Banner image

Measurements and Statistics

All articles

iStock-866994328

Crashing the Party – Vulnerabilities in RPKI Relying Party Software

Author image
Niklas Vogel

10 min read

RPKI adoption is on the rise. And that's a good thing. But as the number of networks deploying RPKI grows, so does the potential impact of vulnerabilities in its implementation. CURE is a novel fuzzing tool developed by ATHENE researchers to test vulnerabilities in RPKI Replying Party software.

Article tags:

94 Likes are disabled for this article.
0
keytrap

KeyTrap Algorithmic Complexity Attacks Exploit Fundamental Design Flaw in DNSSEC

Author image
Haya Schulmann

10 min read

KeyTrap - described by some as 'the worst attack on DNS ever discovered' - is capable of exhausting CPU resources and stalling widely used DNS implementations and public DNS providers, like Google Public DNS and Cloudflare. The research team from ATHENE explain how they discovered the attack.

Article tags:

90 Likes are disabled for this article.
1
reverse

The State of Reverse DNS

Author image
Arnold Dechamps

7 min read

Most people know DNS for the part that resolves a domain name to an IP address. Reverse DNS, as the name suggests, works the other way around, and is generally less talked about. The question is, when people do implement reverse DNS, are they taking steps to keep it secure?

Article tags:

137 Likes are disabled for this article.
4
iStock-185108335

Sanremo and Internet Traffic in Italy

Author image
Flavio Luciani

4 min read

The Sanremo Festival is the most important and prestigious music event in Italy, organised and broadcast live across the country by RAI, Italy's main public broadcaster. Flavio Luciani from Namex examines the week of the event from the perspective of an Internet eXchange Point.

Article tags:

35 Likes are disabled for this article.
0
iStock-1567067452

A BGP Side Effect of RPKI

Author image
Massimiliano Stucchi

10 min read

The BGP communities attribute, which usefully enables network operators to signal specific requests or information to nearby ASNs, also lets them signal RPKI status. But should they? Max Stucchi investigates the propagation of RPKI information in BGP communities.

Article tags:

59 Likes are disabled for this article.
0
middle_east_ixps

Unlocking Digital Growth: The Role of IXPs in the Middle East

Author image
Jad El Cham

4 min read

What does it take for an IXP to be successful? What requirements are these crucial bits of Internet infrastructure meant to fulfil? Do any of these questions have one-size-fits-all answers? A new report from the RIPE NCC explores all of the above and more in the context of Middle East IXPs.

Article tags:

59 Likes are disabled for this article.
2
1080x1080px_01_v03_Ripe-Labs-podcast_E-01 (2)

Jim Cowie: The Historical Record of the Internet

Author image
Alun Davies

2 min read

Understanding outages and shutdowns and how the Internet as a whole came to be vulnerable to - but also resilient against - these kinds of events requires more than a snapshot of things as they are today. In this episode, Jim Cowie talks about how historical measurement data can help us acquire a b…

Article tags:

101 Likes are disabled for this article.
0
rpki-client logo

Using Timestamps Inside RPKI Objects to Optimise RRDP-RSYNC Transport Switchovers

Author image
Job Snijders

13 min read

Tricks to help reduce bandwidth and CPU cycles for both RPKI Publication Point servers and RPKI validators when switching between RRDP and RSYNC transports, as implemented in rpki-client.

Article tags:

19 Likes are disabled for this article.
0
atlas_amsix_cover

Does the Internet Route Around Damage? - Edition 2023

Author image
Emile Aben

5 min read

On 22-23 November 2023, the Amsterdam Internet Exchange (AMS-IX) had an outage on their Amsterdam peering platform. As this is generally considered one of the largest IXPs on the planet, we looked into this event from the perspective of RIPE Atlas to see what it had to tell us about the robustness …

Article tags:

55 Likes are disabled for this article.
0
Screenshot 2023-11-23 at 11.36.19

Two Years of Selective Peering with RIS

Author image
Emile Aben

8 min read

The peering strategy for RIS has traditionally been an open one, geared towards maximising the number of peers. But over the past couple of years we've been working with a more selective approach that reduces redundancy and cost, while also helping make sure RIS provides a diverse view of global ro…

Article tags:

19 Likes are disabled for this article.
0

Showing 838 article(s)