Understanding stealthy BGP hijacking risk in the ROV era
Guest Post: Analysing the mechanics of stealthy BGP hijacking with a topology-aware risk assessment and long-term monitoring.
Guest Post: Analysing the mechanics of stealthy BGP hijacking with a topology-aware risk assessment and long-term monitoring.
Geoff Huston discusses the problem of Geolocation and Starlink, with mis-attribution of traffic to economies an increasing concern.
Guest Post: The Happy Eyeballs algorithm supports IPv6 deployment by giving clients the ability to prefer IPv6, quickly fall back to IPv4 when necessary, and protect the user experience in either case. But how widely is it implemented?
The IPv6 deployment session at APNIC 60 covered new IPv6 scanning techniques, Vietnamese IPv6-only ambitions, how IPv6 enables IoT use cases, and more.
Network operations, BGP, post-quantum cryptography, and more from AusNOG 2025.
Leslie Daigle and Vu The Binh opened APNIC 60 with keynotes: Leslie on tackling bad traffic, and Vu on Viet Nam’s path to IPv6-only and its strategies for IPv6, data centres, and CDNs.
Guest Post: For 35 years, accidental BGP route leaks and hijacks have been routine — a simple tweak, now defined in RFC 9234, could have prevented most of them.
Guest Post: Quantifying DDR adoption and configuration patterns across 1.3M open resolvers using SVCB records.
Geoff Huston discusses the possible inevitability of a centralized Internet in the modern online economy.
Guest Post: A packet-level tour through redirects, TLS negotiation, and protocol discovery.