DNSSEC with RSA-4096 keys
We must anticipate changes in computational capacity when choosing an encryption algorithm, but is it relevant to DNSSEC?
We must anticipate changes in computational capacity when choosing an encryption algorithm, but is it relevant to DNSSEC?
Guest Post: To combat cyber threats to organizations of all sizes, we need to rethink how information security is delivered and managed.
Geoff shares his thoughts on what was being discussed the recent OARConline 35a.
Prefixes are fundamental to routing. How do they work?
No overstriking allowed! Why do RFCs have such strict text requirements?
Guest Post: How to build infrastructure for simplified patching and complete recovery.
Text protocols can be read by humans, but they come with drawbacks. Do we need them?
Guest Post: What happens when one person tries to convince network operators to apply MANRS actions across the AFRINIC region?
What can we take from past experiences at securing BGP to mitigate growing number of attacks on it?
A major ongoing concern related to the BGP is its lack of effective security measures.