Banner image

Network Operations

All articles

IoT Turning Evil

IoT Turning Evil

Author image
Ivana Tomic

7 min read

Internet of Things (IoT) emerged as a complex cyber-physical system that allows smart devices to sense the environment and modify it accordingly to enhance the way we work and live. The existence of such a large network of interconnected entities poses major security and privacy issues that prevent…

Article tags:

0 Likes are disabled for this article.
1
Geoff_fragmentation.png

Dealing with IPv6 Fragmentation in the DNS - Part 2

Author image
Geoff Huston

21 min read

The first part of this article looked at what happens when an authoritative DNS server delivers fragmented UDP responses to DNS resolvers using IPv6. Now we measured the packet drop rate when sending fragmented packets to IPv6 end hosts.

Article tags:

0 Likes are disabled for this article.
0
Echoes

Echoes

Author image
Stephen Strowes

4 min read

Recently, we spotted a network bug that had precisely the opposite of the intended effect.

Article tags:

17 Likes are disabled for this article.
0
Dealing with IPv6 Fragmentation in the DNS

Dealing with IPv6 Fragmentation in the DNS

Author image
Geoff Huston

30 min read

The IPv6 protocol introduced very few changes to its IPv4 predecessor. The major change was of course the expansion of the size of the IP source and destination address fields in the packet header from 32-bits to 128-bits. There were, however, some other changes that apparently were intended to sub…

Article tags:

0 Likes are disabled for this article.
0
Introducing NAT64 Checker

Introducing NAT64 Checker

Author image
Jan Zorz

6 min read

There has been much discussion about the need for IPv6 over the past decade and more, but with IPv4 addresses approaching exhaustion, this has seen an upsurge in IPv6 deployments over the past year. In particular, mobile operators are increasingly deploying IPv6-only in their consumer networks, whi…

Article tags:

0 Likes are disabled for this article.
18
When It Comes to Cybercrime, Can the RIPE NCC Help? Of Course We Can!

When It Comes to Cybercrime, Can the RIPE NCC Help? Of Course We Can!

Author image
Gerardo Viviers

5 min read

We've been working with law enforcement to help them tackle the ever-growing problem of cybercrime.

Article tags:

0 Likes are disabled for this article.
0
Join the RIPE NCC Hackathon Version 6

Join the RIPE NCC Hackathon Version 6

Author image
Vesna Manojlovic

8 min read

Together with Comcast and DKNOG, the RIPE NCC is organising our sixth hackathon, the topic of which will be IPv6! Our goals are to promote IPv6 in Denmark, come up with new and creative ways to visualise IPv6 measurements, and hack together the tools helpful for IPv6 deployment.

Article tags:

0 Likes are disabled for this article.
0
The Secrets of De-Peering

The Secrets of De-Peering

Author image
Uta Meier-Hahn

10 min read

There are many resources available to learn about Internet peering. But when it comes to de-peering, networkers are mostly left with their gut feeling.

Article tags:

0 Likes are disabled for this article.
2
SHA2017: Hackers' Camping, RIPE Topics

SHA2017: Hackers' Camping, RIPE Topics

Author image
Vesna Manojlovic

9 min read

Today begins the newest edition of four-yearly Dutch summer camping conferences for and by hackers: SHA2017. Since there is an overlap between topics and participants within the RIPE community, this is an invitation to the talks and workshops that might interest you.

Article tags:

0 Likes are disabled for this article.
0
Botnets: As We See Them in 2017

Botnets: As We See Them in 2017

Author image
Alireza Vaziri

8 min read

Year after year, botnets make impressive progress over counter-attack methods. Botmasters have deployed encryption and P2P connectivity to bots and we are always a step behind.

Article tags:

0 Likes are disabled for this article.
0

Showing 936 article(s)