Network Operations

All articles

eIDAS 2.0 - A Risk to the Global Website Security Ecosystem

eIDAS 2.0 - A Risk to the Global Website Security Ecosystem

Owen Bennett

5 min read

Upcoming EU legislation could undermine years of progress in cybersecurity, and weaken our first line of defence against cybercrime and malicious network interference.

Article tags:

27 You have liked this article 0 times.
1
Implementing Network Time Security at the Hardware Level

Implementing Network Time Security at the Hardware Level

Christer Weinigel

7 min read

Network Time Security (NTS) adds a vital layer of security to Network Time Protocol (NTP) services. Having carried out their software implementation of NTS back in 2019, Netnod has now implemented NTS at the hardware level.

Article tags:

25 You have liked this article 0 times.
0
Internet Network Shutdowns in Russia

Internet Network Shutdowns in Russia

Stéphane Bortzmeyer

8 min read

There have been several calls for Russian Internet networks to be shut down in one way or another and announcements that Russia is going to make such cuts. In this article, Stéphane Bortzmeyer explores the issue from a technical point of view.

Article tags:

39 You have liked this article 0 times.
0
IPv4 Allocations - Is Fairness Still the Goal?

IPv4 Allocations - Is Fairness Still the Goal?

Angela Dall'Ara

7 min read

Last December, an interesting discussion took place on whether current policies and procedures for the allocation and transfer of IPv4 resources in the RIPE NCC service region are in line with the original policy intent. To lend clarity on the issue, we take a closer look at policies and procedures…

Article tags:

24 You have liked this article 0 times.
2
One Bit to the Left - An IPv6 Success Story

One Bit to the Left - An IPv6 Success Story

Ewan Mackie

12 min read

In December 2020, for the second time since we started allocating IPv6, the RIPE NCC granted a request for a subsequent /29 allocation. As moments like this are good indicators of how growth and demand for IPv6 is developing, we reached out to NetCologne GmbH to take a look back and learn more abou…

Article tags:

29 You have liked this article 0 times.
0
PeeringDB’s 2021 User Survey Results and 2022 Product Roadmap

PeeringDB’s 2021 User Survey Results and 2022 Product Roadmap

Leo Vegoda

5 min read

Last September we asked you for input so we could use it to guide our product roadmap for 2022. Last month we shared an update on what we delivered in 2021. Today, we're sharing what you told us through the survey and how we’ll be improving PeeringDB and your experience of it in 2022.

Article tags:

8 You have liked this article 0 times.
0
DNS4EU: RIPE NCC Open House Discussion

DNS4EU: RIPE NCC Open House Discussion

Chris Buckridge

4 min read

On Monday 31 January, the RIPE NCC held an “Open House” community discussion about DNS4EU, the European Commission's recent tender process to establish a European public DNS resolver.

Article tags:

38 You have liked this article 0 times.
0
Dishing up Krill

Dishing up Krill

Tim Bruijnzeels

12 min read

Making sure that your RPKI Repository is available 24/7 can be a challenge. Krillsync - a tool developed at NLnet Labs specifically to help synchronise RRDP content - is here to help. In this article, find out about challenges in scaling up an RPKI Repository, what prompted Repository operators to …

Article tags:

24 You have liked this article 0 times.
0
DNS Vulnerability, Configuration Errors That Can Cause DDoS

DNS Vulnerability, Configuration Errors That Can Cause DDoS

Giovane Moura

7 min read

Last year we discovered a DNS vulnerability that, combined with a configuration error, can lead to massive DNS traffic surges. Since then, we've studied it carefully, carried out responsible disclosure, helped large operators as Google and Cisco in fixing their services, and submitted an Internet D…

Article tags:

32 You have liked this article 0 times.
0
RIPE NCC Information Security Controls Framework For Cloud Services

RIPE NCC Information Security Controls Framework For Cloud Services

Ivo Dijkhuis

8 min read

Information security controls help protect against vulnerabilities and risk. In this article, we share details of the RIPE NCC Cloud Security Controls Framework that we'll be using to assess whether cloud providers meet the security requirements for our services.

Article tags:

31 You have liked this article 0 times.
0

Showing 868 article(s)