A formal analysis of Karn’s Algorithm
Guest Post: Analysing Karn’s Algorithm and the RTO computations described in RFC 6298.
Guest Post: Analysing Karn’s Algorithm and the RTO computations described in RFC 6298.
Guest Post: How are DNS TXT records really used?
Guest Post: Measuring blowback — the phenomenon where a single probe to a target can generate multiple packets in response.
Answering difficult questions about NXDOMAIN responses on recursive resolvers.
Guest Post: How Certification Authority Authorization is used globally.
Reconciling different IPv6 extension header measurements.
Measuring the IETF data tracker gives a unique perspective on the current state of document production.
A look at current IPv6 numbers, anomalies, and outliers around the region.
Guest Post: There is still hope for BGP route leak prevention.
Exposing dependencies between ASNs in BGP.