KeyTrap
Just how ‘devastating’ is the Keytrap vulnerability? How it works, and what the response has been.
Just how ‘devastating’ is the Keytrap vulnerability? How it works, and what the response has been.
Geoff Huston discusses a proposed new way to manage the DNS mechanisms for delegation.
Guest Post: Compare error response variations and their root causes in China’s regional provinces.
Guest Post: Analysing the causes and impacts of erroneous domain names in China.
Geoff Huston presented ‘Is the DNS ready for IPv6?’ at the DNS-OARC 42nd Workshop held in Charlotte, USA on 8 and 9 February 2024.
Measuring DNS resolver compliance with UDP response truncation standards.
The DNS Abuse Institute launches a new level of reporting that reveals how malicious phishing and malware are distributed across the DNS registration ecosystem.
Guest Post: Comparing erroneous domain name queries between China and the global DNS system.
Guest Post: Researchers uncover and investigate ‘the worst attack on DNS ever discovered’.
DELEG Resource Records, DNS caching resolution failures, DNSSEC upgrades, DNS resilience, and more.