Evaluation of anti-DDoS features in full-service resolvers
Guest Post: Simulating a DDoS attack, Japanese researchers tested a full-service resolver configured with both fetch-limit and serve-stale enabled.
Guest Post: Simulating a DDoS attack, Japanese researchers tested a full-service resolver configured with both fetch-limit and serve-stale enabled.
We must anticipate changes in computational capacity when choosing an encryption algorithm, but is it relevant to DNSSEC?
Guest Post: After issues at recent DNSSEC KSK ceremonies what can we expect at the next one?
Guest Post: Study shows clients can distribute DNS queries across a set of popular recursive resolvers without performance degradation.
Guest Post: What happens at a Root KSK ceremony? What’s at stake, and what could go wrong?
Guest Post: Institutions that run their own recursive resolvers and route from their own AS are most susceptible to privacy risks.
Guest Post: Looking for a way to improve privacy and security of your DNS? Run it through Tor.
Guest Post: A new visualization project is shedding light on how regularly DNSSEC are keys being updated.
Geoff shares his thoughts on what was being discussed the recent OARConline 35a.
Guest Post: DoH resolver lists are not comprehensive, which makes it difficult for network administrators to entirely block DoH connections.