QUIC measurement, DNS, BGP, and congestion control research at IETF 115.
A BGP attack using the vast address space of IPv6: Have we heard this before?
Geoff Huston shares his thoughts on routing security and trust.
Guest Post: These attacks hold lessons for securing the BGP routing of any organization that conducts business on the Internet.
Guest Post: Examining the reasons and techniques used when an operator does not want traffic via a specific AS.
Guest Post: Examine the various techniques used to control traffic entry points.
Guest Post: How to select which neighboring AS to send traffic through.
Guest Post: The success of open-source projects like FRR is determined by their community of contributors.
Guest Post: Exploiting routing decisions made in BGP when networks cannot retrieve RPKI information from publication points.
IPv6 extension headers, BGPsec crypto, RPKI beacons, and more.