Network Operations

All articles

All We Saw at SEE 11

All We Saw at SEE 11

Anastasiya Pak

5 min read

On 4-5 April, the South East Europe (SEE) Internet community gathered in the coastal town of Split, Croatia - the same country where we held the first SEE meeting over a decade ago. Over 100 participants from 19 countries joined to discuss developments in IPv6, BGP security, DNS, peering, IXPs, and…

Article tags:

45 You have liked this article 0 times.
0
The Joy of TXT

The Joy of TXT

Peter Lowe

10 min read

TXT records are perhaps the most flexible type of DNS records available - but have you ever wondered how they’re really used? To see if we can answer this, the TXT records of 1 million domains are examined to see if there’s any rhyme or reason as to how people employ this quirky, open-ended record …

Article tags:

44 You have liked this article 0 times.
3
More Next Steps in IPv6 Policy Work

More Next Steps in IPv6 Policy Work

Leo Vegoda

3 min read

The RIPE Address Policy Working Group is organising interim sessions to plan IPv6 policy discussions at RIPE 86 in Rotterdam. The purpose of these sessions is not to develop policy proposals. It is to define desired policy outcomes and set priorities.

Article tags:

3 You have liked this article 0 times.
0
The Resilience of the Internet in Ukraine - One Year On

The Resilience of the Internet in Ukraine - One Year On

Emile Aben

17 min read

In our earlier analysis of Ukraine back in March 2022, we looked at factors that contributed to the resilience of the country's Internet since the outbreak of the war. A little over a year on, we draw on data from RIPE Atlas and RIPE RIS to investigate what has changed.

Article tags:

28 You have liked this article 0 times.
0
SAV: Why Is Source Address Validation Still a Problem?

SAV: Why Is Source Address Validation Still a Problem?

Qasim Lone

13 min read

Despite being a known vulnerability for at least 25 years, source IP address spoofing remains a popular attack method for redirection, amplification and anonymity. Preventing these attacks requires that operators implement Source Address Validation (SAV) to ensure their networks filter packets with…

Article tags:

34 You have liked this article 0 times.
3
The Human Factor in the Geopolitics of the Internet

The Human Factor in the Geopolitics of the Internet

LOUIS PETINIAUD

20 min read

The Internet is a network of networks administered, controlled and shaped by humans. As such, it is as much affected by power relationships across the public and private actors as it, in turn, affects them. In this article, the team from GEODE explores the complex relations between the technical an…

Article tags:

42 You have liked this article 0 times.
0
Intercept and Inject: DNS Response Manipulation in the Wild

Intercept and Inject: DNS Response Manipulation in the Wild

Yevheniya Nosyk

6 min read

In November 2021, Internet users from Mexico lost access to whatsapp.net and facebook.com. By the time the event was reported, the underlying problem had already gone unnoticed for quite some time. Here, we present key takeaways from our analysis of the event - carried out with RIPE Atlas - and we …

Article tags:

40 You have liked this article 0 times.
0
Opinion: IP Leasing Should Become a Market Standard

Opinion: IP Leasing Should Become a Market Standard

Vincentas Grinius

8 min read

The policy of the Asia-Pacific Regional Internet Registry (APNIC) that does not accept IP leasing has been questioned during its recent meeting in conjunction with APRICOT. While each of the five global RIRs has its own policies regarding IP leasing, this opinion piece argues that the APNIC policy …

Article tags:

16 You have liked this article 0 times.
0
Next Steps in IPv6 Policy Work

Next Steps in IPv6 Policy Work

Leo Vegoda

2 min read

The RIPE Address Policy Working Group is organising interim sessions to plan IPv6 policy discussions at RIPE 86 in Rotterdam. The purpose of these sessions is not to develop policy proposals. It is to define desired policy outcomes and set priorities.

Article tags:

4 You have liked this article 0 times.
0
Navigating the Complexities of BGP: Enhancing Security, Visibility, and Operability

Navigating the Complexities of BGP: Enhancing Security, Visibility, and Operability

Radu Strelciuc

16 min read

Explore the concepts and tools needed to ensure the stability and reliability of BGP networks. With a focus on security, visibility, and operability, this article gives an overview of configuring BGP, a complex protocol used to build and maintain the Internet.

Article tags:

57 You have liked this article 0 times.
0

Showing 879 article(s)