Enabling privacy-aware zone exchanges among authoritative and recursive DNS servers
Guest Post: New privacy-aware schema assists with protecting Authoritative DNS servers from Water Torture attacks.
Guest Post: New privacy-aware schema assists with protecting Authoritative DNS servers from Water Torture attacks.
Guest Post: Now there is a way to identify if your network has deployed Source Address Validation for incoming traffic.
Guest Post: The diverse interoperability of the Internet is both a strength and weakness.
We operate the root service in its current guise because so far, its worked adequately well. But we don’t have to continue that way.
Guest Post: Network Stack Tester (NeST) is a simplified open-source Python package to perform networking experiments.
Guest Post: Study finds non-trivial inaccuracies in geolocation approaches when mapping end-to-end Internet paths to physical locations.
In August 2019, 3% of users passed their queries through resolvers that actively work to minimize the extent of leakage of superfluous information in DNS queries. What’s changed in 12 months?
Guest Post: There are some notable differences in where Top Level Domain Registries and Regional Internet Registries are at with deploying Route Origin Authorizations.
Guest Post: A promising transport options extension for UDP may be undermined by existing network processes.
Guest Post: How can eXpress Data Path be used to deliver open and reliable solutions for core protocols in the DNS?