Banner image

Network Operations

All articles

keytrap

KeyTrap Algorithmic Complexity Attacks Exploit Fundamental Design Flaw in DNSSEC

Author image
Haya Schulmann

10 min read

KeyTrap - described by some as 'the worst attack on DNS ever discovered' - is capable of exhausting CPU resources and stalling widely used DNS implementations and public DNS providers, like Google Public DNS and Cloudflare. The research team from ATHENE explain how they discovered the attack.

Article tags:

90 Likes are disabled for this article.
1
reverse

The State of Reverse DNS

Author image
Arnold Dechamps

7 min read

Most people know DNS for the part that resolves a domain name to an IP address. Reverse DNS, as the name suggests, works the other way around, and is generally less talked about. The question is, when people do implement reverse DNS, are they taking steps to keep it secure?

Article tags:

137 Likes are disabled for this article.
4
iStock-1567067452

A BGP Side Effect of RPKI

Author image
Massimiliano Stucchi

10 min read

The BGP communities attribute, which usefully enables network operators to signal specific requests or information to nearby ASNs, also lets them signal RPKI status. But should they? Max Stucchi investigates the propagation of RPKI information in BGP communities.

Article tags:

59 Likes are disabled for this article.
0
middle_east_ixps

Unlocking Digital Growth: The Role of IXPs in the Middle East

Author image
Jad El Cham

4 min read

What does it take for an IXP to be successful? What requirements are these crucial bits of Internet infrastructure meant to fulfil? Do any of these questions have one-size-fits-all answers? A new report from the RIPE NCC explores all of the above and more in the context of Middle East IXPs.

Article tags:

59 Likes are disabled for this article.
2
ai_writes

The LLM Misinformation Problem I Was Not Expecting

Author image
Kathleen Moriarty

5 min read

The prolific use of Artificial Intelligence Large Language Models (LLMs) present new challenges we must address and new questions we must answer. For instance, what do we do when AI is wrong?

Article tags:

61 Likes are disabled for this article.
3
podcast_cover

André Grilo: Ready or Not - Rethinking Cybersecurity for a Post-Quantum World

Author image
Anastasiya Pak

1 min read

Quantum technologies promise all kinds of fascinating possibilities, but they also come with risks. In this episode, André Grilo, founder and CEO of QuantumNova, talks about why we need to start investing in post-quantum cryptography to protect ourselves against post-quantum threats.

Article tags:

78 Likes are disabled for this article.
0
quantum_horizon

A Quantum-Safe Cryptography DNSSEC Testbed

Author image
Caspar Schutijser

7 min read

As the prospect of more powerful quantum computers looms on the digital horizon, questions emerge over the threat this might pose to many of the cryptographic functions used in Internet security. The team at SIDN Labs has been working to evaluate the impact of quantum-safe cryptography algorithms o…

Article tags:

33 Likes are disabled for this article.
1
rpki 2023

RPKI 2023 Review - Growth, Governments, and Innovation

Author image
Job Snijders

7 min read

Happy new year everyone! Having just closed chapter 2023 - let's look back at the previous year. In this article, I'll share some RPKI statistics, summarise highlights from the IETF standards development process, and reflect on emerging trends.

Article tags:

22 Likes are disabled for this article.
0
netnod_globe

Anycast DNS for the I–Root Service: 20 Years of 100% Availability

Author image
Lars-Johan Liman

5 min read

Lars-Johan Liman, Netnod's DNS nestor, makes a few personal reflections on the 20th anniversary of Netnod's deployment of anycast – a technology that is a crucial part of the infrastructure of Netnod's modern DNS services.

Article tags:

49 Likes are disabled for this article.
0
1080x1080px_01_v03_Ripe-Labs-podcast_E-01 (2)

Jim Cowie: The Historical Record of the Internet

Author image
Alun Davies

2 min read

Understanding outages and shutdowns and how the Internet as a whole came to be vulnerable to - but also resilient against - these kinds of events requires more than a snapshot of things as they are today. In this episode, Jim Cowie talks about how historical measurement data can help us acquire a b…

Article tags:

101 Likes are disabled for this article.
0

Showing 896 article(s)

Previous
1 ... 7 8 9 10 11 ... 90
Next