Network Operations

All articles

Whose CIDR Is It Anyway?

Whose CIDR Is It Anyway?

Jan Schaumann

22 min read

IP address space wasn't divided evenly, and after years of re-allocation and re-assigment, the question that comes to mind is: who owns what parts of it? In the latest in a series of articles on the centralisation of the Internet, Jan Schaumann digs into the data to try to get a clearer view.

Article tags:

80 You have liked this article 0 times.
3
Working Towards a Coordinated RPKI System

Working Towards a Coordinated RPKI System

Sofía Silva Berenguer

3 min read

What would a single, global RPKI system look like?

Article tags:

24 You have liked this article 0 times.
0
From Academia to Internet: Pioneers of EARN, NSFNET and RIPE

From Academia to Internet: Pioneers of EARN, NSFNET and RIPE

Anastasiya Pak

2 min read

In this episode of the RIPE Labs podcast, three Internet pioneers talk about how they helped grow the Internet out of its early infancy, back when its purpose - and much of the excitement around its development - lay in the promise of connecting researchers from around the world.

Article tags:

20 You have liked this article 0 times.
0
IPv6 Stockpiling: A Trojan Horse in Our Midst?

IPv6 Stockpiling: A Trojan Horse in Our Midst?

Marco Schmidt

13 min read

The current combination of RIPE policies and rules for RIPE NCC membership enable IPv6 stockpiling. And what might sound like an unlikely activity is not only happening, but is actually on the rise. Here we look at the trends and some of the potential consequences and ask where we go from here.

Article tags:

84 You have liked this article 0 times.
3
Authenticated DNSSEC Bootstrapping: From Hackathon Project to Useful Software

Authenticated DNSSEC Bootstrapping: From Hackathon Project to Useful Software

Peter Thomassen

7 min read

At the RIPE DNS Hackathon 2023, a group of DNS enthusiasts started writing implementations of the Authenticated DNSSEC Bootstrapping protocol. After the event, the work continued, culminating in the completion of a module for Knot DNS. So what problem does the new feature address, and how can you u…

Article tags:

21 You have liked this article 0 times.
0
SEEing Growth at SEE 12

SEEing Growth at SEE 12

Karla Liddle-White

4 min read

On 22-23 April, the South East Europe (SEE) Internet community came together in Athens - the first time a SEE meeting has been held in Greece! 195 participants from 26 countries joined to discuss the history of the Internet, IPv6, RPKI, BGP and more.

Article tags:

16 You have liked this article 0 times.
0
Collaborative DDoS Mitigation: From Research to Operational Practice

Collaborative DDoS Mitigation: From Research to Operational Practice

Thijs van den Hout

11 min read

Distributed denial-of-service (DDoS) attacks continue to plague the Internet and pose a risk to the availability of critical digital systems that we increasingly depend on in our daily lives. Thijs van den Hout and his colleagues outline their contributions and lessons learned from 5 years of resea…

Article tags:

51 You have liked this article 0 times.
0
Retiring ns.ripe.net

Retiring ns.ripe.net

8 min read

Since 1992, the RIPE NCC has been the only Regional Internet Registry to offer a secondary DNS server to its members, called ns.ripe.net. LIRs with a /16-sized IPv4 allocation or a /32-sized IPv6 allocation have been able to use this service to ensure the stability of the DNS service for these larg…

Article tags:

62 You have liked this article 0 times.
1
What Is NIS2 and Why Is It Important?

What Is NIS2 and Why Is It Important?

Fredrik Lindeberg

9 min read

With NIS2 soon coming into force, Fredrik Lindeberg looks at the key points of the new directive, the relationship between process and operational security and what actions you should take now.

Article tags:

71 You have liked this article 0 times.
0
Bert Hubert: Internet Privacy and the Cost of Losing Control

Bert Hubert: Internet Privacy and the Cost of Losing Control

Alun Davies

2 min read

Internet users, the companies who sell us our devices, and governments are all caught up in the struggle for online privacy. In this episode, Bert Hubert explains how outsourcing and other market forces determine the flow of control over personal data and why we need to understand the consequences.

Article tags:

256 You have liked this article 0 times.
0

Showing 879 article(s)