Network Operations

All articles

Sunrise DNS-over-TLS! Sunset DNSSEC?

Sunrise DNS-over-TLS! Sunset DNSSEC?

Willem Toorop

11 min read

Is DNSSEC still needed when you get your DNS over TLS? DNSSEC's original design goals could also be met in a future DoT-only world. However, DNSSEC's aspirations have moved on with DANE. Unfortunately DNSSEC and DANE are hardly ever available at end-user devices. DoT brings liable delivery of DNS, …

Article tags:

0 You have liked this article 0 times.
0
CrypTech – Next Steps Towards a Safer Internet

CrypTech – Next Steps Towards a Safer Internet

Phil Roberts

4 min read

The main goal of CrypTech is to create an open-source design for a hardware cryptographic engine for Hardware Security Modules (HSMs). At the same time it also provides a associated reference implementation that allows anyone to develop, deploy and audit a secure, low-cost cryptographic engine in t…

Article tags:

0 You have liked this article 0 times.
0
Monitoring BGP Anomalies on the Internet

Monitoring BGP Anomalies on the Internet

Martin Winter

5 min read

There are many flavours of BGP hijacks, misconfigurations or outdated implementations. Here are some examples and tips how to verify your announcements.

Article tags:

0 You have liked this article 0 times.
0
An Update on Securing BGP

An Update on Securing BGP

Geoff Huston

22 min read

One way or another we’ve been working on various aspects of securing the Internet’s inter-domain routing system for many years.

Article tags:

0 You have liked this article 0 times.
1
Detection of Peering Infrastructure Outages Based on BGP Communities

Detection of Peering Infrastructure Outages Based on BGP Communities

Vasileios Giotsas

8 min read

Networks rely increasingly on Internet Exchange Points (IXPs) and carrier-neutral interconnection facilities that enable dense localised peering connectivity to handle the massive traffic exchange between clients and servers.

Article tags:

0 You have liked this article 0 times.
0
ARTEMIS: Neutralising BGP Hijacking Within a Minute

ARTEMIS: Neutralising BGP Hijacking Within a Minute

Vasileios Kotronis

9 min read

BGP prefix hijacking is a persistent threat against Internet organisations, attributed to a lack of authorisation and authentication mechanisms in the inter-domain routing system. ARTEMIS (Automatic and Real-Time dEtection and MItigation System) is a defence system against BGP prefix hijacking, whi…

Article tags:

0 You have liked this article 0 times.
11
The Uncertainty of Measuring the DNS

The Uncertainty of Measuring the DNS

Geoff Huston

22 min read

The period around the end of the nineteenth century and the start of the twentieth century saw a number of phenomenal advances in the physical sciences.

Article tags:

4 You have liked this article 0 times.
0
BGP Flexibility and its Consequences

BGP Flexibility and its Consequences

Alexander Azimov

5 min read

Border Gateway Protocol (BGP) is the only exterior gateway protocol created to control traffic between Internet Service Providers (ISPs) all over the world. The initial protocol design was so flexible that after 20 years, it has become a de facto standard mechanism for MPLS/VPN and even Interior Ga…

Article tags:

0 You have liked this article 0 times.
0
Lightweight 4over6: One-step Further Than Dual-stack Networks

Lightweight 4over6: One-step Further Than Dual-stack Networks

Diego Pino Garcia

5 min read

Dual-stack has been one of the most popular transition technologies used to deploy IPv6. This is largely because it allows for routing of IPv4 and IPv6 traffic in parallel.

Article tags:

0 You have liked this article 0 times.
1

Showing 868 article(s)