How to talk about the trust in your devices: An IRTF draft
A review of Michael Richardson’s IRTF draft, a taxonomy of operational security considerations for manufacturer installed keys and trust anchors.
A review of Michael Richardson’s IRTF draft, a taxonomy of operational security considerations for manufacturer installed keys and trust anchors.
A look at how a consistent time standard is spread across the Internet, and the recent efforts to add an aspect of security to Network Time Protocol (NTP).
Geoff Huston explores how DNS operates over IPv6 and the challenges of measuring it. His findings reveal interesting variances by geographic region and network, raising questions about whether IPv6-only DNS is reliable enough to guide future operational practices.
Guest Post: Despite their relative simplicity, Protective DNS blocklists are not a catch-all security solution; blocklists differ in their goals, threat categorization, maintenance frequency, and community support.
The Network Management session at APRICOT 2026 brought together four presenters to share practical, data‑driven insights into how operators can better understand and optimize their networks.
How much of the Internet user base can reliably access a DNS server where the only form of access is via IPv6?
The APRICOT 2026 keynotes set three complementary challenges for the Internet community — use automation without losing agency, preserve the operational record that explains how we got here, and finish the work of IPv6 where it still lags.
A new paper from MANRS suggests enterprise demand may be the missing driver for stronger routing security.
Guest Post: DNSSEC adoption, while steadily rising, is still low after 20 years. Why care about DNSSEC adoption anyway?
Guest Post: Is the peering market in decline? A closer look at global data and operator experience suggests otherwise.