Banner image

Network Operations

Latest articles

OAuth 2

OAuth 2.0 Available for the RIPE Database

Author image
Adonis Stergiopoulos

2 min read

Starting this week, RIPE NCC members can use OAuth 2.0 to authenticate applications that interact with the RIPE Database. This requested feature supports secure delegated access, allowing third parties to make changes to database objects without exposing user credentials.

Article tags:

18 Please read the article before liking.
0
sankey-authdns-titleimage

Expanding AuthDNS - Impact of Adding a New Node in the Philippines

Author image
Rene Wilhelm

12 min read

In June 2025 we activated a new AuthDNS node, hosted at Maharlika IX in Makati City, Manilla Metro, Philippines. In this article we look at what impact this had for DNS clients in the country as well as to the AuthDNS system as a whole.

Article tags:

47 Please read the article before liking.
0
Internet Exchange Point

Why IXPs Matter: Critical Infrastructure Beyond the Hype

Author image
Antonio Prado

9 min read

Internet Exchange Points (IXPs) are often overlooked in discussions about critical infrastructure. Yet their role in routing stability, local resilience, and digital sovereignty is undeniable. In this article, we explore what happens when IXPs fail, and why classifying them as critical infrastructu…

Article tags:

225 Please read the article before liking.
7
new DNSMON

DNSMON Gets a Makeover

Author image
Stephen Suess

4 min read

DNSMON (and DomainMON) gets a modern rewrite with a new home, responsive design, better performance, and unified technology with RIPE Atlas.

Article tags:

16 Please read the article before liking.
0

All articles

moldova cover

RIPE NCC Days Chișinău

Author image
Kjerstin Burdiek

8 min read

Our latest RIPE NCC Days event took place in Chișinău, Moldova from 18-19 June 2025. At the meeting, we heard from local community leaders and examined the landscape of the Internet in Moldova and its neighbours.

Article tags:

14 Please read the article before liking.
0
zero trust

How Secure Are My Sessions?

Author image
Kathleen Moriarty

10 min read

TLS session security isn't just about encryption - it’s about where and how that encryption is terminated. This article explores common risks in TLS deployments and how to align them with modern security principles like Zero Trust.

Article tags:

40 Please read the article before liking.
0
quantum cryptography

PQC for the RPKI

Author image
Dirk Doesburg

27 min read

Future capabilities of quantum attackers will present a host of new vulnerabilities for RPKI. A research student from SIDN Labs presents the first work on post-quantum cryptography for the RPKI, establishing the foundation for making this critical Internet infrastructure quantum-safe.

Article tags:

65 Please read the article before liking.
0
image_openpenny

openPenny: Developing an Open-Source Tool for Detecting Non-Spoofed Traffic

Author image
Petros Gigis

12 min read

In this article, we introduce openPenny, an open-source traffic checker currently under development as part of the RIPE NCC Community Projects Fund. The goal of openPenny is to help network operators identify non-spoofed traffic arriving at unexpected entry points: this offers a new primitive to de…

Article tags:

33 Please read the article before liking.
0
1080x1080px_01_v03_Ripe-Labs-podcast_E-01 (2)

Maria Farrell - Break Ground. Plant Seeds. Rewild the Internet!

Author image
Alun Davies

2 min read

The Internet has long been fertile ground for innovative technologies to grow and openly compete. But having emerged out of these conditions, certain services have come to dominate and stifle the very diversity that made their existence possible. Maria Farrell talks about why we must - and how we c…

Article tags:

66 Please read the article before liking.
0
internet of things

Policy Certification and Verification for Cybersecurity in the Internet of Things

Author image
Anna Maria Mandalari

10 min read

So you installed a smart plug in your home. It works perfectly. But do you really know what data it’s sending, and where? Is it respecting your privacy? Is it even following the law? A research project supported by the RIPE NCC Community Projects Fund delves into uncertainties surrounding IoT devic…

Article tags:

25 Please read the article before liking.
0

Showing 905 article(s)

Previous
1 2 3 ... 91
Next