DNS-over-TCP considered vulnerable
Guest Post: There are several ways attackers can force TCP to fragment for inclusion in IP fragmentation attacks.
Guest Post: There are several ways attackers can force TCP to fragment for inclusion in IP fragmentation attacks.
Guest Post: Eleven-year study characterizes the rise of heavy hitters and big-fast TCP flows.
What happens when two people correctly read the same RFC yet their implementations of that protocol still differ?
Geoff Huston discusses currently active IETF areas that are not DNS related.
Guest Post: Secure your routers and upgrade to TCP Authentication Option.
Guest Post: As TCP becomes more important to DNS, overhead is becoming an issue.
Guest Post: How much of a problem are large DNS responses over UDP, in the wild?
Guest Post: How to build a Golang custom packet processor using the GoPacket library to passively watch API traffic.
Encrypted transport headers, transport protocol meddling, and content vs carriage.
Guest Post: The open-source DNS tool Anteater allows real time monitoring of operator infrastructure, using their own traffic.