Network Operations

All articles

Production Deployment of TCP Authentication Option

Production Deployment of TCP Authentication Option

Andrew Gallo

3 min read

The George Washington University recently deployed Transmission Control Protocol Authentication Option (TCP-AO) after a recent code upgrade on its border routers. This further enhances BGP security features already in place on our network.

Article tags:

22 You have liked this article 0 times.
0
Is It Possible for Encryption to Harm Cybersecurity?

Is It Possible for Encryption to Harm Cybersecurity?

Andrew Campling

10 min read

This article provides an update on developments in encrypted DNS and related protocols and their potential impact on cybersecurity. In particular, it highlights how applications are making it increasingly difficult for both enterprises and consumers to monitor their in-bound and out-bound communica…

Article tags:

29 You have liked this article 0 times.
0
PeeringDB 2022 User Survey

PeeringDB 2022 User Survey

Leo Vegoda

2 min read

PeeringDB wants input from everyone who uses our interconnection database. Our anonymous survey is now open until 23:59 UTC on 16 October 2022. We would like your feedback to help us make PeeringDB more useful to everyone involved in connecting networks.

Article tags:

9 You have liked this article 0 times.
0
The Elephant Effect - Considerations on Live Streaming Italy's Serie A Championship

The Elephant Effect - Considerations on Live Streaming Italy's Serie A Championship

Flavio Luciani

11 min read

For the first time in Italy, a major event - the Serie A football championship - is being broadcast exclusively via the Internet. In this article, we share some considerations the phenomenon of streaming football in Italy, looking at things from the operator’s point of view

Article tags:

63 You have liked this article 0 times.
1
Threat Integration: Lessons of Indicator and Incident Exchange

Threat Integration: Lessons of Indicator and Incident Exchange

Kathleen Moriarty

10 min read

Integration of shared indicators of compromise is very difficult when the responsibility is distributed out to organisations who are then left with the task of turning those indicators into defensive actions or blocking rules. In this article, Kathleen Moriarty shares lessons learned for indicator …

Article tags:

11 You have liked this article 0 times.
0
Measuring Encrypted-DNS Censorship Using OONI Probe

Measuring Encrypted-DNS Censorship Using OONI Probe

Simone Basso

13 min read

In this article we talk through the preliminary results of an encrypted-DNS censorship study currently being conducted by the Open Observatory Network Interference (OONI).

Article tags:

17 You have liked this article 0 times.
2
Deploying IPv6-Mostly Access Networks

Deploying IPv6-Mostly Access Networks

Ondřej Caletka

8 min read

Dual stack is the most common way of deploying IPv6 in access networks. A recent standard defines IPv6-mostly access networks, providing IPv4 connectivity only for legacy devices while allowing modern devices to run IPv6-only. It is already well supported and allows network operators to gradually p…

Article tags:

100 You have liked this article 0 times.
6
Journeying into XDP Part 2: XDPerimenting with DNS Telemetry

Journeying into XDP Part 2: XDPerimenting with DNS Telemetry

Luuk Hendriks

16 min read

In this instalment of our Journeying into XDP series, we look into a passive BPF-program that enables us to plot graphs of DNS metrics without altering the DNS packets or touching the DNS software itself.

Article tags:

21 You have liked this article 0 times.
0
Where Did My Packet Go? Measuring the Impact of RPKI ROV

Where Did My Packet Go? Measuring the Impact of RPKI ROV

Koen van Hove

9 min read

Merely doing RPKI ROV does not provide any guarantees where your packet ends up. We conducted an experiment where we look into the impact of RPKI ROV on whether the packet ends up in the intended location based on active beaconing with two servers.

Article tags:

77 You have liked this article 0 times.
1
Stalloris: RPKI Downgrade Attack

Stalloris: RPKI Downgrade Attack

Haya Schulmann

6 min read

Our research considers the impact of malicious publication points on the resilience of RPKI. We explored attacks that target the functionality of the relying party implementations and evaluated the resulting impact on the RPKI validation. We found all the relying party implementations to be vulnera…

Article tags:

24 You have liked this article 0 times.
0

Showing 868 article(s)