Banner image

Network Operations

All articles

bgp-message

Unknown Attribute 28 - A Source Of Entropy in Interdomain Routing?

Author image
Emile Aben

13 min read

On 2 June 2023, there was a disruption in Internet interdomain routing. We got notified of recurring resets of some routers that take care of routing between networks, due to malformed BGP packets with BGP attribute 28. Here we take a first look at the event through RIS and offer some initial ideas…

Article tags:

70 Likes are disabled for this article.
6
iStock-1401716855

Usage Patterns of RIS Live at Code BGP

8 min read

RIS Live is a reliable, well-designed, operationally robust API that provides a real-time view of BGP updates. In this article, the team from Code BGP talk through the RIS Live features that have helped them build a platform capable of detecting and resolving BGP issues in seconds

Article tags:

28 Likes are disabled for this article.
0
Ethernet_pixabay

From Megabits to Terabits: Ethernet Celebrates Its Birthday

Author image
Ondřej Caletka

10 min read

Exactly fifty years ago, the first concept of the computer networks we know today as Ethernet was designed. It has evolved from a thick coaxial cable connecting computers in a single location to the most common way of connecting networks of all sizes via twisted pair and optical fibre.

Article tags:

50 Likes are disabled for this article.
0
podcast_cover

Lefteris Manassakis: In Defence of BGP

Author image
Alun Davies

2 min read

BGP is the Internet's de facto routing protocol - but relatively few have a deep understanding of its vulnerabilities. Delving into threats posed by misconfigurations and hijacks, Lefteris Manassakis discusses BGP and the importance of mitigation, monitoring, and detection with ARTEMIS and Code BGP.

Article tags:

55 Likes are disabled for this article.
0
netnodQA

How to Ensure Robust DNS Services for the Public Sector

Author image
Robert Allen

6 min read

What do public sector organisations need to know to ensure they are protected and that their DNS services are as secure and robust as possible? The team from Netnod poses the questions all such organisations should be asking their DNS providers.

Article tags:

20 Likes are disabled for this article.
2
SEE 11 DDDD

All We Saw at SEE 11

Author image
Anastasiya Pak

5 min read

On 4-5 April, the South East Europe (SEE) Internet community gathered in the coastal town of Split, Croatia - the same country where we held the first SEE meeting over a decade ago. Over 100 participants from 19 countries joined to discuss developments in IPv6, BGP security, DNS, peering, IXPs, and…

Article tags:

45 Likes are disabled for this article.
0
txt-records

The Joy of TXT

Author image
Peter Lowe

10 min read

TXT records are perhaps the most flexible type of DNS records available - but have you ever wondered how they’re really used? To see if we can answer this, the TXT records of 1 million domains are examined to see if there’s any rhyme or reason as to how people employ this quirky, open-ended record …

Article tags:

44 Likes are disabled for this article.
3
IPv6 subnetting

More Next Steps in IPv6 Policy Work

Author image
Leo Vegoda

3 min read

The RIPE Address Policy Working Group is organising interim sessions to plan IPv6 policy discussions at RIPE 86 in Rotterdam. The purpose of these sessions is not to develop policy proposals. It is to define desired policy outcomes and set priorities.

Article tags:

3 Likes are disabled for this article.
0
internet-ukraine

The Resilience of the Internet in Ukraine - One Year On

Author image
Emile Aben

17 min read

In our earlier analysis of Ukraine back in March 2022, we looked at factors that contributed to the resilience of the country's Internet since the outbreak of the war. A little over a year on, we draw on data from RIPE Atlas and RIPE RIS to investigate what has changed.

Article tags:

28 Likes are disabled for this article.
0
source

SAV: Why Is Source Address Validation Still a Problem?

Author image
Qasim Lone

13 min read

Despite being a known vulnerability for at least 25 years, source IP address spoofing remains a popular attack method for redirection, amplification and anonymity. Preventing these attacks requires that operators implement Source Address Validation (SAV) to ensure their networks filter packets with…

Article tags:

34 Likes are disabled for this article.
3

Showing 904 article(s)