Guest Post: Shell tools for MRT dumps and where to find them.
The third post in this series examines the risks in BGP that make it important to ‘trust but verify’.
Is BGP one giant, global network of gossip about routes?
Prefixes are fundamental to routing. How do they work?
What happens when two people correctly read the same RFC yet their implementations of that protocol still differ?
Geoff Huston discusses currently active IETF areas that are not DNS related.
Guest Post: Secure your routers and upgrade to TCP Authentication Option.
Guest Post: How do we fix invalid RPKI routes and whose job is it?
Guest Post: What we can learn from a major rollout, and the current state of RPKI.
What can we take from past experiences at securing BGP to mitigate growing number of attacks on it?