Data-driven policy recommendations and sector-specific routing security analysis in Pakistan
Examining Internet routing security policies across three key sectors in Pakistan.
Examining Internet routing security policies across three key sectors in Pakistan.
Guest Post: Proposing and validating a workflow to identify suspicious IRR records.
Guest Post: How IRR explorer can be used to analyse and improve routing, IRR registrations, and RPKI configurations.
Guest Post: Which Internet Routing Registry database has the most accurate information?
Whois is old and clunky. In many ways, RDAP already fulfils many of its functions. So are we ready to replace it?
The level of interest in the general topic of routing security peaked at the recent NANOG meeting, with several thought-provoking presentations on the topic.
RPSL changes at the RIPE NCC on 4 September will affect APNIC region resource holders.
Guest Post: In Part II of the post, Cengiz Alaettinoglu shares some insights into the low adoption of the IRR model in the hope it might increase adoption of the SIDR model.
Guest post: In this two-part post, PacketDesign’s Cengiz Alaettinoglou, gives a brief overview and comparison of the IRR and SIDR security models.
A report on the discussions at the RIPE 70 BoF session on Internet Routing Registries.