remastered episode, Glen interviews Delaney, the creator of DataStar, a lightweight framework designed for building real-time collaborative web applications. Delaney shares his journey from being a 3D artist to a developer, emphasizing the importance of hypermedia and real-time visualization. The conversation delves into the efficiency of DataStar, its use of Server-Sent Events (SSE), and the framework's potential for collaborative web experiences. Delaney also discusses the challenges of WebSockets and introduces future projects like DarkStar, aimed at enhancing networking capabilities. Overall, the episode highlights the transformative potential of DataStar in modern web development. In this conversation, Delaney discusses the intricacies of DataStar, a real-time system for handling large volumes of messages. He emphasizes the importance of simplicity in programming, the significance of measuring performance, and the role of abstraction in software development. Delaney also explains the core functions of DataStar, including patch elements and signals, and how they facilitate real-time interactivity. The discussion touches on offline support, the growth of the DataStar community, and the non-profit model that supports its development. Delaney encourages developers to engage with the community and emphasizes the importance of building solutions to real problems. Learn more about Datastar and Hypermedia: https://data-star.dev/https://data-star.dev/reference/datastar_prohttps://hypermedia.systems/ Rama If you like this podcast you might also like our modular network framework in Rust: https://ramaproxy.org Chapters 00:00 Intro01:12 Delaney and his background03:09 The Evolution of Hypermedia and Real-Time Systems06:58 SSE and Compression16:04 The Social Web23:32 Why use datastar?30:12 Web Transport and Darkstar34:26 Final Thoughts on DataStar and Future Directions46:35 Understanding Abstraction in Programming49:18 Event Sourcing and Efficiency in Systems50:50 DataStar: Key Functions and Concepts53:58 Signals in DataStar: When to Use Them57:56 Front-End Validation and User Experience59:58 Offline Support and Web Applications01:03:26 The Growth of DataStar and Community Engagement01:07:39 The Challenges of Web Development01:09:56 AI and Its Role in Development01:13:52 DataStar and WebTransport: Future Directions01:17:03 Dynamic Content and DataStar's Use Cases01:19:06 Funding and Sustainability of Open Source Projects01:31:32 Outro Netstack.FM More information: https://netstack.fm/#episode-32 Join our Discord: https://discord.gg/29EetaSYCD Reach out to us: hello@netstack.fm Music for this episode was composed by Dj Mailbox. Listen to his music at https://on.soundcloud.com/4MRyPSNj8FZoVGpytj.

    1h 33min
  4. 17 DE MAR.

    Protocol Shorts: MITM Proxies and Transparent L4 Interception

    episode 31 — Protocol Shorts: MITM Proxies and Transparent L4 Interception. In this second "Protocol Shorts" episode, we look at man-in-the-middle proxies from the transport layer up. The episode explains how HTTP proxies, HTTP CONNECT, and SOCKS5 differ, why they all assume a proxy-aware client, and what changes when a transparent layer 4 proxy is inserted by the operating system instead. From there, we dig into protocol detection from the first bytes on the wire and into the BridgeIo abstraction in Rama: a way to relay and inspect stacked handshakes incrementally instead of terminating every protocol upfront. Learn more: https://netstack.fm/#episode-23 — Protocol Shorts: HTTP as an Application Bushttps://ramaproxy.org/book/proxies/intro.html — Intro to proxies in the Ramabookhttps://ramaproxy.org/book/proxies/http.html — HTTP(S) proxies in the Rama boohttps://ramaproxy.org/book/proxies/socks5.html — SOCKS5 proxies in the Rama bookhttps://ramaproxy.org/book/proxies/mitm.html — MITM proxies in the Rama bookhttps://ramaproxy.org/book/proxies/protocol_inspection.html — Protocolinspection in the Rama bookhttps://ramaproxy.org/book/proxies/operate/transparent.html — Operating transparent proxies with Ramahttps://github.com/plabayo/rama/tree/main/ffi/apple/examples/transparent_proxy — MacOS Transparent Proxy (Rama) example Rama If you like this podcast you might also like our modular network framework in Rust: https://ramaproxy.org Chapters 00:00 Intro01:00 Understanding Proxies: The Basics01:18 Diving Deeper into Proxy Types04:16 Layer 4 Proxies: A New Approach05:23 Challenges of Transparent Proxies07:53 Bridging Conversations: A New Insight09:53 Example: HTTPS request within a SOCKS5 tunnel13:41 Layer 4 Proxies and Protocol Reconstruction15:15 Outro Netstack.FM More information: https://netstack.fm/#episode-31Join our Discord: https://discord.gg/29EetaSYCDReach out to us: hello@netstack.fm Music for this episode was composed by Dj Mailbox. Listen to his music at https://on.soundcloud.com/4MRyPSNj8FZoVGpytj

    16 min
  5. 10 DE MAR.

    uReq with Martin Algesten

    episode 30: uReq with Martin Algesten. In this episode, we take a deep dive into uReq: why it was created, its history and origin, a high level overview, and explore in depth its protocols and implementation details. Learn more: https://github.com/algesten/ureq — A simple, safe HTTP clienthttps://github.com/algesten/ureq/blob/main/src/run.rs - example on how uReq and Sans IO come togetherhttps://developer.mozilla.org/en-US/docs/Web/HTTP/Reference/Headers/Expect — Expect 100 Continuehttps://github.com/algesten — Github profile of Martin Algestenhttps://github.com/algesten/str0m — A Sans I/O WebRTC implementation in Rusthttps://netstack.fm/#episode-16 — WebRTC and Sans IO with Martin Algesten Rama If you like this podcast you might also like our modular network framework in Rust: https://ramaproxy.org Chapters 00:00 Intro00:58 Get to know Martin06:46 Evolution of uReq: From Simplicity to Compliance20:35 Sans IO26:58 uReq prior to Sans IO30:57 Practical Examples: Handling Complex Protocols50:54 Sans IO in Str0m and uReq55:01 Handling Proxies and DNS Resolution01:02:51 The Future of uReq and uReq Proto01:07:06 Sans IO and h201:09:00 Final Thoughts and Community Feedback01:20:09 Outro Netstack.FM More information: https://netstack.fm/#episode-30 Join our Discord: https://discord.gg/29EetaSYCD Reach out to us: hello@netstack.fm Music for this episode was composed by Dj Mailbox. Listen to his music at https://on.soundcloud.com/4MRyPSNj8FZoVGpytj

    1h 21min
  6. 3 DE MAR.

    Hyper With Sean McArthur (Ep 2 Remastered)

    Episode 29 – Hyper with Sean McArthur (Ep 2 Remastered). In this remastered episode, Glen interviews Sean McArthur, the creator and maintainer of the Hyper ecosystem. They discuss Sean's journey in software engineering, the evolution of Rust and asynchronous programming, and the growth of Hyper from its inception at Mozilla to its current status in the web development landscape. Sean shares insights on the creation of hyper, hyper-util, http, headers, the Warp framework, and the challenges of integrating HTTP/3 and QUIC. The conversation also touches on collaboration with cURL, the FFI layer, and Sean's aspirations for the future of Hyper and the broader ecosystem. Learn more about Sean McArthur, Hyper and Warp: https://seanmonstar.com/https://seanmonstar.com/sponsor/https://hyper.rs/https://seanmonstar.com/blog/async-hyper/https://github.com/hyperium/hyperhttps://github.com/seanmonstar/warphttps://seanmonstar.com/blog/warp/ Rama If you like this podcast you might also like our modular network framework in Rust: https://ramaproxy.org Chapters 00:00 Episode remaster notes00:37 Intro01:21 Get to know Sean McArthur and his origins in Rust08:32 The Impact of Mozilla on Sean's Career10:47 A short history of Hyper21:52 hyper-util, http and headers crates33:46 Warp36:14 Hyper's Core Focus and Future Directions38:21 Integrating HTTP/2 and HTTP/3 Support40:19 The reqwest crate45:04 The Complexities of HTTP/3 Integration48:40 Reflections on the cURL and Hyper Collaboration55:51 Future Aspirations for Hyper59:21 Encouraging Community Engagement in Open Source01:02:40 Outro Netstack.FM More information: https://netstack.fm/#episode-29Original episode was: https://netstack.fm/#episode-2Join our Discord: https://discord.gg/29EetaSYCDReach out to us: hello@netstack.fm Music for this episode was composed by Dj Mailbox. Listen to his music at https://on.soundcloud.com/4MRyPSNj8FZoVGpytj.

    1h 4min
  7. 24 DE FEV.

    socketioxide with Théodore Prévot

    episode 28: socketioxide with Théodore Prévot. This episode features an in-depth conversation with Théodore Prévot, creator and maintainer of the Rust crate socketioxide. We explore the origins of the project, how a personal writing app led to implementing a full Socket.IO server in Rust, and what it takes to build and maintain a high-level real-time protocol on top of Tokio, Tower, and the Rust HTTP ecosystem. Théodore walks us through the layered architecture of Engine.IO and Socket.IO, explains concepts like rooms, namespaces, acknowledgements, adapters, and connection recovery, and reflects on protocol versioning and compatibility challenges. We also dive into one of the hardest technical problems behind socketioxide: building a custom lazy JSON deserializer wrapper around Serde to efficiently route and decode mixed JSON and binary payloads. Finally, we discuss abstraction boundaries, async runtime considerations, integration testing strategies, the possibility of a Rust client implementation, and what motivates long-term open source maintenance. Learn more: https://docs.rs/socketioxide/latest/socketioxide/ — socketioxide documentationhttps://github.com/Totodore/socketioxide — socketioxide GitHub repositoryhttps://totodore.github.io/serde-wrapper/ — Custom Serde deserializer articlehttps://socket.io/docs/v4/ — Official Socket.IO documentationhttps://github.com/socketio/engine.io-protocol — Engine.IO protocol referencehttps://www.youtube.com/watch?v=HEhhWL1oUTM — Talk featuring Théodore Prévot Rama If you like this podcast you might also like our modular network framework in Rust: https://ramaproxy.org Chapters 00:00 Intro01:04 Get to know Théodore Prévot06:43 The origins of socketioxide08:50 Understanding Engine.IO and Its Role11:43 The Evolution of Socket.IO and Its Features22:49 Integration with Other Protocols and Frameworks25:45 Understanding the boundaries of Socket.IO vs Engine.IO35:38 Custom JSON Deserialization Challenges40:54 Navigating Socket.IO Versioning47:02 Abstraction in socketioxide57:04 Future Directions for socketioxide01:05:26 Outro Netstack.FM More information: https://netstack.fm/#episode-28Join our Discord: https://discord.gg/29EetaSYCDReach out to us: hello@netstack.fm Music for this episode was composed by Dj Mailbox. Listen to his music at https://on.soundcloud.com/4MRyPSNj8FZoVGpytj

    1h 6min
  8. 17 DE FEV.

    AI Policies, OSS Maintenance and EU Open Source Academy with Daniel Stenberg

    episode 27: AI Policies, OSS Maintenance and EU Open Source Academy with Daniel Stenberg. This episode features a deep and pragmatic conversation with Daniel Stenberg, founder of cURL and president of the European Open Source Academy, reflecting on FOSDEM 2026, the growing role of open source in European policy, and what digital sovereignty means in practice; Daniel shares the motivation behind the EU funded Open Source Academy, discusses how maintainers are dealing with the rise of AI generated security reports, explains why cURL shut down its bug bounty program, and offers a balanced view on where LLM tools genuinely help in code review and security research versus where they create noise, all while highlighting the long term realities of maintaining critical infrastructure software for decades. Learn more: https://curl.se — cURL websitehttps://daniel.haxx.se/blog/ — Daniel Stenberg bloghttps://fosdem.org — FOSDEMhttps://github.com/bagder/fosdem — FOSDEM tips repositoryhttps://europeanopensource.academy — European Open Source Academy Rama If you like this podcast you might also like our modular network framework in Rust: https://ramaproxy.org Chapters 00:00 Intro01:21 Navigating FOSDEM: Insights and Experiences06:16 The Role of Open Source in Policy and Society10:53 Polhemsrådet and European Open Source Aacademy23:19 The Future of Bug Bounty Programs and AI's Role32:35 Good use of LLM technologies in context of cURL42:32 Daniel's personal LLM usage47:28 how AI might evolve and impact cURL in future53:08 The Future of AI in Software Development56:02 Continuous Improvement in Curl01:02:12 Mentorship and Community in Open Source01:07:41 Very quick intro to some more obscure protocols supported by cURL01:18:54 Outro Netstack.FM More information: https://netstack.fm/#episode-27Join our Discord: https://discord.gg/29EetaSYCDReach out to us: hello@netstack.fm Music for this episode was composed by Dj Mailbox. Listen to his music at https://on.soundcloud.com/4MRyPSNj8FZoVGpytj

    1h 20min

Classificações e avaliações

5
de 5
2 avaliações

Sobre

A podcast about networking, Rust, and everything in between. Join us as we explore the stack: from protocols and packet flows to the people and projects building the modern internet — all through the lens of Rust. Featuring deep dives, crate spotlights, and expert interviews.

Você também pode gostar de