Banner image

Network Operations

All articles

krill-logo-2

Dishing up Krill

Author image
Tim Bruijnzeels

12 min read

Making sure that your RPKI Repository is available 24/7 can be a challenge. Krillsync - a tool developed at NLnet Labs specifically to help synchronise RRDP content - is here to help. In this article, find out about challenges in scaling up an RPKI Repository, what prompted Repository operators to …

Article tags:

24 Likes are disabled for this article.
0
digital_wave

DNS Vulnerability, Configuration Errors That Can Cause DDoS

Author image
Giovane Moura

7 min read

Last year we discovered a DNS vulnerability that, combined with a configuration error, can lead to massive DNS traffic surges. Since then, we've studied it carefully, carried out responsible disclosure, helped large operators as Google and Cisco in fixing their services, and submitted an Internet D…

Article tags:

32 Likes are disabled for this article.
0
cloud security

RIPE NCC Information Security Controls Framework For Cloud Services

Author image
Ivo Dijkhuis

8 min read

Information security controls help protect against vulnerabilities and risk. In this article, we share details of the RIPE NCC Cloud Security Controls Framework that we'll be using to assess whether cloud providers meet the security requirements for our services.

Article tags:

31 Likes are disabled for this article.
0
peeringdb

PeeringDB 2021 Product Report

Author image
Leo Vegoda

4 min read

Data quality was ranked most important by respondents to PeeringDB's 2020 and 2021 user surveys. This update focuses on several improvements we've made to improve the quality of data going into PeeringDB and help users get precisely what they want out of it.

Article tags:

6 Likes are disabled for this article.
0
authorisation

Authentication and Authorisation Using Single Sign-On

Author image
Kathleen Moriarty

5 min read

To prevent attacks, there's a push for multi-factor authentication. This is a vital step and should be considered if your organisation hasn't yet made the transition. But while MFA adds protections, how you implement single sign-on, authorisation, and/or federation requires consideration.

Article tags:

12 Likes are disabled for this article.
0
ripe ncc country report - cyprus, israel, malta

RIPE NCC Internet Country Report: Cyprus, Israel and Malta

Author image
Suzanne Taylor

4 min read

We take a comprehensive look at three different countries in the Mediterranean region as the next in our series of RIPE NCC Internet Country Reports.

Article tags:

40 Likes are disabled for this article.
1
open

DNS Openness

Author image
Geoff Huston

52 min read

Is the DNS open? And would its being open count as a strength or a weakness? These questions lie at the heart of discussions about the future of the Internet, but to answer them, first you have to ask what 'openness' amounts to when it comes to DNS.

Article tags:

68 Likes are disabled for this article.
0
maze

Why Are Authentication and Authorisation So Difficult?

Author image
Kathleen Moriarty

12 min read

Let’s say you’re tasked with selecting a strong authentication solution for your organisation. Where do you begin? This article is the first of a series that will explore authentication and authorisation technologies in the context of recent exploits and developing trends.

Article tags:

14 Likes are disabled for this article.
0
swiss knife

Micro BGP Suite: The Swiss Army Knife of Routing Analysis

Author image
Lorenzo Cogotti

7 min read

BGP Scanner from the Isolario project helped researchers analyse routing data, but it had its limitations. Overcoming these has led to the development of the Micro BGP Suite. It provides a variety of tools that, while each simple and efficient in their own operations, are capable of achieving compl…

Article tags:

12 Likes are disabled for this article.
0

Showing 891 article(s)