Bringing DNS security and privacy to the end user
Guest Post: Authentication and encryption should start at the edge of the network, with the end user.
Guest Post: Authentication and encryption should start at the edge of the network, with the end user.
Guest Post: NAT over IPv6 is possible, but it’s messy and could be so easily avoided.
What changed in Internet addressing in 2017 and how has it changed the outlook for the Internet?
Opinion: Rather than being condemned, perhaps we should appreciate the role that NATs play in the evolution of the architecture of the Internet?
Guest Post: NAT64check can be used to easily check whether sites are reachable and work correctly over IPv6 and NAT64.
APNIC has operated its own dual stack network for many years, but recently embarked on two additional IPv6 network projects. This is what we experienced.
After sharing my notes from the IEPG meeting and aspects of the DNS, here are the rest of the items that I personally found to be of interest at IETF 99 last week.
Guest Post: Mark Smith discusses whether UDP encapsulation – and the desire for a transparent Internet – will encourage IPv6 deployment.
What changed in Internet addressing in 2016? Geoff Huston examines the numbers and trends.
Geoff Huston shares his thoughts on several presentations from the recent RIPE 73 meeting.