You are here: Home > Publications > RIPE Labs
register

RIPE Labs

IPv6: Not a Product, a Building Block
Marco Hogewoning — Dec 19, 2014 03:15 PM

It seems that the biggest obstacle to a widespread deployment of IPv6 to date is the lack of a clear business case to recover the cost of such a deployment. The fundamental problem here is that the majority of market players still view IPv6 as a product, rather than what it really is: a building block to a new future.

Survey on Internet Routing Security
Survey on Internet Routing Security
Sebastian Abt — Dec 17, 2014 02:20 PM

This is a call for participation in a survey on Internet Routing Security. The survey runs until 9 January 2015 and will only take a few minutes.

Distribution of RIPE Atlas Probes
Distribution of RIPE Atlas Probes
Emile Aben — Dec 16, 2014 01:55 PM

As the RIPE Atlas network continues to grow, it's useful for ambassadors and potential probes hosts to easily see where we already have probes deployed and where we'd like more probes installed. We created a few useful maps to help with this.

Coming Soon: RIPE Atlas Hackathon 2015
Coming Soon: RIPE Atlas Hackathon 2015
Suzanne Taylor Muzzin — Dec 10, 2014 02:25 PM

Calling all developers, designers, network operators, computer science students, and open data enthusiasts - the RIPE NCC is hosting a RIPE Atlas data visualisation hackathon in March 2015, and we want you!

Call for Input: RPKI Browser
Call for Input: RPKI Browser
Matthias Wählisch — Nov 27, 2014 05:00 PM

The RPKI Browser is a graphical user interface to the objects of the distributed RPKI repository. The development is at very early stage. In this article, we ask for external input in terms of use cases, features etc.

The Resolvers We Use
The Resolvers We Use
Geoff Huston — Nov 26, 2014 10:55 AM

The Internet’s Domain Name System is a modern day miracle. It may not represent the largest database that has ever been built, but nevertheless it’s truly massive. And even if it’s not the largest database that’s ever been built, it’s perhaps one of the more intensively used. The DNS is consulted every time we head to a web page, every time we send an email message, or in fact every time we initiate almost any transaction on the Internet. It's the essential bridge between a world of human names and the underlying world of binary protocol addresses. And it’s fast. Fast enough that it’s still largely invisible as part of the user experience, despite continued growth in size. Given the fragmentation of the IPv4 address space with the widespread use of various forms of address sharing, then it increasingly looks as if the DNS is the only remaining common glue that binds the Internet together as a single network.

16th Meeting of the Saudi Arabian IPv6 Task Force
16th Meeting of the Saudi Arabian IPv6 Task Force
Marco Hogewoning — Nov 25, 2014 09:10 AM

RIPE NCC staff and RIPE community members recently participated in a meeting of the Saudi Arabian IPv6 Task Force, which was held in Al-Khobar on 20 November 2014.

Who's Watching
Who's Watching
Geoff Huston — Nov 13, 2014 10:45 AM

Much has been said over the pasts year or so about various forms of cyber spying. The United States has accused the Chinese of cyber espionage and stealing industrial secrets. A former contractor to the United States' NSA, Edward Snowden, has accused various US intelligence agencies of systematic examination of activity on various popular social network services, through a program called “PRISM”. These days cloud services may be all the vogue, but there is also an emerging understanding that once your data heads off into one of these clouds, then it’s no longer necessarily entirely your data; it may have become somebody else's data too.

ECDSA and DNSSEC
ECDSA and DNSSEC
Geoff Huston — Nov 11, 2014 09:35 AM

Yes, that's a cryptic topic, even for an article that addresses matters of the use of cryptographic algorithms, so congratulations for getting even this far! This is a report of an experiment conducted in September and October 2014 by the authors to measure the extent to which deployed DNSSEC-validating resolvers fully support the use of the Elliptic Curve Digital Signature Algorithm (ECDSA) with curve P-256.

Privacy and Security - Five Objectives
Geoff Huston — Nov 06, 2014 10:50 AM

It has been a very busy period in the domain of computer security. With "shellshock", "heartbleed" and NTP monlink adding to the background of open DNS resolvers, port 445 viral nasties, SYN attacks and other forms of vulnerability exploits, it's getting very hard to see the forest for the trees. We are spending large amounts of resources in reacting to various vulnerabilities and attempting to mitigate individual network attacks, but are we making overall progress? What activities would constitute "progress" anyway?