Banner image

Network Operations

All articles

SEE 11 DDDD

All We Saw at SEE 11

Author image
Anastasiya Pak

5 min read

On 4-5 April, the South East Europe (SEE) Internet community gathered in the coastal town of Split, Croatia - the same country where we held the first SEE meeting over a decade ago. Over 100 participants from 19 countries joined to discuss developments in IPv6, BGP security, DNS, peering, IXPs, and…

Article tags:

45 Likes are disabled for this article.
0
txt-records

The Joy of TXT

Author image
Peter Lowe

10 min read

TXT records are perhaps the most flexible type of DNS records available - but have you ever wondered how they’re really used? To see if we can answer this, the TXT records of 1 million domains are examined to see if there’s any rhyme or reason as to how people employ this quirky, open-ended record …

Article tags:

44 Likes are disabled for this article.
3
IPv6 subnetting

More Next Steps in IPv6 Policy Work

Author image
Leo Vegoda

3 min read

The RIPE Address Policy Working Group is organising interim sessions to plan IPv6 policy discussions at RIPE 86 in Rotterdam. The purpose of these sessions is not to develop policy proposals. It is to define desired policy outcomes and set priorities.

Article tags:

3 Likes are disabled for this article.
0
internet-ukraine

The Resilience of the Internet in Ukraine - One Year On

Author image
Emile Aben

17 min read

In our earlier analysis of Ukraine back in March 2022, we looked at factors that contributed to the resilience of the country's Internet since the outbreak of the war. A little over a year on, we draw on data from RIPE Atlas and RIPE RIS to investigate what has changed.

Article tags:

28 Likes are disabled for this article.
0
source

SAV: Why Is Source Address Validation Still a Problem?

Author image
Qasim Lone

13 min read

Despite being a known vulnerability for at least 25 years, source IP address spoofing remains a popular attack method for redirection, amplification and anonymity. Preventing these attacks requires that operators implement Source Address Validation (SAV) to ensure their networks filter packets with…

Article tags:

34 Likes are disabled for this article.
3
IMG20220428093143

The Human Factor in the Geopolitics of the Internet

Author image
LOUIS PETINIAUD

20 min read

The Internet is a network of networks administered, controlled and shaped by humans. As such, it is as much affected by power relationships across the public and private actors as it, in turn, affects them. In this article, the team from GEODE explores the complex relations between the technical an…

Article tags:

42 Likes are disabled for this article.
0
digital_reds

Intercept and Inject: DNS Response Manipulation in the Wild

Author image
Yevheniya Nosyk

6 min read

In November 2021, Internet users from Mexico lost access to whatsapp.net and facebook.com. By the time the event was reported, the underlying problem had already gone unnoticed for quite some time. Here, we present key takeaways from our analysis of the event - carried out with RIPE Atlas - and we …

Article tags:

40 Likes are disabled for this article.
0
IP Leasing Should Become a Market Standard

Opinion: IP Leasing Should Become a Market Standard

Author image
Vincentas Grinius

8 min read

The policy of the Asia-Pacific Regional Internet Registry (APNIC) that does not accept IP leasing has been questioned during its recent meeting in conjunction with APRICOT. While each of the five global RIRs has its own policies regarding IP leasing, this opinion piece argues that the APNIC policy …

Article tags:

16 Likes are disabled for this article.
0
ipv6_policy

Next Steps in IPv6 Policy Work

Author image
Leo Vegoda

2 min read

The RIPE Address Policy Working Group is organising interim sessions to plan IPv6 policy discussions at RIPE 86 in Rotterdam. The purpose of these sessions is not to develop policy proposals. It is to define desired policy outcomes and set priorities.

Article tags:

4 Likes are disabled for this article.
0
bgp_cover

Navigating the Complexities of BGP: Enhancing Security, Visibility, and Operability

Author image
Radu Strelciuc

16 min read

Explore the concepts and tools needed to ensure the stability and reliability of BGP networks. With a focus on security, visibility, and operability, this article gives an overview of configuring BGP, a complex protocol used to build and maintain the Internet.

Article tags:

57 Likes are disabled for this article.
0

Showing 889 article(s)