Bootstrapping HTTP/1.1, HTTP/2, and HTTP/3
Guest Post: A packet-level tour through redirects, TLS negotiation, and protocol discovery.
Guest Post: Studying PROXY protocol usage at Internet scale and the security impact of its misconfigurations.
Guest Post: A packet-level tour through redirects, TLS negotiation, and protocol discovery.
Guest Post: Studying PROXY protocol usage at Internet scale and the security impact of its misconfigurations.
APNIC is acting on feedback to improve services, products, and Member experience across the region.
APNIC’s resource delegation audit program continued to progress as planned.
Guest Post: The NRO fully supports ICANN’s efforts to bring transparency and accountability to the AFRINIC election process.
Guest Post: A new rate limit has significantly reduced the load on Let’s Encrypt’s infrastructure.
Adli Wahid moderated a panel discussion on cybercrime at CommunicAsia 2025, held in Singapore from 27 to 29 May 2025.
Geoff Huston discusses the DNS root zone and how query load at the root could be reduced by using trusted local copies of the zone.
Why IP, transport, routing, and DNS protocols can harden and what that means for the future of the public network.
Guest Post: Many AS-SETs have grown so large they effectively whitelist most of the routing table, defeating their purpose. How are AS-SETs actually used for filtering, and what can be done when they get too big?