RIPE NCC staff and RIPE community members recently participated in a meeting of the Saudi Arabian IPv6 Task Force, which was held in Al-Khobar on 20 November 2014.
Much has been said over the pasts year or so about various forms of cyber spying. The United States has accused the Chinese of cyber espionage and stealing industrial secrets. A former contractor to the United States' NSA, Edward Snowden, has accused various US intelligence agencies of systematic examination of activity on various popular social network services, through a program called “PRISM”. These days cloud services may be all the vogue, but there is also an emerging understanding that once your data heads off into one of these clouds, then it’s no longer necessarily entirely your data; it may have become somebody else's data too.
Yes, that's a cryptic topic, even for an article that addresses matters of the use of cryptographic algorithms, so congratulations for getting even this far! This is a report of an experiment conducted in September and October 2014 by the authors to measure the extent to which deployed DNSSEC-validating resolvers fully support the use of the Elliptic Curve Digital Signature Algorithm (ECDSA) with curve P-256.
It has been a very busy period in the domain of computer security. With "shellshock", "heartbleed" and NTP monlink adding to the background of open DNS resolvers, port 445 viral nasties, SYN attacks and other forms of vulnerability exploits, it's getting very hard to see the forest for the trees. We are spending large amounts of resources in reacting to various vulnerabilities and attempting to mitigate individual network attacks, but are we making overall progress? What activities would constitute "progress" anyway?
RIPE Atlas data is now available as a live data stream, opening the door to a host of new applications and use cases. Learn more about how this powerful new functionality can benefit your network.
Last week we improved the security of our routing infrastructure by implementing RPKI (Resource Public Key Infrastructure), a technology that can be used to secure the Internet routing infrastructure. RPKI was the topic of my Master's thesis and in this article I am trying to convince you to use this important technology for a more secure Internet.
We used RIPE Atlas to measure latency times to K-root, and we believe we can improve those times by adding new nodes to K-root in strategic locations. Here, we propose the idea of developing an experiment that would let us measure this potential improvement.
We're very excited to announce an all-new user interface (UI) for RIPE Atlas measurements. Users can now schedule, monitor and manage their own customised measurements more efficiently than ever before, and can now make use of the tagging feature when selecting probes for use in those measurements. Learn more about the new features below, explore the new interface, and let us know what you think.
During its meeting in September, the RIPE NCC presented the RIPE NCC Executive Board with a value proposition document detailing the value that RIPE Atlas can bring to network operators, researchers and the Internet community as a whole. The board asked the RIPE NCC to publish this document, which we have done here. We also plan to incorporate much of its content into the RIPE Atlas website so that RIPE Atlas users can clearly understand the different ways this global Internet measurement network can be used and the many unique benefits it provides.
The Locator/ID Separation Protocol (LISP) decouples identity from location on the current IP addresses by creating two separate namespaces. The LISPmob project aims to bring a full-featured LISP open-source implementation to Linux-flavoured systems.