You are here: Home > Publications > RIPE Labs > Security

Security

Adam Castle — 24 Feb 2014
Counting DNSSEC
Counting DNSSEC
Geoff Huston — 24 Sep 2012

It is possible to measure how well we are doing with DNSSEC? How many of the DNS resolvers will now perform DNSSEC validation of a domain name? How many of the Internet's user population are using these DNSSEC-validating resolvers? In this article we will explore a way to answer these questions, and provide some measures that describe which countries are well advanced in their use of DNSSEC deployment, and which are falling behind.… Read more

Hacking Away at the Internet's Security
Hacking Away at the Internet's Security
Geoff Huston — 20 Sep 2011

The front page story of the September 13 2011 issue of the International Herald Tribune said it all: "Iranian activists feel the chill as hacker taps into e-mails." The news story relates how a hacker has "sneaked into the computer systems of a security firm on the outskirts of Amsterdam" and then "created credentials that could allow someone to spy on Internet connections that appeared to be secure." According to this news report this incident punched a hole in an online security mechanism that is trusted by hundreds of millions of Internet users all over the network.… Read more

Tags: security
DNSSEC Deployment Today
DNSSEC Deployment Today
Wolfgang Nagele — 30 Aug 2011

The RIPE NCC has been signing its zones since 2005. Other operators waited for the root to be signed. And signing the root zone in June 2010 clearly encouraged others to deploy DNSSEC. In this article we describe the status of those zones maintained by the RIPE NCC and give an overview of the global deployment of DNSSEC.… Read more

Measuring DNS Transfer Sizes - First Results
Daniel Karrenberg — 04 Feb 2010

Here are the first results of our DNS transfer size measurements. We are interested to determine any possible problems for users of K-root once it starts giving DNSSEC responses to resolvers that request them. DNSSEC responses are significantly larger than current responses. We are interested to learn if these larger responses would reach the resolvers. … Read more

Document Actions