Guest Post: Is it possible to disrupt RPKI Relying Party software by introducing a malicious CA/repository into the tree?
Guest Post: Alibaba shares their experience developing XLINK, a multipath extension for QUIC.
Slack’s DNSSEC debacle, NSEC problems, Measuring DNSSEC, and more from DNS-OARC 36.
Guest Post: How resilient are LEO satellite networks to DDoS attacks?
Guest Post: Encryption forced NPM vendors to evolve. Part 2 of this series discusses NPM’s evolution, including synthetic testing as one recent advancement.
Geoff Huston discusses technical presentations from RIPE 83.
Guest Post: Comcast shares its work into reducing latency through Active Queue Management.
Guest Post: The DNS Data Dictionary seeks to map what is in existing relevant protocols and prevent divergence in new protocols.
Guest Post: Why you should always set ARP timeout to less than five minutes in L3 EVPN and beware potential ARP suppression issues in L2 EVPN.
Guest Post: Researchers show how SAD DNS attacks allow an off-path attacker to inject malicious DNS records into a DNS cache.