Off-path TCP hijacking in NAT-enabled Wi-Fi networks
Guest Post: New off-path TCP hijacking attack in Wi-Fi networks that exploits vulnerabilities in the NAT mapping strategies of routers discovered.
Guest Post: New off-path TCP hijacking attack in Wi-Fi networks that exploits vulnerabilities in the NAT mapping strategies of routers discovered.
How TCP interacts with the characteristics of the Starlink service.
Geoff Huston explores the performance of the BBR and Cubic flow control algorithms on the Starlink network through comprehensive measurements.
Geoff Huston discusses LEO satellites and TCP congestion control.
Guest Post: Using dominoes to understand the complexities of TCP/IP.
What can be learned from the failures and successes of technology deployment?
News of TCP’s demise in the data centre has been greatly exaggerated.
How do we maximize the use of a given network path, without knowing everything about its size along the way?
Investigating the evolving layers, and business, of the Internet.
NTP security, transition mechanisms, TCP delayed ACKs, alternate name systems, and more from IETF 116.