Quantcast
Browsing all 240 articles
Browse latest View live

Crashing the party — vulnerabilities in RPKI RP software

Guest Post: Prefix hijacks are devastating to Internet stability and security.

View Article


Useful IP geo resources

Understanding geolocation's mechanics and sources is beneficial.

View Article


Opinion: Digital sovereignty and standards

Is digital sovereignty challenged by the Internet's standardization processes?

View Article

[Podcast] DELEG — in-band DNS delegation

Geoff Huston discusses a proposed new way to manage the DNS mechanisms for delegation.

View Article

SMTP smuggling — spoofing emails worldwide

Guest Post: Introducing a novel technique for email spoofing.

View Article


Improving Regional Internet Registry alignment in the RPKI space

Working toward a robust, coordinated, and secure RPKI service.

View Article

KeyTrap

Just how 'devastating' is the Keytrap vulnerability? How it works, and what the response has been.

View Article

One checklist at a time: Towards simplifying satellite Internet access in the...

Guest Post: Comprehensive checklist aims to revolutionize satellite Internet access in the Asia Pacific.

View Article


IPv6, DNS, and truncation in UDP

Measuring DNS resolver compliance with UDP response truncation standards in an IPv6-only DNS server environment.

View Article


NTP Pool: The Internet timekeeper

Guest Post: How does the NTP Pool map clients to NTP servers and how can it be improved?

View Article

The end of the (IPv4) world is not nigh… yet

Reducing reliance on IPv4 is the goal. For some governments, this goal is significant enough to warrant action.

View Article

The Internet landscape of South Korea and KRNOG update

Guest Post: Strategic planning leads to remarkable Internet accessibility and usage.

View Article

As the balance of security controls shifts, where does responsibility rest?

Guest Post: Increasing encryption online impedes existing methods of detecting malicious traffic. How will industry, standards, and policy settle this dilemma?

View Article


[Podcast] DNS-OARC’s many faces

DNS-OARC's president, Phil Regnauld, discusses the three faces of DNS-OARC — the community, tools, and DITL collection.

View Article

Delay Tolerant Networking performance

Guest Post: Delay Tolerant Networking over heterogeneous Internetworks must be engineered to achieve peak performance. What can be done?

View Article


When it’s not DNS, it’s probably NTP

An intriguing detective story about debugging a chain of problems.

View Article

Automated assurance on a path to becoming practical

Guest Post: Cloud native architecture is a game changer for security at scale. How long before we see automation through attestation, built-in at scale?

View Article


DNS topics at IETF 119

Current and competing work items in DNS at the IETF.

View Article

Smargaft harnesses EtherHiding for stealthy C2 hosting

Guest Post: New botnet uses the Binance Smart Chain to host command and control servers and infect shell scripts like a virus to achieve persistence.

View Article

[Podcast] Digital sovereignty and standards

Geoff Huston discusses the EU taking a direct role in the IETF standards development process.

View Article
Browsing all 240 articles
Browse latest View live