Network Operations

Latest articles

DNS Openness

Geoff Huston

Is the DNS open? And would its being open count as a strength or a weakness? These questions lie at the heart of discussions about the future of the Internet, but to answer them, first you have to ask what 'openness' amounts to when it comes to DNS.

68 You have liked this article 0 times.

Why Are Authentication and Authorisation So Difficult?

Kathleen Moriarty

Let’s say you’re tasked with selecting a strong authentication solution for your organisation. Where do you begin? This article is the first of a series that will explore authentication and authorisation technologies in the context of recent exploits and developing trends.

12 You have liked this article 0 times.

Micro BGP Suite: The Swiss Army Knife of Routing Analysis

Lorenzo Cogotti

BGP Scanner from the Isolario project helped researchers analyse routing data, but it had its limitations. Overcoming these has led to the development of the Micro BGP Suite. It provides a variety of tools that, while each simple and efficient in their own operations, are capable of achieving compl…

11 You have liked this article 0 times.

NIS 2 (and the other EU regulation updates you need to know): November 2021

Suzanne Taylor

This is the latest in an ongoing series in which we give a brief overview of the most pertinent digital policies currently being proposed, debated and implemented in the European Union.

31 You have liked this article 0 times.

All articles

Should You Update Your Route Flap Damping Parameters?

Clemens Mosig

BGP Route Flap Damping (RFD) is recommended to suppress BGP churn. Default RFD configurations in routers have been shown to be harmful. Current configuration recommendations by the IETF and RIPE, however, are based on a study from 2010 which focused on IPv4 only. This article presents our recent me…

14 You have liked this article 0 times.

Improving the Resiliency of RPKI Relying Party Software

Koen van Hove

The security RPKI provides is clear, but what about the security of the infrastructure itself? For example, is it possible to disrupt RPKI Relying Party software by, say, introducing a malicious CA/repository into the tree? The short answer is: yes. For a longer answer, read on...

43 You have liked this article 0 times.

Supporting an Independent TF-CSIRT

Kjerstin Burdiek

TF-CSIRT is preparing to go independent, separating from GÉANT. As they take their first steps as an independent organisation, we'll be there to lend our support.

28 You have liked this article 0 times.

The Role of Service Providers in Transforming Security

Kathleen Moriarty

With various types of attacks utilising managed service providers to gain access to multiple targets, it's important to ask how those service providers can help improve security for enterprise environments. Although taking measures in this area requires a lot of effort, the recent increase in attac…

16 You have liked this article 0 times.

Hands-On Learning: How We Built the IPv6 Security Course Virtual Lab Activities

Ondřej Caletka

Recently, we launched a new e-learning course on IPv6 security in the RIPE NCC Academy. This course helps you learn about the theoretical concepts behind IPv6 security, and you will also have a chance to practice some attacks and protection against them on your own computer. In this post, I will de…

17 You have liked this article 0 times.

Hosted DNS Application Update

Expanding the RIPE NCC Authoritative DNS Service means cooperating with the community to find organisations out there willing to host AuthDNS instances on their networks. In this article, find out exactly what's required from hosts and how to apply.

49 You have liked this article 0 times.

Showing 694 article(s)

1 2 3 ... 70