netstack.fm

Plabayo BV
undefined
Jan 6, 2026 • 1h 17min

GraphQL and Rust with Tom Houlé

In this conversation, Tom Houlé, a key contributor in the Rust GraphQL ecosystem, delves into the evolution of GraphQL from its Facebook origins to a robust enterprise solution. He tackles technical issues like the N+1 problem and the benefits of persisted queries for performance and security. An exciting highlight includes his insights on GraphQL Federation, which streamlines microservices in Rust. Tom also discusses GraphQL's future as a self-documenting interface for LLMs, showcasing its potential in the evolving tech landscape.
undefined
Dec 30, 2025 • 33min

Netstack.FM New Year Special, 2025 Wrap-Up

episode 20 — Netstack.FM New Year Special, 2025 Wrap-Up.This New Year special reflects on the first nineteen episodes of netstack.fm, highlighting key lessons about networking, Rust, open source, and the people behind the protocols and systems that power the internet. It also looks at the evolution of the Rama framework and sets the stage for continued learning, collaboration, and new conversations in the year ahead.Learn more:https://github.com/plabayo/rama — rama repositoryhttps://github.com/plabayo/rama/discussions/782 — rama-0.3.0-alpha.4 releasehttps://ramaproxy.org/ — rama official websitehttps://ikorason.dev/posts/from-frontend-to-low-level-networking-my-journey-to-contributing-to-open-source — irfan's blog articleChapters00:00 Intro00:54 Introduction and Year In Review03:28 Insights from Guests and the 2025 episodes22:21 Rama Testimonials27:28 Rama in 202631:07 Closing Message32:07 OutroNetstack.FMMore information: https://netstack.fm/#episode-20Join our Discord: https://discord.gg/29EetaSYCDReach out to us: hello@netstack.fmMusic for this episode was composed by Dj Mailbox. Listen to his music at https://on.soundcloud.com/4MRyPSNj8FZoVGpytj
undefined
Dec 23, 2025 • 1h 16min

Firezone and Zero-Trust Network Security with Thomas Eizinger

episode 19 — Firezone and Zero-Trust Network Security with Thomas Eizinger.In this episode of Netstack.fm, Glen talks with Thomas Eizinger from Firezone about designing a zero trust enterprise VPN built on top of WireGuard. They break down how modern VPNs work in practice, covering virtual network adapters, split tunneling, DNS interception, policy based access, and secure packet routing using WireGuard, ICE, and TURN relays.The discussion highlights how Firezone differs from legacy VPNs by focusing on performance, reliability, and minimal user friction, while also touching on the role of Rust and Elixir in Firezone’s architecture and the long term importance of IPv6 adoption.Learn more:https://github.com/firezone/firezone — Firezone main repositoryhttps://github.com/firezone/firezone/tree/main/rust/relay/ebpf-turn-router — Firezone eBPF in kernel relay routerhttps://www.firezone.dev/kb/architecture/critical-sequences#detailed-connection-setup — Firezone Connection Setuphttps://www.wireguard.com/papers/wireguard.pdf — WireGuard whitepaperhttps://github.com/firezone/boringtun — Firezone fork of boringtun user space WireGuardhttps://www.rfc-editor.org/rfc/rfc8656 — TURN RFC 8656https://x.com/firezonehq — Firezone on Xhttps://x.com/oetzn — Thomas Eizinger on Xhttps://hachyderm.io/@wheezle — Thomas Eizinger on Mastodonhttps://github.com/thomaseizinger — Thomas Eizinger on GitHubRamaIf you like this podcast you might also like our modular network framework in Rust: https://ramaproxy.orgChapters00:00 Intro00:42 Introduction to Thomas Eizinger05:19 Firezone's Turn implementation11:00 Understanding VPNs and Firezone's Approach29:27 Legacy VPNs vs. Firezone: A New Era of Networking36:19 Firezone is opensource37:27 Zero-Trust VPNs40:28 What is WireGuard43:36 Firezone's Integration with WireGuard50:19 Handling Connection Failures58:00 Geolocation and Relay Selection01:04:45 Elixir Developer Experience (DX)01:10:19 IPv6 Adoption and Future Considerations01:15:03 OutroNetstack.FMMore information: https://netstack.fm/#episode-19Join our Discord: https://discord.gg/29EetaSYCDReach out to us: hello@netstack.fmMusic for this episode was composed by Dj Mailbox. Listen to his music at https://on.soundcloud.com/4MRyPSNj8FZoVGpytj
undefined
7 snips
Dec 16, 2025 • 1h

Curiosity, Quake, and Networking with Fabien Sanglard

Fabien Sanglard, a software engineer and technical writer at Google, dives into curiosity-driven engineering. He discusses the evolution of game networking, revealing how latency affected early multiplayer design. Fabien contrasts the architectures of classic games like Doom and Quake, highlighting Quake's groundbreaking client-server model. He emphasizes the importance of documentation and diagrams in understanding technology. Additionally, he shares insights on adopting Rust for reliability in modern code and the iterative nature of ADB's development.
undefined
Dec 9, 2025 • 1h 26min

Early Web History and Interlisp with Larry Masinter

episode 17 — Early Web History and Interlisp with Larry Masinter.We sit down with internet pioneer and longtime IETF contributor Larry Masinter to revisit the origins of many technologies developers use every day. From his early days at Xerox PARC to co-authoring foundational RFCs on HTTP, URIs, and more, Larry shares first-hand stories that connect the early web to the world we build in now. The conversation also explores his current passion project: reviving the Interlisp environment as a living historical system.Learn more:https://larrymasinter.net/ — Official website from Larry Masinterhttps://www.rfc-editor.org/rfc/rfc2616 — RFC 2616 – HTTP/1.1 Specificationhttps://www.rfc-editor.org/rfc/rfc3986 — RFC 3986 – URI Generic Syntaxhttps://www.rfc-editor.org/rfc/rfc2324 — RFC 2324 – Hypertext Coffee Pot Control Protocolhttps://www.rfc-editor.org/rfc/rfc2732 — RFC 2732 – Literal IPv6 Addresses in URLshttps://datatracker.ietf.org/doc/html/draft-masinter-dated-uri — Draft: the 'tdb' and 'duri' URI schemes, based on dated URIshttps://interlisp.org — The Interlisp Revival ProjectRamaIf you like this podcast you might also like our modular network framework in Rust: https://ramaproxy.orgChapters00:00 Intro00:34 Introduction to Larry Masinter05:32 The Intellectual Environment at Xerox PARC06:49 The Interlisp Project and Its Impact10:05 Transitioning to Document Servers and HTTP12:02 Resources, Gopher and the Early Web15:45 Why did HTTP succeed where Gopher faded away20:56 Larry's Involvement in Web Standards and Protocols25:11 Reviving Interlisp post-pandemic27:13 interlisp.org, 5 years later32:57 The Tradition of April 1st RFCs33:51 Invention of Hypertext Coffee Pot Control Protocol (1998)37:04 The Invention of HTCPCP40:55 Exploring URI Schemes47:58 Form-Based File Upload49:12 The Politics of Web Standards01:05:12 The Evolution of Web Protocols01:05:53 Developing in the Interlisp Environment01:14:03 Goals of the Interlisp Revival Project01:23:39 Collaborations and Future Aspirations01:25:09 OutroNetstack.FMMore information: https://netstack.fm/#episode-17Join our Discord: https://discord.gg/29EetaSYCDReach out to us: hello@netstack.fmMusic for this episode was composed by Dj Mailbox. Listen to his music at https://on.soundcloud.com/4MRyPSNj8FZoVGpytj
undefined
23 snips
Dec 2, 2025 • 1h 20min

WebRTC and Sans IO with Martin Algesten

Martin Algesten, a Rust developer and maintainer of WebRTC libraries, dives into the intricacies of WebRTC, tracing its roots to 1990s research. He explains why UDP is essential for real-time media but also complex. The conversation then shifts to the Sans‑IO design, highlighting its advantages for clean protocol implementations in Rust. Martin shares insights on his WebRTC stack, str0m, and discusses the challenges with DTLS integration and testing. This insightful discussion bridges modern protocol design with practical programming experiences.
undefined
Nov 25, 2025 • 1h 39min

Pingora with Edward and Noah from Cloudflare

Edward Wang, a Cloudflare engineer specializing in the Rust-based Pingora proxy framework, joins the discussion alongside Noah. They dive into why Cloudflare transitioned from NGINX to Pingora, emphasizing its modular design and enhanced caching capabilities. Key topics include dynamic traffic handling, connection reuse strategies, and the power of gRPC support. Edward and Noah also explore performance optimizations, TLS backend configurations, and the benefits of using Tokio runtimes in modern networking. Their insights reveal the intricacies of developing high-performance proxies.
undefined
Nov 18, 2025 • 1h 27min

Roto And Cascade with Terts and Arya from NLnet Labs

Episode 14 – Roto And Cascade with Terts and Arya from NLnet Labs.In this episode we have a conversation with Terts and Arya from NLnet Labs. Together we explore their paths into systems programming, the mission of NLnet Labs, and the critical internet infrastructure the organization maintains. The discussion spans DNSSEC, large scale DNS operations, Rotonda, and the Roto scripting language, with deep dives into performance engineering, zero copy design, and building resilient open source networking software. It is a technical episode that highlights the people and ideas behind essential internet protocols.Learn more:https://www.nlnetlabs.nl/ — NLnet Labs websitehttps://github.com/NLnetLabs/cascade — A friendly DNSSEC signing solutionhttps://indico.dns-oarc.net/event/55/contributions/1186 — slides of conference talk introducing Cascadehttps://github.com/NLnetLabs/rotonda — Modular, programmable BGP Enginehttps://github.com/NLnetLabs/roto — strongly-typed, compiled embedded scripting language for Rusthttps://www.youtube.com/watch?v=7xJEFPlfy7Y — EuroRust 2025 talk by Terts on Rotohttps://docs.rs/domain/latest/domain/new/base/wire/index.html — domain's zerocopy modulehttps://bal-e.org/blog/ — Blog from Aryahttps://2026.rustweek.org/ — RustWeek 2026 (with open CFP until EOY 2025)RamaIf you like this podcast you might also like our modular network framework in Rust: https://ramaproxy.orgChapters00:00 Intro01:14 Backgrounds of Terts and Arya10:37 Overview of NLnet Labs17:43 Understanding DNSSEC25:29 The Role of Cascade in DNSSEC41:06 Understanding Roto and Rotonda45:55 The Evolution of Roto's Scripting Language49:34 Integration and Efficiency in Roto52:05 Real-World Applications of Roto01:00:36 The Importance of Data Structures in Performance01:06:34 Optimization Strategies for High Performance01:17:14 Zero-Copy Techniques in DNS Handling01:26:06 OutroNetstack.FMMore information: https://netstack.fm/#episode-14Join our Discord: https://discord.gg/29EetaSYCDReach out to us: hello@netstack.fmMusic for this episode was composed by Dj Mailbox. Listen to his music at https://on.soundcloud.com/4MRyPSNj8FZoVGpytj
undefined
Nov 11, 2025 • 1h 5min

Inside Ping Proxies with Joseph Dye

Episode 13 – Inside Ping Proxies with Joseph Dye.In this episode of Netstack.fm, Glen from Plabayo talks with Joseph Dye (Joe), founding engineer at Ping Proxies, about building large-scale proxy infrastructure in Rust. Joe shares how he went from art student to programmer, joining Ping when it was a tiny startup running on Python and Squid. He explains how they rebuilt everything in Rust, creating performant HTTP and SOCKS5 proxies and managing massive IP networks for web scraping. The conversation covers the evolution of their stack, challenges with HTTP versions, TCP/IP fingerprinting, user-space networking with DPDK, and the adoption of MASQUE and HTTP/3. Joe also reflects on Rust’s safety benefits, being the only Rust engineer at Ping, and how the company stays competitive through technical innovation rather than size.Learn more:https://github.com/smoltcp-rs/smoltcp — A Rust-based user-space TCP/IP stackhttps://dpdk.org — The Data Plane Development Kit for high-performance packet processing and kernel bypasshttps://github.com/cloudflare/quiche — Cloudflare’s QUIC and HTTP/3 implementation, mentioned for MASQUE support w/ tokio supporthttps://github.com/tokio-rs/tokio — The asynchronous runtime used by Ping Proxies for concurrencyhttps://github.com/hyperium/h2 — Rust’s HTTP/2 library, referenced as part of Ping Proxies’ stackhttps://github.com/hyperium/h3 — Rust’s HTTP/3 library, used for advanced proxy tunnelinghttps://datatracker.ietf.org/doc/rfc9298 — Proxying UDP in HTTP (MASQUE)https://ipxo.com — Marketplace for leasing IP addresses, discussed in how Ping acquires IP rangeshttps://pawns.app/sdk/ — Example of SDK-based residential proxy provider referenced in the episodeRamaIf you like this podcast you might also like our modular network framework in Rust: https://ramaproxy.orgChapters00:00 Intro00:41 Introduction to Proxies and Joe's background03:42 Understanding Pink Proxies and Their Offerings06:52 The Technical Journey: From Squid to Rust09:47 Proxy Types: Data Center vs. Residential12:42 Building a Proxy Infrastructure15:44 Challenges with HTTP Protocols18:39 The Importance of Customization in Proxy Development21:38 Team Dynamics and Future Growth29:32 Transitioning to Rust Development30:59 Understanding HTTP Protocols32:40 Exploring HTTP/2 and HTTP/334:05 The Future of Proxying with Mask36:14 Evaluating New Technologies for Proxies37:51 Developing for End User Devices39:49 Challenges in Network Stack Development41:15 Proxying Non-HTTP Traffic42:51 TCP/IP Fingerprinting Explained47:57 The Importance of TCP/IP Fingerprinting53:28 Performance Considerations in User Space TCP58:22 Competing in the Proxy Market01:00:05 Cancellation Safety in Rust Concurrency01:03:53 OutroNetstack.FMMore information: https://netstack.fm/#episode-13Join our Discord: https://discord.gg/29EetaSYCDReach out to us: hello@netstack.fmMusic for this episode was composed by Dj Mailbox. Listen to his music at https://on.soundcloud.com/4MRyPSNj8FZoVGpytj.
undefined
Nov 4, 2025 • 1h 28min

Oxide Networking with Ryan Goodfellow

Episode 12 – Oxide Networking with Ryan Goodfellow.A conversation with Ryan Goodfellow about Rust networking at Oxide. We will explore the Oxide computer stack with a focus on network, including their fully integrated cloud computer, programmable networking with P4 and Dendrite, the Maghemite routing stack, and OPTE — a Rust-based packet engine running inside the kernel. Ryan also shares how his background in large-scale network testbeds led him to help design Oxide’s rack-scale system and its modern approach to routing, observability, and hardware–software co-design.Learn more:https://oxide.computer/ — Oxide Computer Companyhttps://github.com/oxidecomputer/opte — OPTE (Oxide Packet Transformation Engine)https://github.com/oxidecomputer/maghemite — Maghemite (Routing Stack)https://github.com/oxidecomputer/dendrite — Dendrite (P4 Switch Control)https://github.com/oxidecomputer/hubris — Hubris (Rust OS for Microcontrollers)https://github.com/oxidecomputer/falcon — Falcon (Virtual Rack Testbed)https://rfd.shared.oxide.computer/rfd/0347 — RFD 347 (Delay-Driven Multipath Routing (DDM))https://groups.csail.mit.edu/ana/Publications/PubPDFs/Tussle2002.pdf — The Tussle in Cyberspace (Paper)https://named-data.net/project/ndn/ — Named Data Networking Projecthttps://www.sigcomm.org/ — ACM SIGCOMM Conferencehttps://www.usenix.org/conference/nsdi26 — USENIX NSDI Symposiumhttps://oxide-and-friends.transistor.fm/episodes/the-frontend-of-the-computer — Oxide & Friends (Dropshot Episode)RamaIf you like this podcast you might also like our modular network framework in Rust: https://ramaproxy.orgChapters00:00 Intro00:44 Meet Ryan Goodfellow06:23 Building Large-Scale Test Beds07:46 The future of the internet10:54 Overview of Oxide's Rack Scale Computer19:36 Exploring BGP and Routing Protocols26:02 The X4C Compiler and Its Origins39:43 Programming for Tofino and Observability45:10 Life of packets of an HTTP Web (Oxide Rack) server01:01:58 Exploring Maghemite: The Routing Stack01:12:45 Future Directions: Rust-Based Operating Systems01:19:28 Testing Strategies and the Falcon Framework01:27:25 OutroNetstack.FMMore information: https://netstack.fm/#episode-12Join our Discord: https://discord.gg/29EetaSYCDReach out to us: hello@netstack.fmMusic for this episode was composed by Dj Mailbox. Listen to his music at https://on.soundcloud.com/4MRyPSNj8FZoVGpytj.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app