IPv6 flow label: misuse in hashing
Guest Post: Learn about the history of the IPv6 flow label and when you should avoid using them as a hash component.
Guest Post: Learn about the history of the IPv6 flow label and when you should avoid using them as a hash component.
Guest Post: Learn about the significant recent changes being made to the core Internet protocols.
A national RPKI awareness and deployment project being carried out in Colombia has so far increased the economy’s RPKI deployment to over 46%.
APNIC participated at IETF 100 in Singapore from 11 to 17 November 2017.
There’s three easy ways to get a smile out of an IETF attendee.
The use of IPv6-only networks at IETF 100 is allowing attendees to troubleshoot IPv6 issues during the meeting.
An idea has been floated at the IETF 6man working group regarding the customer end of IPv6 addresses.
The ISOC Fellowship to the IETF introduces representatives from a diverse range of fields to the growing need to consider IPv6 in their planning and decision-making processes.
Guest Post: RFC8188 provides protocol designers a new option for building multi-party protocols with HTTPS by defining a standardized format for encrypting HTTP message bodies.
Guest Post: Transport Layer Security 1.3 has been designed to be more secure in order to prevent the interception of sessions over the Internet.