Banner image

Network Operations

All articles

Orange Blacklisting: A Case for Measuring Censorship

Orange Blacklisting: A Case for Measuring Censorship

Author image
Stéphane Bortzmeyer

2 min read

On 17 October 2016, a website hosted by the French Ministry of the Interior went offline when a large number of customers of the Internet service provider, Orange, were redirected to the site. The problem occurred after Google, Wikipedia and cloud provider OVH were mistakenly placed on a terrorism …

Article tags:

0 Likes are disabled for this article.
1
DDoS_Olympics.png

Defending the Olympics from DDoS

Author image
Mirjam Kühne

7 min read

Please read this guest post by Tony Scheid about fighting Distributed Denial of Service (DDoS) attacks during the Olympics in Rio de Janeiro.

Article tags:

0 Likes are disabled for this article.
0
Supporting IPv6 Deployment Through Policy

Supporting IPv6 Deployment Through Policy

Author image
Marco Schmidt

4 min read

It was about one year ago that the RIPE community reached consensus on a policy proposal that introduced additional criteria for initial IPv6 allocations. We thought it was time to look back at the origins of this proposal and see how the change has worked out since.

Article tags:

0 Likes are disabled for this article.
0
DNSSEC and ECDSA

DNSSEC and ECDSA

Author image
Geoff Huston

22 min read

Is the elliptical curve cryptographic algorithm (ECDSA) a viable crypto algorithm for use in DNSSEC today? And what has changed over the last two years?

Article tags:

0 Likes are disabled for this article.
1
All Quiet in the IPv4 Internet?

All Quiet in the IPv4 Internet?

Author image
Philipp Richter

10 min read

In 2016, IPv4 exhaustion is on everyone’s lips: four out of five Regional Internet Registries have run out of freely available address space.

Article tags:

0 Likes are disabled for this article.
2
What Do Network Operators Sell to Each Other?

What Do Network Operators Sell to Each Other?

Author image
Uta Meier-Hahn

12 min read

Comparisons rarely work. They never fit properly; they almost always lead away from the topic. And the audience‘s attention is lost in unimportant details. Therefore, writers do themselves few favours when they use comparisons as stylistic tools. I once read that in a book about speech writing (Fra…

Article tags:

0 Likes are disabled for this article.
0
Announcing the IXP Tools Hackathon

Announcing the IXP Tools Hackathon

Author image
Suzanne Taylor

7 min read

The RIPE NCC is hosting a hackathon focused on developing tools for Internet Exchange Points. Come participate!

Article tags:

0 Likes are disabled for this article.
0
IPv4-only RIPE Atlas Anchors Now Supported

IPv4-only RIPE Atlas Anchors Now Supported

Author image
Suzanne Taylor

2 min read

Until now, native IPv4 and IPv6 has been one of the conditions of hosting a RIPE Atlas anchor. However, we realise that IPv6 simply isn't available in some would-be anchor hosts' ASNs. As a result, we've decided to support IPv4-only anchors.

Article tags:

0 Likes are disabled for this article.
6
Detecting IXPs in Traceroute Paths Using traIXroute

Detecting IXPs in Traceroute Paths Using traIXroute

Author image
George Nomikos

8 min read

traIXroute is a tool that detects whether and where a traceroute path crosses an Internet Exchange Point (IXP). It uses data from multiple sources and advanced criteria to verify IXP crossings to deal with problems due to replies from third-party interfaces or inaccuracies in the available data abo…

Article tags:

0 Likes are disabled for this article.
1
DNS Privacy

DNS Privacy

Author image
Geoff Huston

16 min read

The DNS is normally a relatively open protocol that smears its data (which is your data and mine too!) far and wide. Little wonder that the DNS is used in many ways, not just as a mundane name resolution protocol, but as a data channel for surveillance and as a common means of implementing various …

Article tags:

0 Likes are disabled for this article.
0

Showing 936 article(s)