Banner image

Network Operations

All articles

Better Crypto - Applied Cryptography Hardening

Better Crypto - Applied Cryptography Hardening

5 min read

This project aims at creating a simple, copy & paste-able HOWTO for secure crypto settings of the most common services (webservers, mail, ssh, etc.). It was presented at the recent RIPE 68 Meeting in Warsaw. For those of you who couldn't attend the meeting, here is summary of the talk.

Article tags:

4 Likes are disabled for this article.
2
Survey on Mitigation and Response of Network Attacks

Survey on Mitigation and Response of Network Attacks

2 min read

Network-based attacks pose a strong threat to the Internet landscape. In my PhD I am investigating different approaches on attack mitigation and response. Yet, a clear understanding of how mitigation and response is performed in commercial networks is missing. Hence, this survey aims at gaining ins…

Article tags:

0 Likes are disabled for this article.
0
Sending and Receiving Emails over IPv6

Sending and Receiving Emails over IPv6

Author image
Mirjam Kühne

16 min read

The change to IPv6 creates new challenges to keep spam out of email. Because of the sheer size of the IPv6 space, it seems more efficient to build a domain-blocking and reputation system rather than an IP-blocking system. But how do we ensure emails over IPv6 have an authenticated domain?

Article tags:

3 Likes are disabled for this article.
2
Modifications to the IP Analyser to Reflect New Policy

Modifications to the IP Analyser to Reflect New Policy

Author image
Alex Band

5 min read

We are in the process of implementing the policy regarding Post Depletion Adjustment of Procedures (2013-03). In this article we will give an overview of the changes we are making to the IP Analyser web interface and API, so you can accommodate your scripts and workflow. We intend to implement thes…

Article tags:

0 Likes are disabled for this article.
0
BGP Leaks in Indonesia

BGP Leaks in Indonesia

Author image
Rene Wilhelm

5 min read

In this article we are looking in some more detail at BGP leak in Indonesia and illustrate how RIPEstat visualisations can help to assess the impact.

Article tags:

0 Likes are disabled for this article.
0
Timeline for Phasing Out the Old TTM-based DNSMON

Timeline for Phasing Out the Old TTM-based DNSMON

Author image
Romeo Zwart

3 min read

The RIPE NCC announced a new version of DNSMON, available for testing by the public, in March 2014. We are now planning the removal of the old DNSMON.

Article tags:

0 Likes are disabled for this article.
0
NTP for Evil

NTP for Evil

Author image
Geoff Huston

23 min read

In this article Geoff Huston describes attacks that involve the Network Time Protocol (NTP) and what can be done to defend against them.

Article tags:

0 Likes are disabled for this article.
3
A RIPE Atlas View of Internet Meddling in Turkey

A RIPE Atlas View of Internet Meddling in Turkey

Author image
Emile Aben

5 min read

In RIPE Atlas we see latencies to Google's 8.8.8.8 DNS resolver service drop in Turkey. We expect this is due to hijacking of the 8.8.8.8 service. Our measurements show a timeline of these events. Note that even when the Twitter ban had been lifted, RIPE Atlas still saw fake 8.8.8.8 DNS service…

Article tags:

0 Likes are disabled for this article.
7

Showing 906 article(s)