OpenBSD PF-based firewalls suffer differently from DoS attacks
Guest Post: What to do if the PF state table limit is exhausted by UDP traffic.
Guest Post: What to do if the PF state table limit is exhausted by UDP traffic.
Discussing the implications of a change to IETF normative language.
Here are APNIC Blog’s top three posts related to Security for 2023.
Measurement is always a popular topic on the APNIC Blog. Here are three of the best.
Guest Post: Measuring HTTPS resource record adoption in the wild.
Measuring QUIC (performance, spin bit, and ECN), transparent forwarders, and invalid prefix dropping.
How ICANN manages data capture from the IMRS (L Root) systems worldwide.
Domain Control Validation, generalized notify, Compact Denial of Existence, and other areas of activity in DNS-related Working Groups.
Guest Post: Measuring DNS abuse is difficult. What are the obstacles?
Why mandating IPv6 DNS transport requires careful thinking in specifications.