Network Operations

All articles

PeeringDB 2021 Product Report

PeeringDB 2021 Product Report

Leo Vegoda

4 min read

Data quality was ranked most important by respondents to PeeringDB's 2020 and 2021 user surveys. This update focuses on several improvements we've made to improve the quality of data going into PeeringDB and help users get precisely what they want out of it.

Article tags:

6 You have liked this article 0 times.
0
Authentication and Authorisation Using Single Sign-On

Authentication and Authorisation Using Single Sign-On

Kathleen Moriarty

5 min read

To prevent attacks, there's a push for multi-factor authentication. This is a vital step and should be considered if your organisation hasn't yet made the transition. But while MFA adds protections, how you implement single sign-on, authorisation, and/or federation requires consideration.

Article tags:

12 You have liked this article 0 times.
0
RIPE NCC Internet Country Report: Cyprus, Israel and Malta

RIPE NCC Internet Country Report: Cyprus, Israel and Malta

Suzanne Taylor

4 min read

We take a comprehensive look at three different countries in the Mediterranean region as the next in our series of RIPE NCC Internet Country Reports.

Article tags:

40 You have liked this article 0 times.
1
DNS Openness

DNS Openness

Geoff Huston

52 min read

Is the DNS open? And would its being open count as a strength or a weakness? These questions lie at the heart of discussions about the future of the Internet, but to answer them, first you have to ask what 'openness' amounts to when it comes to DNS.

Article tags:

68 You have liked this article 0 times.
0
Why Are Authentication and Authorisation So Difficult?

Why Are Authentication and Authorisation So Difficult?

Kathleen Moriarty

12 min read

Let’s say you’re tasked with selecting a strong authentication solution for your organisation. Where do you begin? This article is the first of a series that will explore authentication and authorisation technologies in the context of recent exploits and developing trends.

Article tags:

14 You have liked this article 0 times.
0
Micro BGP Suite: The Swiss Army Knife of Routing Analysis

Micro BGP Suite: The Swiss Army Knife of Routing Analysis

Lorenzo Cogotti

7 min read

BGP Scanner from the Isolario project helped researchers analyse routing data, but it had its limitations. Overcoming these has led to the development of the Micro BGP Suite. It provides a variety of tools that, while each simple and efficient in their own operations, are capable of achieving compl…

Article tags:

12 You have liked this article 0 times.
0
NIS 2 (and the other EU regulation updates you need to know): November 2021

NIS 2 (and the other EU regulation updates you need to know): November 2021

Suzanne Taylor

12 min read

This is the latest in an ongoing series in which we give a brief overview of the most pertinent digital policies currently being proposed, debated and implemented in the European Union.

Article tags:

34 You have liked this article 0 times.
0
Should You Update Your Route Flap Damping Parameters?

Should You Update Your Route Flap Damping Parameters?

Clemens Mosig

9 min read

BGP Route Flap Damping (RFD) is recommended to suppress BGP churn. Default RFD configurations in routers have been shown to be harmful. Current configuration recommendations by the IETF and RIPE, however, are based on a study from 2010 which focused on IPv4 only. This article presents our recent me…

Article tags:

20 You have liked this article 0 times.
0
Improving the Resiliency of RPKI Relying Party Software

Improving the Resiliency of RPKI Relying Party Software

Koen van Hove

12 min read

The security RPKI provides is clear, but what about the security of the infrastructure itself? For example, is it possible to disrupt RPKI Relying Party software by, say, introducing a malicious CA/repository into the tree? The short answer is: yes. For a longer answer, read on...

Article tags:

316 You have liked this article 0 times.
0

Showing 868 article(s)