Notes from IETF 116
NTP security, transition mechanisms, TCP delayed ACKs, alternate name systems, and more from IETF 116.
NTP security, transition mechanisms, TCP delayed ACKs, alternate name systems, and more from IETF 116.
Guest Post: How do real-world deployments keep up with increasing complexity of email delivery and security.
Guest Post: Current deployments of QUIC struggle to shorten latency at low amplification potential.
Guest Post: How TLS stack fingerprinting can be done efficiently and provide valuable security-related insights.
Guest Post: TLS 1.3 is an example of how Internet technology is developed and refined by a small number of players.
ROV measurement, DANE Portal, IPv6 extension headers, congestion control, and more topics of interest from IETF 114.
What will happen if the load on CT logs grows?
Guest Post: TCPLS takes advantage of decades of performance optimizations made to TCP and has also a few other tricks up its sleeves.
Guest Post: Study shows that most consumer IoT devices rely on TLS 1.2; few have upgraded to TLS 1.3.
Does X.509 certificate revocation work as intended, or even work at all?