Bootstrapping HTTP/1.1, HTTP/2, and HTTP/3
Guest Post: A packet-level tour through redirects, TLS negotiation, and protocol discovery.
Guest Post: A packet-level tour through redirects, TLS negotiation, and protocol discovery.
Guest Post: Studying PROXY protocol usage at Internet scale and the security impact of its misconfigurations.
Guest Post: A new rate limit has significantly reduced the load on Let’s Encrypt’s infrastructure.
Geoff Huston discusses the DNS root zone and how query load at the root could be reduced by using trusted local copies of the zone.
Why IP, transport, routing, and DNS protocols can harden and what that means for the future of the public network.
Guest Post: Many AS-SETs have grown so large they effectively whitelist most of the routing table, defeating their purpose. How are AS-SETs actually used for filtering, and what can be done when they get too big?
A recent routing incident sparks renewed debate on protocol design, error handling, and whether Postel’s law is helping or hurting the Internet’s evolution.
Fiji stands at a pivotal point in its digital journey, with strong foundations and a clear vision.
Reviewing QUIC’s design motivations, protocol innovations, and current adoption across the public Internet.
Guest Post: Why is TLSv1.3 a better fit for Zero Trust?