Banner image

Network Operations

All articles

european_rp.jpg

Understanding the European Resolver Policy

Author image
Andrew Campling

5 min read

The European Resolver Policy is intended to provide reassurance to end-users and other stakeholders that personal data gained in the operation of DNS resolution services will not be misused. In this guest article, Andrew Campling talks about the aims and benefits of the policy.

Article tags:

30 Likes are disabled for this article.
6
route_around

Does The Internet Route Around Damage? - Edition 2021

Author image
Emile Aben

7 min read

On 23 March 2021, LINX London experienced an outage. As this is one of the very large Internet Exchange Points, this is an interesting case to study in more depth in order to see what we can learn about Internet robustness.

Article tags:

41 Likes are disabled for this article.
0
as3333_rov.jpg

RPKI and AS3333 or “How We Eat Our Own Dog Food”

Author image
Nathalie Trenaman

4 min read

Route Origin Validation (ROV) is a mechanism by which route advertisements can be authenticated as originating from an expected autonomous system (AS). With the RIPE NCC all set to perform ROV on AS3333, Nathalie Trenaman talks about why we've held back so far, and why we're now ready to get on wit…

Article tags:

51 Likes are disabled for this article.
3
Trusted Assurance Simplified

Trusted Assurance Simplified

Author image
Kathleen Moriarty

5 min read

In the third of this series of guest posts, Kathleen Moriarty talks about the importance of posture assessment - the process of evaluating organisation or system security - and looks at solutions for simplifying that process that could help organisations achieve higher levels of trusted assurance.

Article tags:

13 Likes are disabled for this article.
0
new_dot.png

Measuring DNS over TLS from the Edge: Adoption, Reliability and Response Times

Author image
Trinh Viet Doan

9 min read

DNS over TLS (DoT) is an extension to the DNS over UDP/53 (Do53) protocol, which provides additional confidentiality to the DNS messages between client and server. Since its standardisation in RFC7858 in 2016, DoT has gained increasing support by various DNS services as well as operating systems. …

Article tags:

28 Likes are disabled for this article.
0
Trufflehunter: A New Tool to Sniff Out DNS Usage

Trufflehunter: A New Tool to Sniff Out DNS Usage

Author image
Audrey Randall

4 min read

Measuring domain usage on centralised public DNS resolvers can be very useful, but it's also pretty hard to do. Trufflehunter is a new open source tool that puts snooping techniques to good use in order to accurately estimate the popularity of domains.

Article tags:

19 Likes are disabled for this article.
0
Screenshot 2021-04-12 at 18.05.01.png

The PeeringDB Survey 2020 - Results and Roadmap

Author image
Leo Vegoda

3 min read

With the results of the PeeringDB survey 2020 gathered and analysed, Leo Vegoda takes a look at how your feedback has helped the team build their roadmap for 2021.

Article tags:

1 Likes are disabled for this article.
0
Where Does Zero Trust Begin and Why is it Important?

Where Does Zero Trust Begin and Why is it Important?

Author image
Kathleen Moriarty

11 min read

In the second of a series of guests posts on information security, Kathleen Moriarty of the Center for Internet Security (CIS) takes a close look at the benefits of zero trust architectures and what their increased adoption means for the industry.

Article tags:

15 Likes are disabled for this article.
0
The State of IPv6 Support on the Tor Network

The State of IPv6 Support on the Tor Network

Author image
Gaba Rodriguez

3 min read

The team behind the Tor Project has been making good on its goal to provide improved IPv6 support on the Tor network. Here's an update!

Article tags:

5 Likes are disabled for this article.
1
Transforming Information Security to Secure Businesses

Transforming Information Security to Secure Businesses

Author image
Kathleen Moriarty

4 min read

In the first of a series of guest posts, Kathleen Moriarty of the Center for Internet Security (CIS) examines five vital trends that are guiding the industry toward better information security.

Article tags:

10 Likes are disabled for this article.
0

Showing 889 article(s)