Stop spoofed traffic at the door: Destination-side SAV
Guest Post: Roughly half of all ASes fail to filter for spoofed traffic as it enters their network border. A new tool helps admins test their own network in real time.
Guest Post: Roughly half of all ASes fail to filter for spoofed traffic as it enters their network border. A new tool helps admins test their own network in real time.
Guest Post: George Sadowsky outlines how to build and operate a FTTH network when existing infrastructure, topography, and low population all work against the need for fast Internet.
There are plenty of alternatives for RPKI validation.
The NRO recently registered an RDAP profile with IANA for the RIR community.
Guest Post: An investigation into an HTTPS interception attack using a custom root CA.
Guest Post: Bugs can occur at any stage in the P4 pipeline. Static analysis can be hit and miss — so researchers developed P6.
Geoff Huston shares his thoughts from the recent DNS-OARC 34.
Opinion: The NSA recently issued some advice on DoH. It wasn’t necessarily bad advice, but it was not well received.
Guest Post: Krill has a built-in HTTPS server but you can also run a production grade webserver as a reverse proxy for easy TLS configuration and additional restrictions.
Did the COVID-19 pandemic have any impact on the deployment and use of IPv6?