DNSSEC and ECDSA
Two years ago I reported on the use of the elliptical curve cryptographic algorithm in generating digital signatures for DNSSEC. Let’s see what’s changed over the past 24 months.
Two years ago I reported on the use of the elliptical curve cryptographic algorithm in generating digital signatures for DNSSEC. Let’s see what’s changed over the past 24 months.
Guest Post: Google’s Warren Kumari discusses the benefits of Next Secure (NSEC) and why it needs to be used in a more aggressive manner.
ICANN recently announced the operational plans to “roll” the Root Zone Key Signing Key, an essential part of DNSSEC.
Geoff Huston shares his impressions from sessions he attended at IETF 96, Berlin.
Guest Post: Shane Kerr from Beijing Internet Institute looks at the basic approaches to scaling and how these apply to the fundamental technologies on the Internet.
DNS / DNSSEC workshop, from 21 to 23 September, in Quezon City, Philippines. Register now and pay before 31 August 2016 to get the early-bird rate.
Guest Post: How can IPv6-only hosts access IPv4-only parts of the Internet? One possible way is to use NAT64 in conjunction with DNS64.
While the current open nature of DNS queries makes third party monitoring, interception, and substitution incredibly easy, there are now some grounds to be optimistic and start to contemplate a DNS environment that preserves privacy and integrity.
Geoff returns to the subject of IP packet fragmentation, this time looking at how IPv6 has changed the behaviour of packet fragmentation and discussing the concern of whether IPv6 can handle big packets.
APNIC participated at the DNS-OARC 24 workshop and IETF 95 meeting held back-to-back from 31 March to 8 April in Buenos Aires, Argentina.