Banner image

Network Operations

All articles

Microsoft Making Progress Towards IPv6-only

Microsoft Making Progress Towards IPv6-only

Author image
Mirjam Kühne

5 min read

Following up from an earlier article, Veronika McKillop, network architect at Microsoft, describes how the organisation is making progress towards an IPv6-only network.

Article tags:

0 Likes are disabled for this article.
2
DNS_bj_3-1.png

Persistent DNS Connections for Reliability and Performance

Author image
Baptiste Jonglez

10 min read

For decades, the Domain Name System (DNS) has relied on UDP as its transport protocol of choice, mostly because of its simplicity. New transports such as DNS-over-TLS and DNS-over-HTTPS are now gaining popularity: they offer increased privacy while preventing the use of the DNS as a DDoS attack vec…

Article tags:

0 Likes are disabled for this article.
3
Let's Connect! Easy to Install and Secure VPN Software that Respects your Privacy

Let's Connect! Easy to Install and Secure VPN Software that Respects your Privacy

Author image
Rogier Spoor

3 min read

Going online on unknown Internet hotspots - whether at a restaurant, an airport or in a restaurant - isn't actually very safe or secure for users. This is due to the open character of hotspots which makes it easy to impersonate legitimate hotspots and eavesdrop on traffic - or even serve malware. T…

Article tags:

0 Likes are disabled for this article.
0
Passive Observations of Large DNS Service

Passive Observations of Large DNS Service

Author image
Wouter de Vries

5 min read

In 2009, Google launched its Public DNS service, with its characteristic IP address 8.8.8.8. Since then, this service has grown to be the largest and most well-known DNS service in existence. Due to the centralisation that is caused by public DNS services, large content delivery networks (CDNs), su…

Article tags:

2 Likes are disabled for this article.
1
Sunrise DNS-over-TLS! Sunset DNSSEC?

Sunrise DNS-over-TLS! Sunset DNSSEC?

Author image
Willem Toorop

11 min read

Is DNSSEC still needed when you get your DNS over TLS? DNSSEC's original design goals could also be met in a future DoT-only world. However, DNSSEC's aspirations have moved on with DANE. Unfortunately DNSSEC and DANE are hardly ever available at end-user devices. DoT brings liable delivery of DNS, …

Article tags:

0 Likes are disabled for this article.
0
CrypTech – Next Steps Towards a Safer Internet

CrypTech – Next Steps Towards a Safer Internet

Author image
Phil Roberts

4 min read

The main goal of CrypTech is to create an open-source design for a hardware cryptographic engine for Hardware Security Modules (HSMs). At the same time it also provides a associated reference implementation that allows anyone to develop, deploy and audit a secure, low-cost cryptographic engine in t…

Article tags:

0 Likes are disabled for this article.
0
HE_BGP_1.png

Monitoring BGP Anomalies on the Internet

Author image
Martin Winter

5 min read

There are many flavours of BGP hijacks, misconfigurations or outdated implementations. Here are some examples and tips how to verify your announcements.

Article tags:

0 Likes are disabled for this article.
0
An Update on Securing BGP

An Update on Securing BGP

Author image
Geoff Huston

22 min read

One way or another we’ve been working on various aspects of securing the Internet’s inter-domain routing system for many years.

Article tags:

0 Likes are disabled for this article.
1
Detection of Peering Infrastructure Outages Based on BGP Communities

Detection of Peering Infrastructure Outages Based on BGP Communities

Author image
Vasileios Giotsas

8 min read

Networks rely increasingly on Internet Exchange Points (IXPs) and carrier-neutral interconnection facilities that enable dense localised peering connectivity to handle the massive traffic exchange between clients and servers.

Article tags:

0 Likes are disabled for this article.
0
ARTEMIS: Neutralising BGP Hijacking Within a Minute

ARTEMIS: Neutralising BGP Hijacking Within a Minute

Author image
Vasileios Kotronis

9 min read

BGP prefix hijacking is a persistent threat against Internet organisations, attributed to a lack of authorisation and authentication mechanisms in the inter-domain routing system. ARTEMIS (Automatic and Real-Time dEtection and MItigation System) is a defence system against BGP prefix hijacking, whi…

Article tags:

0 Likes are disabled for this article.
11

Showing 892 article(s)