
IPv6 Flow Label: Misuse in Hashing
• 7 min read
When RFC1883 was published in 1995 it marked not the end of the process that produced the IPv6 protocol architecture, but rather was a milestone in the evolution of the IPv6 protocol.
• 7 min read
When RFC1883 was published in 1995 it marked not the end of the process that produced the IPv6 protocol architecture, but rather was a milestone in the evolution of the IPv6 protocol.
• 2 min read
A new RIPE Best Current Operational Practices document is in the making. Please contribute your expertise!
Based in Berlin
Wilhelm has worked for more than 20 years in the networking area. Today he is a consultant for networking and IPv6. More
• 8 min read
The transition to IPv6 is well underway. Most service providers have enabled IPv6 and run dual-stack networks offering their services in IPv4 and IPv6. There have been many talks about IPv6 in backbone networks, in residential networks and at peering points.
For many years I have been the leader of the Research and Development team at the RIPE NCC leading a dedicated team of thinkers to support the RIPE community by providing network research, data analysis and prototype tool development and services including RIPE Atlas and RIPEstat. As of 2023, I'm … More
• 7 min read
In this article we will give some insights into the overall architecture of the RIPE Atlas network and how we manage secure communication with our probe flock.
Based in Germany
Hi, I'm Jacky. Located in the vast and beautiful north of Germany - also known as Schleswig-Holstein - I'm a network architect with a variegated background in IT Ops, SecOps and agile management. Currently, my main focus lies in developing IPv6 strategies and architecture for one of the largest German … More
• 7 min read
Corresponding to my talk at DENOG 9, this article covers the topic of whether different operating systems have correctly implemented RFC 6980.
Based in Melbourne, Australia
I am a member of the Internet Architecture Board, and co-chair the IETF QUIC and HTTP Working Groups. More
• 12 min read
When the Internet started to become widely used in the 1990s, most traffic used just a few protocols: IPv4 routed packets, TCP turned those packets into connections, SSL (later TLS) encrypted those connections, DNS named hosts to connect to, and HTTP was often the application protocol using it all.
Based in Vienna, Austria
I am a senior researcher at SBA Research, a research center focusing on security in Vienna, Austria. My research interests include network security (especially IPv6) and cloud security, and raising awareness for security and privacy in traditional engineering. More
• 10 min read
The choice of the IPv6 address format impacts a host's security and privacy. This article discusses this impact, highlights how current address formats deal with matters of security and privacy, and pinpoints shortcomings in today's addressing mechanisms.
Vesna Manojlovic is Community Builder at RIPE NCC. Vesna joined the RIPE NCC as a Trainer in 1999. In 2003, she took responsibility for developing and delivering advanced courses, such as RPSL, Routing Registry, DNSSEC and IPv6. In 2008, she lead efforts to establish IPv6 RIPEness as a measure of … More
• 4 min read
APNIC is hosting its first hackathon event on 23 - 25 February 2018, in Kathmandu, Nepal, co-located with the APRICOT conference. Participants will work together on finding creative new ways to help promote IPv6 adoption and deployment.
Based in Amsterdam (NL)
Former manager of the Global Information Infrastructure team at the RIPE NCC. More
• 2 min read
We are starting to migrate the RIPE NCC RIS route collectors to the new data collection architecture.
Based in Arnhem, The Netherlands
Giovane is a Data Scientist with SIDN Labs (.nl registry) and a Assistant Professor at TU Delft, in the Netherlands. He works on security and Internet measurements research projects. You can reach him at http://giovane-moura.nl/ More
• 10 min read
DNS TTL violations is a controversial topic. It basically means a resolver overrides a TTL value provided by an authoritative server, and then serving its clients with this value. In this post, we analyse if this is happening in the wild.