Improving the resiliency of RPKI Relying Party software
Guest Post: Is it possible to disrupt RPKI Relying Party software by introducing a malicious CA/repository into the tree?
Guest Post: Is it possible to disrupt RPKI Relying Party software by introducing a malicious CA/repository into the tree?
Slack’s DNSSEC debacle, NSEC problems, Measuring DNSSEC, and more from DNS-OARC 36.
Guest Post: How resilient are LEO satellite networks to DDoS attacks?
Guest Post: Encryption forced NPM vendors to evolve. Part 2 of this series discusses NPM’s evolution, including synthetic testing as one recent advancement.
Geoff Huston discusses technical presentations from RIPE 83.
Guest Post: Researchers show how SAD DNS attacks allow an off-path attacker to inject malicious DNS records into a DNS cache.
Guest Post: Encryption and cloud adoption are creating hurdles for network performance monitoring vendors. To survive, solutions must evolve or die.
Guest Post: Study shows ease-to-deploy and cost are important factors when it comes to using DNS security mechanisms.
Geoff Huston on currently active IETF routing security, IPv6, and transport discussions.
Presentations at DINR 2021 demonstrated a world of detail and complexity in current DNS research.