Banner image

Network Operations

All articles

DNSSEC and ECDSA

DNSSEC and ECDSA

Author image
Geoff Huston

22 min read

Is the elliptical curve cryptographic algorithm (ECDSA) a viable crypto algorithm for use in DNSSEC today? And what has changed over the last two years?

Article tags:

0 Likes are disabled for this article.
1
All Quiet in the IPv4 Internet?

All Quiet in the IPv4 Internet?

Author image
Philipp Richter

10 min read

In 2016, IPv4 exhaustion is on everyone’s lips: four out of five Regional Internet Registries have run out of freely available address space.

Article tags:

0 Likes are disabled for this article.
2
What Do Network Operators Sell to Each Other?

What Do Network Operators Sell to Each Other?

Author image
Uta Meier-Hahn

12 min read

Comparisons rarely work. They never fit properly; they almost always lead away from the topic. And the audience‘s attention is lost in unimportant details. Therefore, writers do themselves few favours when they use comparisons as stylistic tools. I once read that in a book about speech writing (Fra…

Article tags:

0 Likes are disabled for this article.
0
Announcing the IXP Tools Hackathon

Announcing the IXP Tools Hackathon

Author image
Suzanne Taylor

7 min read

The RIPE NCC is hosting a hackathon focused on developing tools for Internet Exchange Points. Come participate!

Article tags:

0 Likes are disabled for this article.
0
IPv4-only RIPE Atlas Anchors Now Supported

IPv4-only RIPE Atlas Anchors Now Supported

Author image
Suzanne Taylor

2 min read

Until now, native IPv4 and IPv6 has been one of the conditions of hosting a RIPE Atlas anchor. However, we realise that IPv6 simply isn't available in some would-be anchor hosts' ASNs. As a result, we've decided to support IPv4-only anchors.

Article tags:

0 Likes are disabled for this article.
6
Detecting IXPs in Traceroute Paths Using traIXroute

Detecting IXPs in Traceroute Paths Using traIXroute

Author image
George Nomikos

8 min read

traIXroute is a tool that detects whether and where a traceroute path crosses an Internet Exchange Point (IXP). It uses data from multiple sources and advanced criteria to verify IXP crossings to deal with problems due to replies from third-party interfaces or inaccuracies in the available data abo…

Article tags:

0 Likes are disabled for this article.
1
DNS Privacy

DNS Privacy

Author image
Geoff Huston

16 min read

The DNS is normally a relatively open protocol that smears its data (which is your data and mine too!) far and wide. Little wonder that the DNS is used in many ways, not just as a mundane name resolution protocol, but as a data channel for surveillance and as a common means of implementing various …

Article tags:

0 Likes are disabled for this article.
0
Is Your ISP Hijacking Your DNS Traffic?

Operator Level DNS Hijacking

Author image
Babak Farrokhi

3 min read

Following my recent research on DNS hijacking and the cases I have personally observed, I wondered whether this is a common practice among the operators. With the help of RIPE Atlas, I started to think of a solution to figure out whether such practice is widespread in other areas of the world.

Article tags:

0 Likes are disabled for this article.
4
Can You Make IPv6 Work Commercially?

Can You Make IPv6 Work Commercially?

Author image
Marco Hogewoning

6 min read

Large scale IPv6 deployments suggest that IPv6 is at least a technical success - the technology works. Now it's time to visit the other important question: does it work commercially? Does IPv6 really come with a positive business case? We are about to find out, if you help us... (for instance by f…

Article tags:

0 Likes are disabled for this article.
4
Is Your ISP Hijacking Your DNS Traffic?

Is Your ISP Hijacking Your DNS Traffic?

Author image
Babak Farrokhi

3 min read

You might not have noticed, but there are chances that your ISP is playing nasty tricks with your DNS traffic.

Article tags:

7 Likes are disabled for this article.
5

Showing 923 article(s)