A first look at the PROXY protocol and its security implications
Guest Post: Studying PROXY protocol usage at Internet scale and the security impact of its misconfigurations.
Guest Post: Studying PROXY protocol usage at Internet scale and the security impact of its misconfigurations.
Guest Post: A new rate limit has significantly reduced the load on Let’s Encrypt’s infrastructure.
Geoff Huston discusses the DNS root zone and how query load at the root could be reduced by using trusted local copies of the zone.
Why IP, transport, routing, and DNS protocols can harden and what that means for the future of the public network.
Guest Post: Many AS-SETs have grown so large they effectively whitelist most of the routing table, defeating their purpose. How are AS-SETs actually used for filtering, and what can be done when they get too big?
A recent routing incident sparks renewed debate on protocol design, error handling, and whether Postel’s law is helping or hurting the Internet’s evolution.
Fiji stands at a pivotal point in its digital journey, with strong foundations and a clear vision.
Reviewing QUIC’s design motivations, protocol innovations, and current adoption across the public Internet.
Guest Post: Why is TLSv1.3 a better fit for Zero Trust?
Leslie Daigle discusses AIDE and GCA’s work to analyse malicious traffic collected via honeynets.