You are here: Home > Publications > RIPE Labs > RIPE Labs


Site Administrator — 18 Jul 2013

What Do Network Operators Sell to Each Other?

Comparisons rarely work. They never fit properly; they almost always lead away from the topic. And the audience‘s attention is lost in unimportant details. Therefore, writers do themselves few favours when they use comparisons as stylistic tools. I once read that in a book about speech writing (Franz, 2015). But there is one exception: the remote comparison. The further away the object of comparison, the better. The remote comparison is intended to show how absurd a situation is. The market at the core of the Internet is like a movie without a title.

What Do Network Operators Sell to Each Other? - Read More…

Detecting IXPs in Traceroute Paths Using traIXroute

traIXroute is a tool that detects whether and where a traceroute path crosses an Internet Exchange Point (IXP). It uses data from multiple sources and advanced criteria to verify IXP crossings to deal with problems due to replies from third-party interfaces or inaccuracies in the available data about IP addresses assigned to IXPs. These problems can mislead simple heuristics, based solely on the IP address prefixes allocated to IXPs, for the inference of IXP crossings.

Detecting IXPs in Traceroute Paths Using traIXroute - Read More…

EuroSSIG: A Deep Dive into the World of Internet Governance

EuroSSIG 2016, held in Meissen, Germany from 16-23 July, gathered 30 fellows and 30 faculty members together for an intensive week-long introduction to the topic of Internet governance. This was also the year it celebrated its 10th anniversary. The RIPE NCC, which is one of many sponsors, sent two staff as fellows and one faculty member. Below are some impressions.

EuroSSIG: A Deep Dive into the World of Internet Governance - Read More…

DNS Privacy

The DNS is normally a relatively open protocol that smears its data (which is your data and mine too!) far and wide. Little wonder that the DNS is used in many ways, not just as a mundane name resolution protocol, but as a data channel for surveillance and as a common means of implementing various forms of content access control. But all this is poised to change. Now that the Snowden files have sensitized us to the level of such activities, we have become acutely aware that many of our tools are just way too trusting, way too chatty, and way too easily subverted. First and foremost in this collection of vulnerable tools is the Domain Name System.

DNS Privacy - Read More…

Operator Level DNS Hijacking

Following my recent research on DNS hijacking and the cases I have personally observed, I wondered whether this is a common practice among the operators. With the help of RIPE Atlas, I started to think of a solution to figure out whether such practice is widespread in other areas of the world.

Operator Level DNS Hijacking - Read More…

Document Actions