Authors

Maciej Korczynski

Based in France

0

Articles

0

Likes on articles

About the author

Maciej Korczynski is an associate professor at Grenoble Alpes University in France. His main research interests include Internet-wide passive and active security measurements, incident data analysis, vulnerability noti cations, the economics of cybersecurity, and security of Internet protocols, in particular DNS.

Links & Social

Website: https://mkorczynski.com

Zeros Are Heroes: NSEC3 Parameter Settings in the Wild

Zeros Are Heroes: NSEC3 Parameter Settings in the Wild

7 min read

Hashed authenticated denial of existence appeared back in 2008 to prevent DNS zone walking. Since then, best practices have changed and were updated in RFC 9276. This article examines how the current landscape of authoritative name servers and resolvers complies with these recommendations.

Article tags:

15 You have liked this article 0 times.
2
ccTLD Phishing Characterisation

ccTLD Phishing Characterisation

10 min read

Phishing attacks are, to this day, one of the most widespread and effective means of getting access to sensitive and financial data. A new study from the team from SIDN Labs combines more than 28,000 phishing domain names in a bid to improve detection and mitigation policies.

Article tags:

31 You have liked this article 0 times.
0
Extended DNS Errors: Unlocking the Full Potential of DNS Troubleshooting

Extended DNS Errors: Unlocking the Full Potential of DNS Troubleshooting

7 min read

The Domain Name System (DNS) has traditionally relied on response codes to signal anomalies, but they are of little help to precisely identify the root causes behind failures. In this article, we examine the new Extended DNS Errors (EDE) mechanism that provides extra feedback on DNS resolutions.

Article tags:

27 You have liked this article 0 times.
1
SAV: Why Is Source Address Validation Still a Problem?

SAV: Why Is Source Address Validation Still a Problem?

13 min read

Despite being a known vulnerability for at least 25 years, source IP address spoofing remains a popular attack method for redirection, amplification and anonymity. Preventing these attacks requires that operators implement Source Address Validation (SAV) to ensure their networks filter packets with…

Article tags:

34 You have liked this article 0 times.
3
Intercept and Inject: DNS Response Manipulation in the Wild

Intercept and Inject: DNS Response Manipulation in the Wild

6 min read

In November 2021, Internet users from Mexico lost access to whatsapp.net and facebook.com. By the time the event was reported, the underlying problem had already gone unnoticed for quite some time. Here, we present key takeaways from our analysis of the event - carried out with RIPE Atlas - and we …

Article tags:

40 You have liked this article 0 times.
0
Inferring the Deployment of Inbound Source Address Validation Using DNS Resolvers

Inferring the Deployment of Inbound Source Address Validation Using DNS Resolvers

6 min read

Source Address Validation (SAV) is the best current practice (BCP 38/RFC 2827) aimed at filtering packets based on source IP addresses at the network edge. In this article, we show how to identify networks that do not deploy SAV for incoming traffic.

Article tags:

0 You have liked this article 0 times.
1

Showing 6 article(s)

Previous
1
Next