Banner image

Network Operations

All articles

How to Survive Scheduled DNS Maintenance

How to Survive Scheduled DNS Maintenance

4 min read

DNS has been in use on the Internet for more than 30 years — now it is time for its worldwide maintenance that shall, for the first time in the existence of DNS, require coordinated actions from all operators of DNS servers and DNSSEC validators. What actions do you need to take to survive?

Article tags:

0 Please read the article before liking.
0
20,000 Local Internet Registries - A Peek into the Future

20,000 Local Internet Registries - A Peek into the Future

Author image
Rene Wilhelm

12 min read

On 25 September 2018, the RIPE NCC passed the milestone of 20,000 Local Internet Registries (LIRs). We look at what's happened since the previous milestone of 15,000 LIRs and share our thoughts about the future: how much time is left for the IPv4 pool, and what are the prospects for membership deve…

Article tags:

0 Please read the article before liking.
0
Upstream Visibility: Monitor the Visibility of your Prefix

Upstream Visibility: Monitor the Visibility of your Prefix

Author image
Massimo Candela

6 min read

Upstream Visibility is the new tool produced by the Computer Network Research Group of Roma Tre in collaboration with the RIPE NCC. It is a web application which proposes a concise way of visualising interdomain routing data of a specified prefix.

Article tags:

1 Please read the article before liking.
4
Microsoft Making Progress Towards IPv6-only

Microsoft Making Progress Towards IPv6-only

Author image
Mirjam Kühne

5 min read

Following up from an earlier article, Veronika McKillop, network architect at Microsoft, describes how the organisation is making progress towards an IPv6-only network.

Article tags:

0 Please read the article before liking.
2
DNS_bj_3-1.png

Persistent DNS Connections for Reliability and Performance

Author image
Baptiste Jonglez

10 min read

For decades, the Domain Name System (DNS) has relied on UDP as its transport protocol of choice, mostly because of its simplicity. New transports such as DNS-over-TLS and DNS-over-HTTPS are now gaining popularity: they offer increased privacy while preventing the use of the DNS as a DDoS attack vec…

Article tags:

0 Please read the article before liking.
3
Let's Connect! Easy to Install and Secure VPN Software that Respects your Privacy

Let's Connect! Easy to Install and Secure VPN Software that Respects your Privacy

Author image
Rogier Spoor

3 min read

Going online on unknown Internet hotspots - whether at a restaurant, an airport or in a restaurant - isn't actually very safe or secure for users. This is due to the open character of hotspots which makes it easy to impersonate legitimate hotspots and eavesdrop on traffic - or even serve malware. T…

Article tags:

0 Please read the article before liking.
0
Passive Observations of Large DNS Service

Passive Observations of Large DNS Service

Author image
Wouter de Vries

5 min read

In 2009, Google launched its Public DNS service, with its characteristic IP address 8.8.8.8. Since then, this service has grown to be the largest and most well-known DNS service in existence. Due to the centralisation that is caused by public DNS services, large content delivery networks (CDNs), su…

Article tags:

2 Please read the article before liking.
1
Sunrise DNS-over-TLS! Sunset DNSSEC?

Sunrise DNS-over-TLS! Sunset DNSSEC?

Author image
Willem Toorop

11 min read

Is DNSSEC still needed when you get your DNS over TLS? DNSSEC's original design goals could also be met in a future DoT-only world. However, DNSSEC's aspirations have moved on with DANE. Unfortunately DNSSEC and DANE are hardly ever available at end-user devices. DoT brings liable delivery of DNS, …

Article tags:

0 Please read the article before liking.
0
CrypTech – Next Steps Towards a Safer Internet

CrypTech – Next Steps Towards a Safer Internet

Author image
Phil Roberts

4 min read

The main goal of CrypTech is to create an open-source design for a hardware cryptographic engine for Hardware Security Modules (HSMs). At the same time it also provides a associated reference implementation that allows anyone to develop, deploy and audit a secure, low-cost cryptographic engine in t…

Article tags:

0 Please read the article before liking.
0
HE_BGP_1.png

Monitoring BGP Anomalies on the Internet

Author image
Martin Winter

5 min read

There are many flavours of BGP hijacks, misconfigurations or outdated implementations. Here are some examples and tips how to verify your announcements.

Article tags:

0 Please read the article before liking.
0

Showing 885 article(s)