Banner image

Network Operations

All articles

Resolvers Fig.2

The Resolvers We Use

Author image
Geoff Huston

23 min read

The Internet’s Domain Name System is a modern day miracle. It may not represent the largest database that has ever been built, but nevertheless it’s truly massive. And even if it’s not the largest database that’s ever been built, it’s perhaps one of the more intensively used. The DNS is consulted e…

Article tags:

0 Likes are disabled for this article.
0
Who's Watching fig.2

Who's Watching

Author image
Geoff Huston

28 min read

Much has been said over the pasts year or so about various forms of cyber spying. The United States has accused the Chinese of cyber espionage and stealing industrial secrets. A former contractor to the United States' NSA, Edward Snowden, has accused various US intelligence agencies of systematic e…

Article tags:

0 Likes are disabled for this article.
1
ECDSA and DNSSEC

ECDSA and DNSSEC

Author image
Geoff Huston

23 min read

Yes, that's a cryptic topic, even for an article that addresses matters of the use of cryptographic algorithms, so congratulations for getting even this far! This is a report of an experiment conducted in September and October 2014 by the authors to measure the extent to which deployed DNSSEC-valid…

Article tags:

0 Likes are disabled for this article.
0
Privacy and Security - Five Objectives

Privacy and Security - Five Objectives

Author image
Geoff Huston

7 min read

It has been a very busy period in the domain of computer security. With "shellshock", "heartbleed" and NTP monlink adding to the background of open DNS resolvers, port 445 viral nasties, SYN attacks and other forms of vulnerability exploits, it's getting very hard to see the forest for the trees. W…

Article tags:

0 Likes are disabled for this article.
2
Secure Internet Routing with RPKI

Secure Internet Routing with RPKI

Author image
Remy de Boer

6 min read

Last week we improved the security of our routing infrastructure by implementing RPKI (Resource Public Key Infrastructure), a technology that can be used to secure the Internet routing infrastructure. RPKI was the topic of my Master's thesis and in this article I am trying to convince you to use th…

Article tags:

0 Likes are disabled for this article.
2
K-root map

Experiment Proposal to Improve K-root

Author image
Suzanne Taylor

4 min read

We used RIPE Atlas to measure latency times to K-root, and we believe we can improve those times by adding new nodes to K-root in strategic locations. Here, we propose the idea of developing an experiment that would let us measure this potential improvement.

Article tags:

0 Likes are disabled for this article.
0
LISPmob: a Flexible LISP Implementation

LISPmob: a Flexible LISP Implementation

Author image
Alberto Rodriguez-Natal

12 min read

The Locator/ID Separation Protocol (LISP) decouples identity from location on the current IP addresses by creating two separate namespaces. The LISPmob project aims to bring a full-featured LISP open-source implementation to Linux-flavoured systems.

Article tags:

0 Likes are disabled for this article.
4
Overview with ExaBGP

Building The Next Generation RIS Route Collectors

Author image
Wouter Miltenburg

7 min read

This is the second part of a research project investigating the possible replacement of the current Remote Route Collectors (RRC) used for the Routing Information Services (RIS). In the second phase we developed a prototype based on the requirements determined in the first phase. Both parts of …

Article tags:

0 Likes are disabled for this article.
2
Propagation of Longer-than-/24 IPv4 Prefixes

Propagation of Longer-than-/24 IPv4 Prefixes

Author image
Emile Aben

8 min read

Under ARIN's Number Resource Policy Manual (NRPM) Section 4.10, the IPv4 address block 23.128/10 is reserved for allocations and assignments dedicated to facilitate IPv6 deployment. The maximum allocation size is a /24; the minimum allocation size is a /28. There has been much discussion on the NAN…

Article tags:

1 Likes are disabled for this article.
7
k-root IPv6 measurements

Time Warner Cable Outage

Author image
Emile Aben

8 min read

The Time Warner Cable network suffered an outage on 27 August 2014 between approximately 9:40 and 10:55 UTC. We looked at some interesting details of this outage using RIS and RIPE Atlas.

Article tags:

0 Likes are disabled for this article.
0

Showing 912 article(s)