Banner image

Technology and Innovation

All articles

ooni

Measuring Encrypted-DNS Censorship Using OONI Probe

Author image
Simone Basso

13 min read

In this article we talk through the preliminary results of an encrypted-DNS censorship study currently being conducted by the Open Observatory Network Interference (OONI).

Article tags:

17 Likes are disabled for this article.
2
Journeying into XDP: Part 0

Journeying into XDP Part 2: XDPerimenting with DNS Telemetry

Author image
Luuk Hendriks

16 min read

In this instalment of our Journeying into XDP series, we look into a passive BPF-program that enables us to plot graphs of DNS metrics without altering the DNS packets or touching the DNS software itself.

Article tags:

21 Likes are disabled for this article.
0
MaxPixel.net-Tree-Icon-Symbol-Technology-Green-Circuit-6742648

Computing Within Limits 2022 Event Wrap

Author image
Vesna Manojlovic

7 min read

Environmental sustainability is a hugely worrisome topic for the Internet industry - and as a Community Builder for the RIPE community, I find it important to engage with the academics and activists who both share our concerns and can contribute in our governance processes. Here is a look back to t…

Article tags:

20 Likes are disabled for this article.
1
iStock-1160031067

Where Did My Packet Go? Measuring the Impact of RPKI ROV

Author image
Koen van Hove

9 min read

Merely doing RPKI ROV does not provide any guarantees where your packet ends up. We conducted an experiment where we look into the impact of RPKI ROV on whether the packet ends up in the intended location based on active beaconing with two servers.

Article tags:

77 Likes are disabled for this article.
1
attack_mark

Stalloris: RPKI Downgrade Attack

Author image
Haya Schulmann

6 min read

Our research considers the impact of malicious publication points on the resilience of RPKI. We explored attacks that target the functionality of the relying party implementations and evaluated the resulting impact on the RPKI validation. We found all the relying party implementations to be vulnera…

Article tags:

24 Likes are disabled for this article.
0
stop-lights

Dealing with the Undercurrent of Unwanted Traffic

Author image
Leslie Daigle

6 min read

It’s common knowledge that there are “bad actors” on the Internet, poking and prodding open ports as they find them. But just how much of this “unwanted traffic” is out there, and how much is “too much” to allow out of a source network?

Article tags:

21 Likes are disabled for this article.
0
six_sides

Unpacking RFC 9199: Considerations for Large Authoritative Server Operators

Author image
Giovane Moura

10 min read

RFC 9199 puts forward six considerations for large authoritative DNS server operators each derived from peer-reviewed research. Giovane Moura from SIDN Labs walks us through the list of considerations and the experience he and his co-authors had with the RFC process.

Article tags:

19 Likes are disabled for this article.
0
ipv6-adoption-flourish-whitespace

IPv6 10 Years Out: An Analysis in Users, Tables, and Traffic

Author image
Rene Wilhelm

12 min read

On 6 June 2012, the Internet Society organised the World IPv6 Launch. On that day, participants switched on IPv6 not just for testing, but to use permanently in production services. As ten years have passed since, we look at how IPv6 adoption and deployment has progressed, in terms of routing, end-…

Article tags:

49 Likes are disabled for this article.
1
podcast5_cov

Pavlos Sermpezis: Revealing Bias in Internet Measurements

Author image
Alun Davies

2 min read

Internet measurement platforms give us a clearer understanding of the state of the Internet. But none of these platforms gives us a ‘view from everywhere’, so that understanding will always be based on a partial and potentially biased view of things. In this episode, Pavlos Sermpezis talks about th…

Article tags:

17 Likes are disabled for this article.
0
::

The Curious Case of Packets From ::

Author image
Robert Kisteleki

10 min read

RIPE Atlas has a large enough footprint all over the world to observe various kinds of network behaviour. Recently we've been notified about a case where the IPv6 source address ::/128 appeared in some of our traceroutes. We set out to discover why this happens.

Article tags:

39 Likes are disabled for this article.
4

Showing 214 article(s)

Previous
1 ... 6 7 8 9 10 ... 22
Next