Banner image

Network Operations

All articles

How to Run and Protect an Email Server on IPv6

How to Run and Protect an Email Server on IPv6

Author image
Jan Zorz

2 min read

A new RIPE Best Current Operational Practices document is in the making. Please contribute your expertise!

Article tags:

0 Likes are disabled for this article.
4
Image1.png

IPv6 in Enterprise Client Networks

Author image
Wilhelm Boeddinghaus

8 min read

The transition to IPv6 is well underway. Most service providers have enabled IPv6 and run dual-stack networks offering their services in IPv4 and IPv6. There have been many talks about IPv6 in backbone networks, in residential networks and at peering points.

Article tags:

0 Likes are disabled for this article.
4
RIPEAtlasInfrastructure.png

RIPE Atlas Architecture - How We Manage Our Probes

Author image
Robert Kisteleki

7 min read

In this article we will give some insights into the overall architecture of the RIPE Atlas network and how we manage secure communication with our probe flock.

Article tags:

0 Likes are disabled for this article.
2
Let's talk about RFC 6980

Let's talk about RFC 6980

Author image
Jacky Hammer

7 min read

Corresponding to my talk at DENOG 9, this article covers the topic of whether different operating systems have correctly implemented RFC 6980.

Article tags:

0 Likes are disabled for this article.
3
Internet Protocols are Changing

Internet Protocols are Changing

Author image
Mark Nottingham

12 min read

When the Internet started to become widely used in the 1990s, most traffic used just a few protocols: IPv4 routed packets, TCP turned those packets into connections, SSL (later TLS) encrypted those connections, DNS named hosts to connect to, and HTTP was often the application protocol using it all.

Article tags:

0 Likes are disabled for this article.
0
Modified-image.png

IPv6 Addresses, Security and Privacy

Author image
Johanna Ullrich

10 min read

The choice of the IPv6 address format impacts a host's security and privacy. This article discusses this impact, highlights how current address formats deal with matters of security and privacy, and pinpoints shortcomings in today's addressing mechanisms.

Article tags:

0 Likes are disabled for this article.
0
Join APNIC's IPv6 Hackathon

Join APNIC's IPv6 Hackathon

Author image
Vesna Manojlovic

4 min read

APNIC is hosting its first hackathon event on 23 - 25 February 2018, in Kathmandu, Nepal, co-located with the APRICOT conference. Participants will work together on finding creative new ways to help promote IPv6 adoption and deployment.

Article tags:

0 Likes are disabled for this article.
0
DNS TTL Violations in the Wild - Measured with RIPE Atlas

DNS TTL Violations in the Wild - Measured with RIPE Atlas

Author image
Giovane Moura

10 min read

DNS TTL violations is a controversial topic. It basically means a resolver overrides a TTL value provided by an authoritative server, and then serving its clients with this value. In this post, we analyse if this is happening in the wild.

Article tags:

0 Likes are disabled for this article.
5

Showing 892 article(s)