RPKI best practices and lessons learned
Guest Post: The technical community has identified the best ways to get started with RPKI. Some our most important RPKI experience is collected in this post.
Guest Post: The technical community has identified the best ways to get started with RPKI. Some our most important RPKI experience is collected in this post.
Guest Post: IPID has a 25+ year history of abuse as a network side channel. This post categorizes IPID exploits, and makes a surprising recommendation about mitigating them.
Network operations, BGP, post-quantum cryptography, and more from AusNOG 2025.
The Open Source Technologies session at #APNIC60 explored four use cases for open source tech in network operations.
Where does Explicit Congestion Notification (ECN) fit into TCP congestion control on the public Internet? The data shows it in very specific places, like the networks of AI data centres.
Leslie Daigle and Vu The Binh opened APNIC 60 with keynotes: Leslie on tackling bad traffic, and Vu on Viet Nam’s path to IPv6-only and its strategies for IPv6, data centres, and CDNs.
Guest Post: Measuring real-world latency, handover, and performance of the OneWeb satellite network.
Taiji Kimura’s vision for routing security in the Asia Pacific region is building trust and resilience for the benefit of all.
Guest Post: For 35 years, accidental BGP route leaks and hijacks have been routine — a simple tweak, now defined in RFC 9234, could have prevented most of them.
Guest Post: How to use Knot with HSMs, seamlessly transition from OpenDNSSEC, and switch to in-memory keys.