Crashing the party — vulnerabilities in RPKI RP software
Guest Post: Prefix hijacks are devastating to Internet stability and security.
View ArticleUseful IP geo resources
Understanding geolocation's mechanics and sources is beneficial.
View ArticleOpinion: Digital sovereignty and standards
Is digital sovereignty challenged by the Internet's standardization processes?
View Article[Podcast] DELEG — in-band DNS delegation
Geoff Huston discusses a proposed new way to manage the DNS mechanisms for delegation.
View ArticleSMTP smuggling — spoofing emails worldwide
Guest Post: Introducing a novel technique for email spoofing.
View ArticleImproving Regional Internet Registry alignment in the RPKI space
Working toward a robust, coordinated, and secure RPKI service.
View ArticleKeyTrap
Just how 'devastating' is the Keytrap vulnerability? How it works, and what the response has been.
View ArticleOne checklist at a time: Towards simplifying satellite Internet access in the...
Guest Post: Comprehensive checklist aims to revolutionize satellite Internet access in the Asia Pacific.
View ArticleIPv6, DNS, and truncation in UDP
Measuring DNS resolver compliance with UDP response truncation standards in an IPv6-only DNS server environment.
View ArticleNTP Pool: The Internet timekeeper
Guest Post: How does the NTP Pool map clients to NTP servers and how can it be improved?
View ArticleThe end of the (IPv4) world is not nigh… yet
Reducing reliance on IPv4 is the goal. For some governments, this goal is significant enough to warrant action.
View ArticleThe Internet landscape of South Korea and KRNOG update
Guest Post: Strategic planning leads to remarkable Internet accessibility and usage.
View ArticleAs the balance of security controls shifts, where does responsibility rest?
Guest Post: Increasing encryption online impedes existing methods of detecting malicious traffic. How will industry, standards, and policy settle this dilemma?
View Article[Podcast] DNS-OARC’s many faces
DNS-OARC's president, Phil Regnauld, discusses the three faces of DNS-OARC — the community, tools, and DITL collection.
View ArticleDelay Tolerant Networking performance
Guest Post: Delay Tolerant Networking over heterogeneous Internetworks must be engineered to achieve peak performance. What can be done?
View ArticleWhen it’s not DNS, it’s probably NTP
An intriguing detective story about debugging a chain of problems.
View ArticleAutomated assurance on a path to becoming practical
Guest Post: Cloud native architecture is a game changer for security at scale. How long before we see automation through attestation, built-in at scale?
View ArticleSmargaft harnesses EtherHiding for stealthy C2 hosting
Guest Post: New botnet uses the Binance Smart Chain to host command and control servers and infect shell scripts like a virus to achieve persistence.
View Article[Podcast] Digital sovereignty and standards
Geoff Huston discusses the EU taking a direct role in the IETF standards development process.
View Article