Improving the resiliency of RPKI Relying Party software
Guest Post: Is it possible to disrupt RPKI Relying Party software by introducing a malicious CA/repository into the tree?
Guest Post: Is it possible to disrupt RPKI Relying Party software by introducing a malicious CA/repository into the tree?
Guest Post: Alibaba shares their experience developing XLINK, a multipath extension for QUIC.
Guest Post: How resilient are LEO satellite networks to DDoS attacks?
Guest Post: Encryption forced NPM vendors to evolve. Part 2 of this series discusses NPM’s evolution, including synthetic testing as one recent advancement.
Guest Post: Comcast shares its work into reducing latency through Active Queue Management.
Guest Post: The DNS Data Dictionary seeks to map what is in existing relevant protocols and prevent divergence in new protocols.
Guest Post: Why you should always set ARP timeout to less than five minutes in L3 EVPN and beware potential ARP suppression issues in L2 EVPN.
Guest Post: Researchers show how SAD DNS attacks allow an off-path attacker to inject malicious DNS records into a DNS cache.
Guest Post: Encryption and cloud adoption are creating hurdles for network performance monitoring vendors. To survive, solutions must evolve or die.
Guest Post: Network operators should regularly check their RFD configurations for harmful vendor defaults.