Community and Events

All articles

Routing Security is Hot!

Routing Security is Hot!

Melchior Aelmans

3 min read

Routing security is important and it is great to see that it is now on the agenda of many network operators. We're going to organise an RPKI signing party to further increase deployment.

Article tags:

0 You have liked this article 0 times.
2
iSEND: IPv6 SEcure Neighbor Discovery Implementation for Android Devices

iSEND: IPv6 SEcure Neighbor Discovery Implementation for Android Devices

Ahmad Alsadeh

3 min read

IPv6 SEcure Neighbor Discovery (SEND) is an extension to countermeasure the security threats in IPv6 Neighbor Discovery Protocol (NDP). SEND provides address ownership proof, message protection, and router authorisation capabilities. The current lack of robust implementations of SEND at the end use…

Article tags:

0 You have liked this article 0 times.
0
RIOT in Amsterdam

RIOT in Amsterdam

Martine Sophie Lenders

14 min read

The RIOT Summit is the yearly get-together of the community around the RIOT operating system for the Internet of Things (IoT). It aims at bringing together RIOTers, beginners and experts, as well as people interested in the IoT in general. We also welcome decision makers who plan to deploy RIOT in …

Article tags:

0 You have liked this article 0 times.
1
Gunfight at OK Corral: MPLS vs. Probing

Gunfight at OK Corral: MPLS vs. Probing

Benoit Donnet

10 min read

In this article, we investigate the various relationships between MPLS tunnels and standard probing techniques (i.e., ping and traceroute). We investigate several possible MPLS configurations and explain how they interact with measurement techniques. We also provide an external link to an online…

Article tags:

0 You have liked this article 0 times.
0
How We Will Be Validating abuse-c

How We Will Be Validating abuse-c

Angela Dall'Ara

6 min read

At the RIPE NCC we’re busy working out a process so we can start validating approximately 70,000 abuse contact email addresses in the RIPE Database. Read on to see how we will approach this.

Article tags:

0 You have liked this article 0 times.
0
Internet Atlas - Tools for Digital Literacy

Internet Atlas - Tools for Digital Literacy

Andrej Petrovski

5 min read

Based on existing studies and research about the digital environment in Serbia, its legal and technical features, usage and habits among Internet users, the SHARE Foundation aims to produce tools and materials designed to inform, educate and encourage project target groups understand Internet infra…

Article tags:

2 You have liked this article 0 times.
0
RIPE Chair Selection Process

RIPE Chair Selection Process

Mirjam Kühne

3 min read

Based on community input, including a plenary session at RIPE 76 and a discussion on a dedicated mailing list, here is the final version of the RIPE Chair selection process.

Article tags:

0 You have liked this article 0 times.
0
Let's Connect! Easy to Install and Secure VPN Software that Respects your Privacy

Let's Connect! Easy to Install and Secure VPN Software that Respects your Privacy

Rogier Spoor

3 min read

Going online on unknown Internet hotspots - whether at a restaurant, an airport or in a restaurant - isn't actually very safe or secure for users. This is due to the open character of hotspots which makes it easy to impersonate legitimate hotspots and eavesdrop on traffic - or even serve malware. T…

Article tags:

0 You have liked this article 0 times.
0
CrypTech – Next Steps Towards a Safer Internet

CrypTech – Next Steps Towards a Safer Internet

Phil Roberts

4 min read

The main goal of CrypTech is to create an open-source design for a hardware cryptographic engine for Hardware Security Modules (HSMs). At the same time it also provides a associated reference implementation that allows anyone to develop, deploy and audit a secure, low-cost cryptographic engine in t…

Article tags:

0 You have liked this article 0 times.
0
Detection of Peering Infrastructure Outages Based on BGP Communities

Detection of Peering Infrastructure Outages Based on BGP Communities

Vasileios Giotsas

8 min read

Networks rely increasingly on Internet Exchange Points (IXPs) and carrier-neutral interconnection facilities that enable dense localised peering connectivity to handle the massive traffic exchange between clients and servers.

Article tags:

0 You have liked this article 0 times.
0

Showing 456 article(s)